Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1523122
MD5:01c227c31afb774df17ea789878018a4
SHA1:9db323a49e28f69730ca0bdbc31c3d7058342737
SHA256:ef8f1aec6f7dccd1d1a39f575a341e4b12981337ea3ac39c8cb00c22acfdc0a5
Tags:exeuser-Bitsight
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 7288 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 01C227C31AFB774DF17EA789878018A4)
    • chrome.exe (PID: 7304 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecovery MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 7548 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=2000,i,9753138536552679466,13078363827801133179,262144 --disable-features=CrashRecovery /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 8148 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5572 --field-trial-handle=2000,i,9753138536552679466,13078363827801133179,262144 --disable-features=CrashRecovery /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 6604 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4596 --field-trial-handle=2000,i,9753138536552679466,13078363827801133179,262144 --disable-features=CrashRecovery /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: file.exeReversingLabs: Detection: 13%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: file.exeJoe Sandbox ML: detected
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.5:49718 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.5:49723 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.175.87.197:443 -> 192.168.2.5:49750 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.175.87.197:443 -> 192.168.2.5:49761 version: TLS 1.2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006EDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_006EDBBE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006BC2A2 FindFirstFileExW,0_2_006BC2A2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006F68EE FindFirstFileW,FindClose,0_2_006F68EE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006F698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_006F698F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006ED076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_006ED076
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006ED3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_006ED3A9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006F9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_006F9642
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006F979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_006F979D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006F9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_006F9B2B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006F5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_006F5C97
Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006FCE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_006FCE44
Source: global trafficHTTP traffic detected: GET /account?=https://accounts.google.com/v3/signin/challenge/pwd HTTP/1.1Host: youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIkqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1Host: www.youtube.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIkqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentsec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: global trafficHTTP traffic detected: GET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=1835193244&timestamp=1727756225977 HTTP/1.1Host: accounts.youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-arch: "x86"sec-ch-ua-platform: "Windows"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-model: ""sec-ch-ua-bitness: "64"sec-ch-ua-wow64: ?0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIkqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: iframeReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: www.google.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIkqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=Sec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: NID=517=qpyNBSLd6FRkZvb02Ao4cx7nrLrnZZ4LYGbSj4uUnyqAHrvclw9CDJ-wmMoEQSfBPac8kcMzJxIIjVtN634ezD7TB1yqdqCxV4CZWrGUwfaiCB5srIhe6u0d0mvayAt9kVs0W_fnOQBpq6P3BCd_ukB2sEcKsKc1XHutkkz3lGYmGAu-og
Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=kKN7D7gLng6rxTc&MD=E4HEG3fR HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=kKN7D7gLng6rxTc&MD=E4HEG3fR HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: chromecache_97.4.drString found in binary or memory: _.iq(p)+"/familylink/privacy/notice/embedded?langCountry="+_.iq(p);break;case "PuZJUb":a+="https://www.youtube.com/t/terms?chromeless=1&hl="+_.iq(m);break;case "fxTQxb":a+="https://youtube.com/t/terms?gl="+_.iq(_.rq(c))+"&hl="+_.iq(d)+"&override_hl=1"+(f?"&linkless=1":"");break;case "prAmvd":a+="https://www.google.com/intl/"+_.iq(m)+"/chromebook/termsofservice.html?languageCode="+_.iq(d)+"&regionCode="+_.iq(c);break;case "NfnTze":a+="https://policies.google.com/privacy/google-partners"+(f?"/embedded": equals www.youtube.com (Youtube)
Source: global trafficDNS traffic detected: DNS query: youtube.com
Source: global trafficDNS traffic detected: DNS query: www.youtube.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: accounts.youtube.com
Source: global trafficDNS traffic detected: DNS query: play.google.com
Source: unknownHTTP traffic detected: POST /log?format=json&hasfast=true&authuser=0 HTTP/1.1Host: play.google.comConnection: keep-aliveContent-Length: 519sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"Content-Type: application/x-www-form-urlencoded;charset=UTF-8sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-platform-version: "10.0.0"X-Goog-AuthUser: 0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: */*Origin: https://accounts.google.comX-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIkqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: chromecache_97.4.drString found in binary or memory: https://accounts.google.com
Source: chromecache_97.4.drString found in binary or memory: https://accounts.google.com/TOS?loc=
Source: file.exe, 00000000.00000002.2021675151.00000000017E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/challenge/pwdWAPI.dl
Source: chromecache_103.4.drString found in binary or memory: https://apis.google.com/js/api.js
Source: chromecache_97.4.drString found in binary or memory: https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage
Source: chromecache_97.4.drString found in binary or memory: https://families.google.com/intl/
Source: chromecache_103.4.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/drive_2020q4/v10/192px.svg
Source: chromecache_103.4.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/gmail_2020q4/v10/web-48dp/logo_gmail_2020q4_color_2x_web_
Source: chromecache_103.4.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/maps/v7/192px.svg
Source: chromecache_97.4.drString found in binary or memory: https://g.co/recover
Source: chromecache_97.4.drString found in binary or memory: https://play.google.com/log?format=json&hasfast=true
Source: chromecache_97.4.drString found in binary or memory: https://play.google.com/work/enroll?identifier=
Source: chromecache_97.4.drString found in binary or memory: https://play.google/intl/
Source: chromecache_97.4.drString found in binary or memory: https://policies.google.com/privacy
Source: chromecache_97.4.drString found in binary or memory: https://policies.google.com/privacy/additional
Source: chromecache_97.4.drString found in binary or memory: https://policies.google.com/privacy/google-partners
Source: chromecache_97.4.drString found in binary or memory: https://policies.google.com/technologies/cookies
Source: chromecache_97.4.drString found in binary or memory: https://policies.google.com/technologies/location-data
Source: chromecache_97.4.drString found in binary or memory: https://policies.google.com/terms
Source: chromecache_97.4.drString found in binary or memory: https://policies.google.com/terms/location
Source: chromecache_97.4.drString found in binary or memory: https://policies.google.com/terms/service-specific
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-email-pin.gif
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-password.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-or-voice-pin.gif
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-pin.gif
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-stop-go-landing-page_1x.png
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/animation/
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_device.png
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_pin.png
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync.png
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_1x.png
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_2x.png
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_darkmode_1x.png
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/continue_on_your_phone.png
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_phone_number_verification.png
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_silent_tap_yes_darkmode.gif
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes.gif
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes_darkmode.gif
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_dark_v2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_v2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_not_ready.png
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_1.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_dark_1.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_1.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_darkmode_1.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_1.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_darkmode_1.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_created.png
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_full_house.png
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_1.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_darkmode_1.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_1.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_darkmode_1.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_1.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_darkmode_1.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_stop.png
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/personalization_reminders.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/phone_number_sign_in_2x.png
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key.gif
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_ios_center.png
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_laptop.gif
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered.gif
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered_darkmode.gif
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_phone.gif
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_ios.gif
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_pulldown.gif
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_tapyes.gif
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/smart_lock_2x.png
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/usb_key.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/web_and_app_activity.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/who_will_be_using_this_device.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/you_tube_history.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/gmail_ios_authzen.gif
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/paaskey.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_light.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/screenlock.png
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_ipad.gif
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone.gif
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_nfc.gif
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_usb.gif
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_phone.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_keys.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/loading_spinner_gm.gif
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/progress_spinner_color_20dp_4x.gif
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/success-gm-default_2x.png
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/apps/signup/resources/custom-email-address.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/images/hpp/shield_security_checkup_green_2x_web_96dp.png
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_dark_1.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_v1.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_dark_v1.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_v1.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_dark_v1.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_v1.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_confirmation.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_0.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_dark_0.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_dark_2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_dark_2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_dark_2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_dark_2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_dark_3.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_1.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_dark_1.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_1.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_dark_1.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_dark_2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_1.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_dark_1.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_dark_2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_dark_v2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_v2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set_darkmode.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_v2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_dark_v2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_v2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space.png
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space_dark.png
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2_dark.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess.svg
Source: chromecache_103.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess_dark.svg
Source: chromecache_97.4.drString found in binary or memory: https://support.google.com/accounts?hl=
Source: chromecache_97.4.drString found in binary or memory: https://support.google.com/accounts?p=new-si-ui
Source: chromecache_97.4.drString found in binary or memory: https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072
Source: chromecache_103.4.drString found in binary or memory: https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=
Source: chromecache_97.4.drString found in binary or memory: https://www.google.com
Source: chromecache_97.4.drString found in binary or memory: https://www.google.com/intl/
Source: chromecache_103.4.drString found in binary or memory: https://www.gstatic.com/accounts/speedbump/authzen_optin_illustration.gif
Source: chromecache_103.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/chrome_48dp.png
Source: chromecache_103.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/googleg_48dp.png
Source: chromecache_103.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/gsa_48dp.png
Source: chromecache_103.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/play_prism_48dp.png
Source: chromecache_103.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/youtube_48dp.png
Source: chromecache_97.4.drString found in binary or memory: https://www.gstatic.com/images/branding/productlogos/googleg/v6/36px.svg
Source: chromecache_97.4.drString found in binary or memory: https://www.youtube.com/t/terms?chromeless=1&hl=
Source: file.exe, 00000000.00000003.2021167840.0000000001818000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2020871699.0000000001674000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
Source: chromecache_97.4.drString found in binary or memory: https://youtube.com/t/terms?gl=
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.5:49718 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.5:49723 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.175.87.197:443 -> 192.168.2.5:49750 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.175.87.197:443 -> 192.168.2.5:49761 version: TLS 1.2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006FEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_006FEAFF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006FED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_006FED6A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006FEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_006FEAFF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006EAA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_006EAA57
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00719576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00719576

System Summary

barindex
Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
Source: file.exe, 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_2412378f-d
Source: file.exe, 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_def99581-4
Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_d54255f1-0
Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_76478aa4-0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006ED5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_006ED5EB
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006E1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_006E1201
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006EE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_006EE8F6
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0068BF400_2_0068BF40
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006880600_2_00688060
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006F20460_2_006F2046
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006E82980_2_006E8298
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006BE4FF0_2_006BE4FF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006B676B0_2_006B676B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007148730_2_00714873
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0068CAF00_2_0068CAF0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006ACAA00_2_006ACAA0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0069CC390_2_0069CC39
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006B6DD90_2_006B6DD9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0069D07D0_2_0069D07D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0069B1190_2_0069B119
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006891C00_2_006891C0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006A13940_2_006A1394
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006A17060_2_006A1706
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006A781B0_2_006A781B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0069997D0_2_0069997D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006879200_2_00687920
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006A19B00_2_006A19B0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006A7A4A0_2_006A7A4A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006A1C770_2_006A1C77
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006A7CA70_2_006A7CA7
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0070BE440_2_0070BE44
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006B9EEE0_2_006B9EEE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006A1F320_2_006A1F32
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00689CB3 appears 31 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 0069F9F2 appears 40 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 006A0A30 appears 46 times
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engineClassification label: mal64.evad.winEXE@31/36@13/7
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006F37B5 GetLastError,FormatMessageW,0_2_006F37B5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006E10BF AdjustTokenPrivileges,CloseHandle,0_2_006E10BF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006E16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_006E16C3
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006F51CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_006F51CD
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006ED4DC CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_006ED4DC
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006F648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_006F648E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006842A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_006842A2
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeReversingLabs: Detection: 13%
Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecovery
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=2000,i,9753138536552679466,13078363827801133179,262144 --disable-features=CrashRecovery /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5572 --field-trial-handle=2000,i,9753138536552679466,13078363827801133179,262144 --disable-features=CrashRecovery /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4596 --field-trial-handle=2000,i,9753138536552679466,13078363827801133179,262144 --disable-features=CrashRecovery /prefetch:8
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecoveryJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=2000,i,9753138536552679466,13078363827801133179,262144 --disable-features=CrashRecovery /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5572 --field-trial-handle=2000,i,9753138536552679466,13078363827801133179,262144 --disable-features=CrashRecovery /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4596 --field-trial-handle=2000,i,9753138536552679466,13078363827801133179,262144 --disable-features=CrashRecovery /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: Google Drive.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006842DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_006842DE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006A22C3 push 00000000h; iretd 0_2_006A22FC
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006A0A76 push ecx; ret 0_2_006A0A89
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0069F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_0069F98E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00711C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00711C41
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-95835
Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.1 %
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006EDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_006EDBBE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006BC2A2 FindFirstFileExW,0_2_006BC2A2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006F68EE FindFirstFileW,FindClose,0_2_006F68EE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006F698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_006F698F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006ED076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_006ED076
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006ED3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_006ED3A9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006F9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_006F9642
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006F979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_006F979D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006F9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_006F9B2B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006F5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_006F5C97
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006842DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_006842DE
Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006FEAA2 BlockInput,0_2_006FEAA2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006B2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_006B2622
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006842DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_006842DE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006A4CE8 mov eax, dword ptr fs:[00000030h]0_2_006A4CE8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006E0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_006E0B62
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006B2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_006B2622
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006A083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_006A083F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006A09D5 SetUnhandledExceptionFilter,0_2_006A09D5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006A0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_006A0C21
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006E1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_006E1201
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006C2BA5 KiUserCallbackDispatcher,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_006C2BA5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006EB226 SendInput,keybd_event,0_2_006EB226
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007022DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_007022DA
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006E0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_006E0B62
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006E1663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_006E1663
Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: file.exeBinary or memory string: Shell_TrayWnd
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006A0698 cpuid 0_2_006A0698
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006F8195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_006F8195
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006DD27A GetUserNameW,0_2_006DD27A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006BB952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_006BB952
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006842DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_006842DE
Source: file.exeBinary or memory string: WIN_81
Source: file.exeBinary or memory string: WIN_XP
Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
Source: file.exeBinary or memory string: WIN_XPe
Source: file.exeBinary or memory string: WIN_VISTA
Source: file.exeBinary or memory string: WIN_7
Source: file.exeBinary or memory string: WIN_8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00701204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00701204
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00701806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00701806
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure2
Valid Accounts
1
Native API
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
21
Input Capture
2
System Time Discovery
Remote Services1
Archive Collected Data
2
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/Job2
Valid Accounts
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol21
Input Capture
11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Registry Run Keys / Startup Folder
2
Valid Accounts
2
Obfuscated Files or Information
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin Shares3
Clipboard Data
3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
Access Token Manipulation
1
DLL Side-Loading
NTDS15
System Information Discovery
Distributed Component Object ModelInput Capture4
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
Process Injection
1
Masquerading
LSA Secrets12
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
Registry Run Keys / Startup Folder
2
Valid Accounts
Cached Domain Credentials1
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Virtualization/Sandbox Evasion
DCSync3
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
Access Token Manipulation
Proc Filesystem1
Application Window Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
Process Injection
/etc/passwd and /etc/shadow1
System Owner/User Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe13%ReversingLabs
file.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
youtube-ui.l.google.com0%VirustotalBrowse
accounts.youtube.com0%VirustotalBrowse
play.google.com0%VirustotalBrowse
youtube.com0%VirustotalBrowse
www.google.com0%VirustotalBrowse
www.youtube.com0%VirustotalBrowse
www3.l.google.com0%VirustotalBrowse
SourceDetectionScannerLabelLink
https://play.google/intl/0%URL Reputationsafe
https://families.google.com/intl/0%URL Reputationsafe
https://policies.google.com/technologies/location-data0%URL Reputationsafe
https://policies.google.com/technologies/location-data0%URL Reputationsafe
https://apis.google.com/js/api.js0%URL Reputationsafe
https://policies.google.com/privacy/google-partners0%URL Reputationsafe
https://policies.google.com/terms/service-specific0%URL Reputationsafe
https://g.co/recover0%URL Reputationsafe
https://policies.google.com/privacy/additional0%URL Reputationsafe
https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=32850720%URL Reputationsafe
https://policies.google.com/technologies/cookies0%URL Reputationsafe
https://policies.google.com/technologies/cookies0%URL Reputationsafe
https://policies.google.com/terms0%URL Reputationsafe
https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=0%URL Reputationsafe
https://support.google.com/accounts?hl=0%URL Reputationsafe
https://policies.google.com/terms/location0%URL Reputationsafe
https://policies.google.com/privacy0%URL Reputationsafe
https://support.google.com/accounts?p=new-si-ui0%URL Reputationsafe
https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage0%URL Reputationsafe
https://www.google.com/intl/1%VirustotalBrowse
https://play.google.com/work/enroll?identifier=0%VirustotalBrowse
https://youtube.com/t/terms?gl=0%VirustotalBrowse
https://play.google.com/log?format=json&hasfast=true&authuser=00%VirustotalBrowse
https://www.google.com/favicon.ico0%VirustotalBrowse
https://www.google.com0%VirustotalBrowse
https://play.google.com/log?hasfast=true&authuser=0&format=json0%VirustotalBrowse
https://play.google.com/log?format=json&hasfast=true0%VirustotalBrowse
https://www.youtube.com/t/terms?chromeless=1&hl=0%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
youtube-ui.l.google.com
142.250.185.110
truefalseunknown
www3.l.google.com
172.217.16.142
truefalseunknown
play.google.com
172.217.16.142
truefalseunknown
www.google.com
142.250.186.164
truefalseunknown
youtube.com
142.250.185.78
truefalseunknown
accounts.youtube.com
unknown
unknownfalseunknown
www.youtube.com
unknown
unknownfalseunknown
NameMaliciousAntivirus DetectionReputation
https://play.google.com/log?format=json&hasfast=true&authuser=0falseunknown
https://www.google.com/favicon.icofalseunknown
https://play.google.com/log?hasfast=true&authuser=0&format=jsonfalseunknown
NameSourceMaliciousAntivirus DetectionReputation
https://play.google/intl/chromecache_97.4.drfalse
  • URL Reputation: safe
unknown
https://families.google.com/intl/chromecache_97.4.drfalse
  • URL Reputation: safe
unknown
https://youtube.com/t/terms?gl=chromecache_97.4.drfalseunknown
https://policies.google.com/technologies/location-datachromecache_97.4.drfalse
  • URL Reputation: safe
  • URL Reputation: safe
unknown
https://www.google.com/intl/chromecache_97.4.drfalseunknown
https://apis.google.com/js/api.jschromecache_103.4.drfalse
  • URL Reputation: safe
unknown
https://policies.google.com/privacy/google-partnerschromecache_97.4.drfalse
  • URL Reputation: safe
unknown
https://play.google.com/work/enroll?identifier=chromecache_97.4.drfalseunknown
https://policies.google.com/terms/service-specificchromecache_97.4.drfalse
  • URL Reputation: safe
unknown
https://g.co/recoverchromecache_97.4.drfalse
  • URL Reputation: safe
unknown
https://policies.google.com/privacy/additionalchromecache_97.4.drfalse
  • URL Reputation: safe
unknown
https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072chromecache_97.4.drfalse
  • URL Reputation: safe
unknown
https://policies.google.com/technologies/cookieschromecache_97.4.drfalse
  • URL Reputation: safe
  • URL Reputation: safe
unknown
https://policies.google.com/termschromecache_97.4.drfalse
  • URL Reputation: safe
unknown
https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=chromecache_103.4.drfalse
  • URL Reputation: safe
unknown
https://www.google.comchromecache_97.4.drfalseunknown
https://play.google.com/log?format=json&hasfast=truechromecache_97.4.drfalseunknown
https://www.youtube.com/t/terms?chromeless=1&hl=chromecache_97.4.drfalseunknown
https://support.google.com/accounts?hl=chromecache_97.4.drfalse
  • URL Reputation: safe
unknown
https://policies.google.com/terms/locationchromecache_97.4.drfalse
  • URL Reputation: safe
unknown
https://policies.google.com/privacychromecache_97.4.drfalse
  • URL Reputation: safe
unknown
https://support.google.com/accounts?p=new-si-uichromecache_97.4.drfalse
  • URL Reputation: safe
unknown
https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessagechromecache_97.4.drfalse
  • URL Reputation: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
142.250.185.78
youtube.comUnited States
15169GOOGLEUSfalse
142.250.185.110
youtube-ui.l.google.comUnited States
15169GOOGLEUSfalse
239.255.255.250
unknownReserved
unknownunknownfalse
142.250.186.164
www.google.comUnited States
15169GOOGLEUSfalse
142.250.184.228
unknownUnited States
15169GOOGLEUSfalse
172.217.16.142
www3.l.google.comUnited States
15169GOOGLEUSfalse
IP
192.168.2.5
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1523122
Start date and time:2024-10-01 06:16:07 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 35s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:10
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:file.exe
Detection:MAL
Classification:mal64.evad.winEXE@31/36@13/7
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 96%
  • Number of executed functions: 34
  • Number of non-executed functions: 315
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 142.250.186.142, 74.125.133.84, 142.250.184.227, 34.104.35.123, 142.250.186.170, 142.250.185.202, 142.250.186.42, 142.250.185.74, 142.250.181.234, 142.250.184.234, 142.250.185.138, 216.58.206.42, 142.250.186.74, 172.217.16.202, 142.250.186.106, 172.217.18.10, 142.250.185.170, 142.250.185.234, 142.250.185.106, 142.250.184.202, 172.217.18.3, 216.58.212.138, 216.58.212.170, 199.232.214.172, 192.229.221.95, 172.217.16.195, 142.251.5.84, 142.250.184.206
  • Excluded domains from analysis (whitelisted): clients1.google.com, fs.microsoft.com, accounts.google.com, content-autofill.googleapis.com, slscr.update.microsoft.com, fonts.gstatic.com, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, ocsp.digicert.com, edgedl.me.gvt1.com, update.googleapis.com, clients.l.google.com, www.gstatic.com, optimizationguide-pa.googleapis.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing disassembly code.
  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
No simulations
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
239.255.255.250https://u47113775.ct.sendgrid.net/ls/click?upn=u001.NLjCc2NrF5-2Fl1RHefgLH74dDCI-2FlQUMQCuknF0akr34-3DPZ74_Bz-2FoIC9YMuvgy8ZsoekpZ-2Fn96y0OCAueT5LjwQn-2FX25AbFWdd2iGOJMfOUDymLwSDnjLWUuKOfyExMHrLPQc6sWuvBEF4PT9PwlcB-2BK9NQmoQucfLOeGSzPQg4J-2Bvn2C-2FT7DBGI3L6HQml9TPdefbzANw58o8IwtiN3AMNw21dRhcIy1JE5InQL6ZhzyniB-2FPrKB2Vn9uUJ7Mm1QrvUZh95-2FIqg1tkHnn-2FLCgLCOHUCdp1zwu5x-2Fprfv3kPHwI33RA9-2FJGY9xYPl-2BGH4uHP30vXeaFOwuVkWjx1bpQcAiato1uxhbL8AJAqpgT-2Bg5yQp7xXBACsCORIJr0VehkYFdFdFkgZPx7KSQblwloMm5OUc-2B9bb1d0siCBq5u36Pp2iCgmhq5PmipxmWr1HvrLZkdUUXJjpaRdjjEopb-2Fhw3b-2BUOpmNbUIJywjWyMBcUA9ScKtkpotTga2qo5ZaX-2B7AVyqz8KXtUfTb8SopobzuOWPiU-2BhBa8i7lRIGGQBQZmYU1TWv5mQ8uRPPf-2FWdH9RREF8cMLDET4k24yu8dJdqteeATx8Jfw8MWOWehX6ZTxJWGswooAVOvW116fDJmFNO-2F-2BecR-2Fd9NmRwCYnnK4Bh3IM-3DGet hashmaliciousHTMLPhisherBrowse
    file.exeGet hashmaliciousUnknownBrowse
      file.exeGet hashmaliciousUnknownBrowse
        https://booking.com-partners.one/confirm/login/qAlElVVFGet hashmaliciousUnknownBrowse
          https://www.polorestobar.com/Get hashmaliciousUnknownBrowse
            https://jv.prenticeu.com/SAFlSIeECgRZt_tUKXhAOQHYyqb5e4/Get hashmaliciousHTMLPhisherBrowse
              file.exeGet hashmaliciousUnknownBrowse
                https://content.app-us1.com/1REPZ7/2024/09/30/ff91983f-ef4d-4288-b1e8-8d1ab94f757b.pdfGet hashmaliciousHTMLPhisherBrowse
                  file.exeGet hashmaliciousUnknownBrowse
                    file.exeGet hashmaliciousUnknownBrowse
                      No context
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      28a2c9bd18a11de089ef85a160da29e4https://u47113775.ct.sendgrid.net/ls/click?upn=u001.NLjCc2NrF5-2Fl1RHefgLH74dDCI-2FlQUMQCuknF0akr34-3DPZ74_Bz-2FoIC9YMuvgy8ZsoekpZ-2Fn96y0OCAueT5LjwQn-2FX25AbFWdd2iGOJMfOUDymLwSDnjLWUuKOfyExMHrLPQc6sWuvBEF4PT9PwlcB-2BK9NQmoQucfLOeGSzPQg4J-2Bvn2C-2FT7DBGI3L6HQml9TPdefbzANw58o8IwtiN3AMNw21dRhcIy1JE5InQL6ZhzyniB-2FPrKB2Vn9uUJ7Mm1QrvUZh95-2FIqg1tkHnn-2FLCgLCOHUCdp1zwu5x-2Fprfv3kPHwI33RA9-2FJGY9xYPl-2BGH4uHP30vXeaFOwuVkWjx1bpQcAiato1uxhbL8AJAqpgT-2Bg5yQp7xXBACsCORIJr0VehkYFdFdFkgZPx7KSQblwloMm5OUc-2B9bb1d0siCBq5u36Pp2iCgmhq5PmipxmWr1HvrLZkdUUXJjpaRdjjEopb-2Fhw3b-2BUOpmNbUIJywjWyMBcUA9ScKtkpotTga2qo5ZaX-2B7AVyqz8KXtUfTb8SopobzuOWPiU-2BhBa8i7lRIGGQBQZmYU1TWv5mQ8uRPPf-2FWdH9RREF8cMLDET4k24yu8dJdqteeATx8Jfw8MWOWehX6ZTxJWGswooAVOvW116fDJmFNO-2F-2BecR-2Fd9NmRwCYnnK4Bh3IM-3DGet hashmaliciousHTMLPhisherBrowse
                      • 4.175.87.197
                      • 184.28.90.27
                      file.exeGet hashmaliciousUnknownBrowse
                      • 4.175.87.197
                      • 184.28.90.27
                      file.exeGet hashmaliciousUnknownBrowse
                      • 4.175.87.197
                      • 184.28.90.27
                      https://booking.com-partners.one/confirm/login/qAlElVVFGet hashmaliciousUnknownBrowse
                      • 4.175.87.197
                      • 184.28.90.27
                      https://www.polorestobar.com/Get hashmaliciousUnknownBrowse
                      • 4.175.87.197
                      • 184.28.90.27
                      https://jv.prenticeu.com/SAFlSIeECgRZt_tUKXhAOQHYyqb5e4/Get hashmaliciousHTMLPhisherBrowse
                      • 4.175.87.197
                      • 184.28.90.27
                      file.exeGet hashmaliciousUnknownBrowse
                      • 4.175.87.197
                      • 184.28.90.27
                      https://content.app-us1.com/1REPZ7/2024/09/30/ff91983f-ef4d-4288-b1e8-8d1ab94f757b.pdfGet hashmaliciousHTMLPhisherBrowse
                      • 4.175.87.197
                      • 184.28.90.27
                      file.exeGet hashmaliciousUnknownBrowse
                      • 4.175.87.197
                      • 184.28.90.27
                      file.exeGet hashmaliciousUnknownBrowse
                      • 4.175.87.197
                      • 184.28.90.27
                      No context
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 1 03:16:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                      Category:dropped
                      Size (bytes):2677
                      Entropy (8bit):3.973107534883377
                      Encrypted:false
                      SSDEEP:48:8VdnjTLTdfH5idAKZdA19ehwiZUklqehQy+3:8/jDdz/y
                      MD5:4031A8C4065ABA9F34C42538A2C0B022
                      SHA1:895F07EE6F9CBCC12F9E7B70B70E44C8981F7CEC
                      SHA-256:A767DA0EC8D6F57DA01E009866FBB4F0EEE807696BCF762394A1C8B28449205F
                      SHA-512:BFE82925003555D1D24DF4E545074354FDB9307B3ACC74B8398D8D68D7CD3F41DB54EF808B04F1B4D2A9CE1AD319FCB50EFB42187374D341E36AD037DCC48A1D
                      Malicious:false
                      Reputation:low
                      Preview:L..................F.@.. ...$+.,....16.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IAY."....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VAY."....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VAY."....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VAY."..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VAY "...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............1.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 1 03:16:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                      Category:dropped
                      Size (bytes):2679
                      Entropy (8bit):3.9915915736755836
                      Encrypted:false
                      SSDEEP:48:8ldnjTLTdfH5idAKZdA1weh/iZUkAQkqehvy+2:8vjDdB9QWy
                      MD5:6E17F5886A2F8FBBC2705D9EBF39AC8B
                      SHA1:B5185DBE4355E1BE8B3D6A3E848F6A1570A1CA45
                      SHA-256:598FF34F0BDEC4B609DD487C1733D9961B2C007A8A1B1C75D621BD4326C76B0E
                      SHA-512:5876CA0BCA417554A9D475AD883E3E7C721251736F5349126DA544BA403F98EF136363D02F9F7022C5309B3AAA499CB28C8FB47489020AF48E8F52072575A939
                      Malicious:false
                      Reputation:low
                      Preview:L..................F.@.. ...$+.,...........N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IAY."....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VAY."....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VAY."....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VAY."..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VAY "...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............1.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                      Category:dropped
                      Size (bytes):2693
                      Entropy (8bit):4.003164598438365
                      Encrypted:false
                      SSDEEP:48:8xMdnjTLTsH5idAKZdA14tseh7sFiZUkmgqeh7sdy+BX:8xgjDYnLy
                      MD5:1A781CDFAE62884CD68EEBA134C9C4E5
                      SHA1:F4E1C7976DB5F0C78FADAD872E60916FDE22BE7D
                      SHA-256:40B4DC5954BEE9DCB4884E1D5B91400D84607B728BF41FFB51658EE9573C59C8
                      SHA-512:B53D1830D30E6958879A7400B49476FB81E5B723B376923D2521BF7CF14D4A89B063A88F6178BDA43657A195C7161A15550759B0B0CF8F0E0CD1B19C1257A442
                      Malicious:false
                      Reputation:low
                      Preview:L..................F.@.. ...$+.,......e>....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IAY."....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VAY."....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VAY."....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VAY."..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VDW.n...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............1.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 1 03:16:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                      Category:dropped
                      Size (bytes):2681
                      Entropy (8bit):3.9920520151611965
                      Encrypted:false
                      SSDEEP:48:8AdnjTLTdfH5idAKZdA1vehDiZUkwqehjy+R:8EjDdiVy
                      MD5:A106B9AE5A0392F11FA5947C551A4AB6
                      SHA1:5DC8548877774FC952048D784FD06E50614B8281
                      SHA-256:7622CA6AC1A6B73DC1B5C3E49CA37412EBD245DC3D07F82FC2C6F9CAB7D5A3CC
                      SHA-512:F6D76BD9211E218A7F8E94265C934C0D3EC152631F385C3F605E174FF22E5701BC6A6FFE33EF389C3103F55C06CC0E2351DA8E601DDEA6267FCEB4E1E6E5B2A7
                      Malicious:false
                      Reputation:low
                      Preview:L..................F.@.. ...$+.,....Q#......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IAY."....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VAY."....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VAY."....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VAY."..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VAY "...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............1.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 1 03:16:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                      Category:dropped
                      Size (bytes):2681
                      Entropy (8bit):3.9809035011998803
                      Encrypted:false
                      SSDEEP:48:8TdnjTLTdfH5idAKZdA1hehBiZUk1W1qehJy+C:81jDdS9py
                      MD5:8BF99209ED2A5A2BF8D6010605AA3C5B
                      SHA1:66D9D7BC7DDAF51A910BC0954EF82E8916C9CB28
                      SHA-256:BECE39ECCCDC0D579F7519D0D61E4999BC15D65BE0598599DF039CB8857E60C0
                      SHA-512:DB22CA3A56E71DA65E6BFBA413C103D4E6C6F02B7F570F6D7778EB5B942EF80E2E3DFC59B12D80AE1CB9F6B2D8186C06C069858B42AC288F86C390C5A27B6CA1
                      Malicious:false
                      Reputation:low
                      Preview:L..................F.@.. ...$+.,....}q.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IAY."....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VAY."....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VAY."....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VAY."..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VAY "...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............1.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 1 03:16:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                      Category:dropped
                      Size (bytes):2683
                      Entropy (8bit):3.9876281893727277
                      Encrypted:false
                      SSDEEP:48:8TdnjTLTdfH5idAKZdA1duT+ehOuTbbiZUk5OjqehOuTbLy+yT+:81jDdMT/TbxWOvTbLy7T
                      MD5:13492FDC1657527D228FE34737BBB034
                      SHA1:DD5F36A3C16158EB5E0C2B5A327D4777A8EE6733
                      SHA-256:F7A4850EB3D56337748FAA9A6367C8793AEE0228CED401C8EE08F02EC98B595F
                      SHA-512:BE91D8E4B4C646336BB200EE5DEC5E6C29EC5980A02E24F03E61FB52CA673B8CF9476ABFEAF7BD343C46939C75601B7D5C92D5CE42AA7535F22D1F62B0317E92
                      Malicious:false
                      Reputation:low
                      Preview:L..................F.@.. ...$+.,....5.......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IAY."....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VAY."....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VAY."....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VAY."..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VAY "...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............1.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (3346)
                      Category:downloaded
                      Size (bytes):22827
                      Entropy (8bit):5.420322672717721
                      Encrypted:false
                      SSDEEP:384:/jqdWXWfyA20UUjDE8BSUxDJs16KHvSN34kaHaN+587SaXD2mLR0H:/jqdWXAUUjDE84Wi6KPSKjHaN+58+0J2
                      MD5:2B29741A316862EE788996DD29116DD5
                      SHA1:9D5551916D4452E977C39B8D69CF88DF2AAA462B
                      SHA-256:62955C853976B722EFBB4C116A10DB3FF54580EDD7495D280177550B8F4289AB
                      SHA-512:6E37C3258F07F29909763728DADE0CD40A3602D55D9099F78B37756926FCF2A50008B82876B518FEAF3E56617F0F7D1D37A73C346A99A58E6AD8BCD6689E9B15
                      Malicious:false
                      Reputation:moderate, very likely benign file
                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBimEQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGbG-r9dBZftM0U0ZDPTNCqugT4jw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=RqjULd"
                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.pu.prototype.da=_.ca(38,function(){return _.vj(this,3)});_.Vy=function(a,b){this.key=a;this.defaultValue=!1;this.flagName=b};_.Vy.prototype.ctor=function(a){return typeof a==="boolean"?a:this.defaultValue};_.Wy=function(){this.ka=!0;var a=_.Bj(_.jk(_.Fe("TSDtV",window),_.pya),_.pu,1,_.uj())[0];if(a){var b={};for(var c=_.n(_.Bj(a,_.qya,2,_.uj())),d=c.next();!d.done;d=c.next()){d=d.value;var e=_.Nj(d,1).toString();switch(_.xj(d,_.qu)){case 3:b[e]=_.Lj(d,_.pj(d,_.qu,3));break;case 2:b[e]=_.Nj(d,_.pj(d,_.qu,2));break;case 4:b[e]=_.Oj(d,_.pj(d,_.qu,4));break;case 5:b[e]=_.L(d,_.pj(d,_.qu,5));break;case 6:b[e]=_.Sj(d,_.kf,6,_.qu);break;default:throw Error("id`"+_.xj(d,_.qu));}}}else b={};this.ea=b;this.token=.a?a.da():null};_.Wy.prototype.aa=function(a){if(!this.ka||a.key in this.ea)a=a.ctor(this.ea[a.key]);else if(_.Fe("nQyAE",window)){var b=_.sya(a.flagName);if(b===null)a=a.def
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (522)
                      Category:downloaded
                      Size (bytes):5049
                      Entropy (8bit):5.317800104741948
                      Encrypted:false
                      SSDEEP:96:oHX9gPiPrfnHhsB0TR6kg1oDPJzLmM18Vh1z2fEZ54TZtnqj6w:EtEAr6BmPZtOeEvW/ncP
                      MD5:CE53EF566B68CCF2D62FA044CFB0D138
                      SHA1:F48EC60289F2B55E8B388601206888F8295B1EB1
                      SHA-256:E6CC5114D92811D5DE0663266D4B63F367834AFA0FC3BAFA54F707038C59D010
                      SHA-512:20B434881DE971E263669E6096C01665D4D35B0FBFF47D312A4A442645EE962A8CE6AD7E68246D4EE9691BD30D9B1DDCF7059226492E1B58CD3191B63B001E4D
                      Malicious:false
                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBimEQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,iAskyc,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGbG-r9dBZftM0U0ZDPTNCqugT4jw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=wg1P6b"
                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.$Ma=_.y("wg1P6b",[_.OA,_.Fn,_.Rn]);._.k("wg1P6b");.var M5a;M5a=_.oh(["aria-"]);._.mJ=function(a){_.Y.call(this,a.Fa);this.Ja=this.ta=this.aa=this.viewportElement=this.La=null;this.Tc=a.Ea.qf;this.ab=a.Ea.focus;this.Lc=a.Ea.Lc;this.ea=this.Ei();a=-1*parseInt(_.Fo(this.Ei().el(),"marginTop")||"0",10);var b=parseInt(_.Fo(this.Ei().el(),"marginBottom")||"0",10);this.Ta={top:a,right:0,bottom:b,left:0};a=_.gf(this.getData("isMenuDynamic"),!1);b=_.gf(this.getData("isMenuHoisted"),!1);this.Ga=a?1:b?2:0;this.ka=!1;this.Ca=1;this.Ga!==1&&(this.aa=this.Sa("U0exHf").children().Sc(0),_.fu(this,.N5a(this,this.aa.el())));_.mF(this.oa())&&(a=this.oa().el(),b=this.De.bind(this),a.__soy_skip_handler=b)};_.J(_.mJ,_.Y);_.mJ.Ba=function(){return{Ea:{qf:_.SE,focus:_.BE,Lc:_.mu}}};_.mJ.prototype.pF=function(a){var b=a.source;this.La=b;var c;((c=a.data)==null?0:c.Jy)?(a=a.data.Jy,this.Ca=a==="MOUS
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with no line terminators
                      Category:downloaded
                      Size (bytes):84
                      Entropy (8bit):4.875266466142591
                      Encrypted:false
                      SSDEEP:3:DZFJu0+WVTBCq2Bjdw2KsJJuYHSKnZ:lFJuuVTBudw29nu4SKZ
                      MD5:87B6333E98B7620EA1FF98D1A837A39E
                      SHA1:105DE6815B0885357DE1414BFC0D77FCC9E924EF
                      SHA-256:DCD3C133C5C40BECD4100BBE6EDAE84C9735E778E4234A5E8395C56FF8A733BA
                      SHA-512:867D7943D813685FAA76394E53199750C55817E836FD19C933F74D11E9657CE66719A6D6B2E39EE1DE62358BCE364E38A55F4E138DF92337DE6985DDCD5D0994
                      Malicious:false
                      URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISHgmA6QC9dWevzxIFDRkBE_oSBQ3oIX6GEgUN05ioBw==?alt=proto
                      Preview:Cj0KBw0ZARP6GgAKKQ3oIX6GGgQISxgCKhwIClIYCg5AIS4jJF8qLSY/Ky8lLBABGP////8PCgcN05ioBxoA
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (553)
                      Category:downloaded
                      Size (bytes):603951
                      Entropy (8bit):5.789949489744101
                      Encrypted:false
                      SSDEEP:3072:x0pApkygA62bwwdnO2YflNYhFGOizdGj008PpVVM96C5bMEPQUhts6FV8eKqtVAT:xlgNmwwdnOsF98oNGuQRAYqXsI1+
                      MD5:036BC6CEC1912EAA63C716C2A7494AFC
                      SHA1:C32891F55B0D7A86DCE1BDBB7B84DB21C2A09F4F
                      SHA-256:1A6181C3DFAEE5919CE57152DCFFCDC4B151C5FB2969CFD62168C1711FF202CF
                      SHA-512:0AAA2285D109114921B5FD8A15F9A3D1F218AF8C61054B3925965E6753F8A49B45798326EA986C4A6B6180B6C36292A4652E2BA730C7505684DAAA4B5C314675
                      Malicious:false
                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/am=xIFgKBimEQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/excm=_b,_tp,identifierview/ed=1/dg=0/wt=2/ujg=1/rs=AOaEmlGsNipZrCRRMFQh1-tVmHSsIDzQTA/m=_b,_tp"
                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._._F_toggles_initialize=function(a){(typeof globalThis!=="undefined"?globalThis:typeof self!=="undefined"?self:this)._F_toggles=a||[]};(0,_._F_toggles_initialize)([0x286081c4, 0x20469860, 0x1ce13c40, 0x51407a0, 0x1908, 0x0, 0x1b400000, 0x19a00000, 0x0, ]);./*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright Google LLC. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright 2024 Google, Inc. SPDX-License-Identifier: MIT.*/./*. SPDX-License-Identifier: Apache-2.0.*/./*. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/.var baa,daa,Na,Ua,gaa,iaa,lb,qaa,xaa,Daa,Iaa,Laa,Mb,Maa,Rb,Vb,Wb,Naa,Oaa,Xb,Paa,Qaa,Raa,ac,Waa,Yaa,ic,jc,kc,cba,dba,hba,kba,mba,nba,rba,uba,oba,tba,sba,qba,pba,vba,zba,Dba,Eba,Bba,Kc,Lc,Hba,Jba,Nba,Oba,Pba,Qba,Mba,Rba,Tba,gd,Vba,Wba,Yba,$ba,Zba,bca,cca,dca,eca,gca,fca,ica,jca,kca,lca,oca,r
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (755)
                      Category:downloaded
                      Size (bytes):1460
                      Entropy (8bit):5.316515499943097
                      Encrypted:false
                      SSDEEP:24:kMYD7DduJqrxsNL90YIzFK/Hb5eNhz1uktdDuvKKKGbLZ99GbSSF/ZR8OkdnprGJ:o7DQJopFN+ASCKKGbF99GbSS3RY7rw
                      MD5:D97AB4594FC610665FF2763A650EE6A8
                      SHA1:5C7459CA838D27BE45745571D8D96D156F4B9F8D
                      SHA-256:767D778369623FD8F5FB98D3BCC3130D05D02CBE0B9B88DD226F43281B14E9AF
                      SHA-512:CE4941B41C3A8CC983C1BBCC87EF682823CB9DB24EA7A570E35BBF832046340D433F7D47211384B61FA38F3527CC35C195A6068CCB24B48E1F492C5B4D4192A1
                      Malicious:false
                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBimEQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGbG-r9dBZftM0U0ZDPTNCqugT4jw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=P6sQOc"
                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("lOO0Vd");._.HZa=new _.uf(_.Km);._.l();._.k("P6sQOc");.var MZa=!!(_.Nh[1]&16);var OZa=function(a,b,c,d,e){this.ea=a;this.ta=b;this.ka=c;this.Ca=d;this.Ga=e;this.aa=0;this.da=NZa(this)},PZa=function(a){var b={};_.Ma(a.hS(),function(e){b[e]=!0});var c=a.WR(),d=a.cS();return new OZa(a.XO(),c.aa()*1E3,a.oR(),d.aa()*1E3,b)},NZa=function(a){return Math.random()*Math.min(a.ta*Math.pow(a.ka,a.aa),a.Ca)},HG=function(a,b){return a.aa>=a.ea?!1:b!=null?!!a.Ga[b]:!0};var IG=function(a){_.X.call(this,a.Fa);this.da=a.Ea.mV;this.ea=a.Ea.metadata;a=a.Ea.lga;this.fetch=a.fetch.bind(a)};_.J(IG,_.X);IG.Ba=function(){return{Ea:{mV:_.KZa,metadata:_.HZa,lga:_.AZa}}};IG.prototype.aa=function(a,b){if(this.ea.getType(a.Md())!==1)return _.Vm(a);var c=this.da.JU;return(c=c?PZa(c):null)&&HG(c)?_.mya(a,QZa(this,a,b,c)):_.Vm(a)};.var QZa=function(a,b,c,d){return c.then(function(e){return e},function(e)
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (533)
                      Category:downloaded
                      Size (bytes):9210
                      Entropy (8bit):5.3872171131917925
                      Encrypted:false
                      SSDEEP:192:FK/pAzN7GZ068Hqhqu6DQaVapzYjgKItwdiwUsYRTi1j1t9bRl9:FqI7GZ04dRYjghtgisYYbt9ll9
                      MD5:AB70454DE18E1CE16E61EAC290FC304D
                      SHA1:68532B5E8B262D7E14B8F4507AA69A61146B3C18
                      SHA-256:B32D746867CC4FA21FD39437502F401D952D0A3E8DC708DFB7D58B85F256C0F1
                      SHA-512:A123C517380BEF0B47F23A5A6E1D16650FE39D9C701F9FA5ADD79294973C118E8EA3A7BA32CB63C3DFC0CE0F843FB86BFFCAA2AAE987629E7DFF84F176DEBB98
                      Malicious:false
                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBimEQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PrPYRd,Rkm0ef,SCuOPb,STuCOe,SpsfSb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,byfTOb,cYShmd,eVCnO,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,qPfo0c,qmdT9,rCcCxc,siKnQd,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGbG-r9dBZftM0U0ZDPTNCqugT4jw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ltDFwf,SD8Jgb,rmumx,E87wgc,qPYxq,Tbb4sb,pxq3x,f8Gu1e,soHxf,YgOFye,yRXbo,bTi8wc,ywOR5c,PHUIyb"
                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.gNa=_.y("SD8Jgb",[]);._.QX=function(a,b){if(typeof b==="string")a.Nc(b);else if(b instanceof _.Ip&&b.ia&&b.ia===_.B)b=_.$a(b.ww()),a.empty().append(b);else if(b instanceof _.Wa)b=_.$a(b),a.empty().append(b);else if(b instanceof Node)a.empty().append(b);else throw Error("Vf");};_.RX=function(a){var b=_.Lo(a,"[jsslot]");if(b.size()>0)return b;b=new _.Jo([_.Qk("span")]);_.Mo(b,"jsslot","");a.empty().append(b);return b};_.TKb=function(a){return a===null||typeof a==="string"&&_.Ki(a)};._.k("SD8Jgb");._.WX=function(a){_.Y.call(this,a.Fa);this.Ua=a.controller.Ua;this.kd=a.controllers.kd[0]||null;this.header=a.controller.header;this.nav=a.controller.nav;var b;(b=this.oa().find("button:not([type])").el())==null||b.setAttribute("type","button")};_.J(_.WX,_.Y);_.WX.Ba=function(){return{controller:{Ua:{jsname:"n7vHCb",ctor:_.hv},header:{jsname:"tJHJj",ctor:_.hv},nav:{jsname:"DH6Rkf",ct
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (683)
                      Category:downloaded
                      Size (bytes):3131
                      Entropy (8bit):5.3750044852869046
                      Encrypted:false
                      SSDEEP:48:o7zfN/cD498xdg+Y5jNQ8js6npwk0OmNAEZbpMzR4EQBcW5QcHj9KWfGAeFKRrw:oCD9dA5jOEGh+EFqR4rhqUhzff9w
                      MD5:39693D34EE3D1829DBB1627C4FC6687B
                      SHA1:A03303C2F027F3749B48D5134D1F8FB3E495C6E9
                      SHA-256:03B0C1B4E402E0BCF75D530DD9085B25357EEFD09E238453DE1F3A042542C076
                      SHA-512:AC0749EDC33DA0EC0E40470388DD797B6528AD08B8FAC1C2AC42F85198131052BA1B533E90409D35DA237607E8B07D591FA6BA580B6A90B0D0AB2282A01F7585
                      Malicious:false
                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBimEQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGbG-r9dBZftM0U0ZDPTNCqugT4jw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ZwDk9d,RMhBfe"
                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("ZwDk9d");.var bA=function(a){_.X.call(this,a.Fa)};_.J(bA,_.X);bA.Ba=_.X.Ba;bA.prototype.wR=function(a){return _.af(this,{Wa:{HS:_.ol}}).then(function(b){var c=window._wjdd,d=window._wjdc;return!c&&d?new _.oi(function(e){window._wjdc=function(f){d(f);e(PJa(f,b,a))}}):PJa(c,b,a)})};var PJa=function(a,b,c){return(a=a&&a[c])?a:b.Wa.HS.wR(c)};.bA.prototype.aa=function(a,b){var c=_.csa(b).Gj;if(c.startsWith("$")){var d=_.jm.get(a);_.xq[b]&&(d||(d={},_.jm.set(a,d)),d[c]=_.xq[b],delete _.xq[b],_.yq--);if(d)if(a=d[c])b=_.ef(a);else throw Error("Jb`"+b);else b=null}else b=null;return b};_.iu(_.Mfa,bA);._.l();._.k("SNUn3");._.OJa=new _.uf(_.Ag);._.l();._.k("RMhBfe");.var QJa=function(a){var b=_.wq(a);return b?new _.oi(function(c,d){var e=function(){b=_.wq(a);var f=_.Tfa(a,b);f?c(f.getAttribute("jsdata")):window.document.readyState=="complete"?(f=["Unable to find deferred jsdata wit
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (1694)
                      Category:downloaded
                      Size (bytes):32499
                      Entropy (8bit):5.361345284201954
                      Encrypted:false
                      SSDEEP:768:mLX1O+aL6fgyIiREM4RKmh90toLoTswtF3ATcbDR6kIsnJd9DPyMv/FI:U2M4oltoLoTswtFoc/tIsnXFLI
                      MD5:D5C3FB8EAE24AB7E40009338B5078496
                      SHA1:5638BF5986A6445A88CD79A9B690B744B126BEC2
                      SHA-256:597C14D360D690BCFDC2B8D315E6BB8879AEF33DE6C30D274743079BDB63C6B0
                      SHA-512:6AE434850D473BEF15AA694AB4862596982CDDA6BD3991991D3ADD8F4A5F61DFBF8756D0DA98B72EF083909D68CF7B6B148A6488E9381F92FBF15CCB20176A0E
                      Malicious:false
                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBimEQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=_b,_tp/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGbG-r9dBZftM0U0ZDPTNCqugT4jw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=byfTOb,lsjVmc,LEikZe"
                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{.var qua=function(a,b){this.da=a;this.ea=b;if(!c){var c=new _.gp("//www.google.com/images/cleardot.gif");_.rp(c)}this.ka=c};_.h=qua.prototype;_.h.Vc=null;_.h.QY=1E4;_.h.Iz=!1;_.h.TP=0;_.h.qJ=null;_.h.DU=null;_.h.setTimeout=function(a){this.QY=a};_.h.start=function(){if(this.Iz)throw Error("dc");this.Iz=!0;this.TP=0;rua(this)};_.h.stop=function(){sua(this);this.Iz=!1};.var rua=function(a){a.TP++;navigator!==null&&"onLine"in navigator&&!navigator.onLine?_.om((0,_.eg)(a.JG,a,!1),0):(a.aa=new Image,a.aa.onload=(0,_.eg)(a.Xia,a),a.aa.onerror=(0,_.eg)(a.Wia,a),a.aa.onabort=(0,_.eg)(a.Via,a),a.qJ=_.om(a.Yia,a.QY,a),a.aa.src=String(a.ka))};_.h=qua.prototype;_.h.Xia=function(){this.JG(!0)};_.h.Wia=function(){this.JG(!1)};_.h.Via=function(){this.JG(!1)};_.h.Yia=function(){this.JG(!1)};._.h.JG=function(a){sua(this);a?(this.Iz=!1,this.da.call(this.ea,!0)):this.TP<=0?rua(this):(this.Iz=!1,
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (395)
                      Category:downloaded
                      Size (bytes):1608
                      Entropy (8bit):5.280977407061266
                      Encrypted:false
                      SSDEEP:48:o7YNJvl3WlENrpB3stYCIgMxILNH/wf7DVTBpdQrw:oApB8iDwYlGw
                      MD5:4FB66582D37D04933F00E49C2FBA34D4
                      SHA1:3DB09C53BBEB1EEB045A001356E498D8EF30915D
                      SHA-256:A97DAC01ABFE3EB75C7C97D504E21BDDDADDB6EBE0B56B6A9A10CD3700CAB41B
                      SHA-512:2AEB3A6CFFBF6EFA626EBDC9E11ACBAC04BFE986F98FBC050B2501898B289C67D392ED195D16ACC9565EF8784401ADA1E88188CDE3A7AB12D98BB5ED7D8A5711
                      Malicious:false
                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBimEQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGbG-r9dBZftM0U0ZDPTNCqugT4jw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=w9hDv,ZDZcre,A7fCU"
                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("w9hDv");._.zg(_.Kla);_.$z=function(a){_.X.call(this,a.Fa);this.aa=a.Wa.cache};_.J(_.$z,_.X);_.$z.Ba=function(){return{Wa:{cache:_.Zs}}};_.$z.prototype.execute=function(a){_.Gb(a,function(b){var c;_.df(b)&&(c=b.eb.jc(b.jb));c&&this.aa.oG(c)},this);return{}};_.iu(_.Qla,_.$z);._.l();._.k("ZDZcre");.var ZG=function(a){_.X.call(this,a.Fa);this.Nl=a.Ea.Nl;this.G3=a.Ea.metadata;this.aa=a.Ea.Ws};_.J(ZG,_.X);ZG.Ba=function(){return{Ea:{Nl:_.DG,metadata:_.HZa,Ws:_.AG}}};ZG.prototype.execute=function(a){var b=this;a=this.aa.create(a);return _.Gb(a,function(c){var d=b.G3.getType(c.Md())===2?b.Nl.Pb(c):b.Nl.fetch(c);return _.Jl(c,_.EG)?d.then(function(e){return _.Jd(e)}):d},this)};_.iu(_.Vla,ZG);._.l();._.k("K5nYTd");._.GZa=new _.uf(_.Rla);._.l();._.k("sP4Vbe");.._.l();._.k("kMFpHd");.._.l();._.k("A7fCU");.var GG=function(a){_.X.call(this,a.Fa);this.aa=a.Ea.ZP};_.J(GG,_.X);GG.Ba=func
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:HTML document, ASCII text, with very long lines (681)
                      Category:downloaded
                      Size (bytes):4070
                      Entropy (8bit):5.362700670482359
                      Encrypted:false
                      SSDEEP:96:GUpT+TmXtdW1qsHFcn7t7CnyWYvNTcLaQOw:lpT+qXW1PFcn7tGnyWY1TGb
                      MD5:ED368A20CB303C0E7C6A3E6E43C2E14F
                      SHA1:429A5C538B45221F80405163D1F87912DD73C05A
                      SHA-256:93BA77AD4B11E0A70C0D36576F0DF24E27F50001EA02BAA6D357E034532D97F2
                      SHA-512:DE74BBADE910475DD245FFEFD4E1FD10137DE710B1C920D33BA52554911496E1339EF3C1F6D9D315CBC98A60ABE5687A3E7D8BEE483708E18D25722E794BDBE9
                      Malicious:false
                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBimEQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGbG-r9dBZftM0U0ZDPTNCqugT4jw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=sOXFj,q0xTif,ZZ4WUe"
                      Preview:"use strict";_F_installCss(".N7rBcd{overflow-x:auto}sentinel{}");.this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.zg(_.dqa);._.k("sOXFj");.var ou=function(a){_.X.call(this,a.Fa)};_.J(ou,_.X);ou.Ba=_.X.Ba;ou.prototype.aa=function(a){return a()};_.iu(_.cqa,ou);._.l();._.k("oGtAuc");._.oya=new _.uf(_.dqa);._.l();._.k("q0xTif");.var iza=function(a){var b=function(d){_.Zn(d)&&(_.Zn(d).Gc=null,_.yu(d,null));d.XyHi9&&(d.XyHi9=null)};b(a);a=a.querySelectorAll("[c-wiz]");for(var c=0;c<a.length;c++)b(a[c])},Ku=function(a){_.et.call(this,a.Fa);this.Qa=this.dom=null;if(this.Vk()){var b=_.Jm(this.Mg(),[_.Om,_.Nm]);b=_.ri([b[_.Om],b[_.Nm]]).then(function(c){this.Qa=c[0];this.dom=c[1]},null,this);_.cu(this,b)}this.Ra=a.Xl.Hda};_.J(Ku,_.et);Ku.Ba=function(){return{Xl:{Hda:function(a){return _.Ye(a)}}}};Ku.prototype.yp=function(a){return this.Ra.yp(a)};.Ku.prototype.getData=function(a){return this.Ra.getData(a)};Ku.prototype.vp=function(){_.Ft(this.d
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                      Category:downloaded
                      Size (bytes):5430
                      Entropy (8bit):3.6534652184263736
                      Encrypted:false
                      SSDEEP:48:wIJct3xIAxG/7nvWDtZcdYLtX7B6QXL3aqG8Q:wIJct+A47v+rcqlBPG9B
                      MD5:F3418A443E7D841097C714D69EC4BCB8
                      SHA1:49263695F6B0CDD72F45CF1B775E660FDC36C606
                      SHA-256:6DA5620880159634213E197FAFCA1DDE0272153BE3E4590818533FAB8D040770
                      SHA-512:82D017C4B7EC8E0C46E8B75DA0CA6A52FD8BCE7FCF4E556CBDF16B49FC81BE9953FE7E25A05F63ECD41C7272E8BB0A9FD9AEDF0AC06CB6032330B096B3702563
                      Malicious:false
                      URL:https://www.google.com/favicon.ico
                      Preview:............ .h...&... .... .........(....... ..... ............................................0...................................................................................................................................v.].X.:.X.:.r.Y........................................q.X.S.4.S.4.S.4.S.4.S.4.S.4...X....................0........q.W.S.4.X.:.................J...A...g.........................K.H.V.8..........................F..B.....................,.......................................B..............................................B..B..B..B..B...u..........................................B..B..B..B..B...{.................5.......k...........................................................7R..8F.................................................2........Vb..5C..;I..................R^.....................0................Xc..5C..5C..5C..5C..5C..5C..lv..........................................]i..<J..:G..Zf....................................................
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
                      Category:downloaded
                      Size (bytes):52280
                      Entropy (8bit):7.995413196679271
                      Encrypted:true
                      SSDEEP:1536:1rvqtK8DZilXxwJ8mMwAZy7phqsFLdG3B4d:xytBZits8bw4wzbFxG3B4d
                      MD5:F61F0D4D0F968D5BBA39A84C76277E1A
                      SHA1:AA3693EA140ECA418B4B2A30F6A68F6F43B4BEB2
                      SHA-256:57147F08949ABABE7DEEF611435AE418475A693E3823769A25C2A39B6EAD9CCC
                      SHA-512:6C3BD90F709BCF9151C9ED9FFEA55C4F6883E7FDA2A4E26BF018C83FE1CFBE4F4AA0DB080D6D024070D53B2257472C399C8AC44EEFD38B9445640EFA85D5C487
                      Malicious:false
                      URL:https://fonts.gstatic.com/s/googlesans/v58/4UaRrENHsxJlGDuGo1OIlJfC6l_24rlCK1Yo_Iq2vgCI.woff2
                      Preview:wOF2.......8.....................................^...$..4?HVAR..?MVAR9.`?STAT.*',..J/.......`..(..Z.0..R.6.$.... .....K..[..q..c..T.....>.P.j.`.w..#...%......N.".....$..3.0.6......... .L.rX/r[j.y.|*(.4.%#.....2.v.m..-..%.....;-.Y.{..&..O=#l@...k..7g..ZI...#.Z./+T..r7...M..3).Z%.x....s..sL..[A!.5*1w'/.8V..2Z..%.X.h.o.).]..9..Q`.$.....7..kZ.~O........d..g.n.d.Rw+&....Cz..uy#..fz,(.J....v.%..`..9.....h...?O..:...c%.....6s....xl..#...5..._......1.>.)"U.4 W....?%......6//!$...!.n9C@n...........!""^.....W..Z<.7.x.."UT.T....E.."R>.R..t.....H d..e_.K../.+8.Q.P.ZQ....;...U....]......._.e*......71.?.7.ORv.?...l...G|.P...|:...I.X..2.,.L........d.g.]}W#uW]QnuP-s.;.-Y.....].......C..j_.M0...y.......J..........NY..@A...,....-.F......'..w./j5g.vUS...U..0.&...y7.LP.....%.....Y......Y..D. e.A..G.?.$.......6...eaK.n5.m...N...,...+BCl..L> .E9~.b[.w.x....6<...}.e...%V....O.......*.?...a..#[eE.4..p..$...].....%......o._......N.._~..El....b..A.0.r8.....|..D.d..
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (5693)
                      Category:downloaded
                      Size (bytes):697429
                      Entropy (8bit):5.593310312179182
                      Encrypted:false
                      SSDEEP:6144:TYNlxfbDTYDhzCTNoygVWyJb5eGpbL2Mp15gI8seqfh53p+rrvV7i:T25bDTYB+qeGB+Nu
                      MD5:92F0F5E28355D863ACB77313F1E675DE
                      SHA1:8AD6F9B535D5B8952A4ADCCC57E4A4E0723F1E8D
                      SHA-256:F903AE346609A2872554A3D8FFBDB1836CB5C8B7AAAED4C3F8296B887E03D833
                      SHA-512:0C81A6CD850C6ACDBE9CCCBA00BBA34CDE1E09E8572814AE8E55DBED3C2B56F0B020359841F8217843B3403847DF46FA1C82229684F762A73C8110CE45898DAF
                      Malicious:false
                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBimEQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=LEikZe,_b,_tp,byfTOb,lsjVmc/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGbG-r9dBZftM0U0ZDPTNCqugT4jw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=n73qwf,SCuOPb,IZT63,vfuNJf,UUJqVe,ws9Tlc,siKnQd,XVq9Qb,STuCOe,njlZCf,m9oV,vjKJJ,y5vRwf,iyZMqd,NTMZac,mzzZzc,rCcCxc,vvMGie,K1ZKnb,ziZ8Mc,b3kMqb,mvkUhe,CMcBD,Fndnac,t2srLd,EN3i8d,z0u0L,xiZRqc,NOeYWe,O6y8ed,L9OGUe,PrPYRd,MpJwZc,qPfo0c,cYShmd,hc6Ubd,Rkm0ef,KUM7Z,oLggrd,inNHtf,L1AAkb,WpP9Yc,lwddkf,gJzDyc,SpsfSb,aC1iue,tUnxGc,aW3pY,ZakeSe,EFQ78c,xQtZb,I6YDgd,zbML3c,zr1jrb,vHEMJe,YHI3We,YTxL4,bSspM,Uas9Hd,zy0vNb,K0PMbc,AvtSve,qmdT9,MY7mZe,xBaz7b,GwYlN,eVCnO,EIOG1e,LDQI"
                      Preview:"use strict";_F_installCss(".r4WGQb{position:relative}.Dl08I>:first-child{margin-top:0}.Dl08I>:last-child{margin-bottom:0}.IzwVE{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-family:\"Google Sans\",roboto,\"Noto Sans Myanmar UI\",arial,sans-serif;font-size:1.25rem;font-weight:400;letter-spacing:0rem;line-height:1.2}.l5PPKe{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-size:1rem}.l5PPKe .dMNVAe{margin:0;padding:0}.l5PPKe>:first-child{margin-top:0;padding-top:0}.l5PPKe>:last-child{margin-bottom:0;padding-bottom:0}.Dl08I{margin:0;padding:0;position:relative}.Dl08I>.SmR8:only-child{padding-top:1px}.Dl08I>.SmR8:only-child::before{top:0}.Dl08I>.SmR8:not(first-child){padding-bottom:1px}.Dl08I>.SmR8::after{bottom:0}.Dl08I>.SmR8:only-child::before,.Dl08I>.SmR8::after{border-bottom:1px solid #c4c7c5;border-bottom:1px solid var(--gm3-sys-color-outline-variant,#c4c7c5);content:\"\";height:0;left:0;position:absolute;width:100%}.aZvCDf{margin-top:8px;margin-left
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (569)
                      Category:downloaded
                      Size (bytes):3471
                      Entropy (8bit):5.5174491302699495
                      Encrypted:false
                      SSDEEP:96:ojAmjTJ/fJgpIcB7Fd2tilGBEMO/A6VxV08w:vUTJpgDJXM0ApJ
                      MD5:2D999C87DD54C7FE6400D267C33FBB23
                      SHA1:414C3A329C2760325EDBACBD7A221D7F8DBFEEE8
                      SHA-256:76D55A1AFC1D39CB04D60EB04E45A538A0E75EE2871561C84CC89B1C13596BCC
                      SHA-512:72D923BB71DD147139962FF8E2BD0E336E0F6409C212AC2F25387D0F3B4FC9365F5A6D40E2980BB1065534888362C97D6B7663E362D29166B5915D2A9DA7D238
                      Malicious:false
                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBimEQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,iAskyc,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,wg1P6b,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGbG-r9dBZftM0U0ZDPTNCqugT4jw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=Wt6vjf,hhhU8,FCpbqb,WhJNk"
                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("Wt6vjf");.var Txa=function(){var a=_.Ke();return _.L(a,1)},Tt=function(a){this.Da=_.t(a,0,Tt.messageId)};_.J(Tt,_.w);Tt.prototype.Ha=function(){return _.Hj(this,1)};Tt.prototype.Va=function(a){return _.Yj(this,1,a)};Tt.messageId="f.bo";var Ut=function(){_.km.call(this)};_.J(Ut,_.km);Ut.prototype.ud=function(){this.jT=!1;Uxa(this);_.km.prototype.ud.call(this)};Ut.prototype.aa=function(){Vxa(this);if(this.hC)return Wxa(this),!1;if(!this.sV)return Vt(this),!0;this.dispatchEvent("p");if(!this.fP)return Vt(this),!0;this.jM?(this.dispatchEvent("r"),Vt(this)):Wxa(this);return!1};.var Xxa=function(a){var b=new _.gp(a.z4);a.WP!=null&&_.Mn(b,"authuser",a.WP);return b},Wxa=function(a){a.hC=!0;var b=Xxa(a),c="rt=r&f_uid="+_.sk(a.fP);_.fn(b,(0,_.eg)(a.ea,a),"POST",c)};.Ut.prototype.ea=function(a){a=a.target;Vxa(this);if(_.jn(a)){this.RJ=0;if(this.jM)this.hC=!1,this.dispatchEvent("r")
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (468)
                      Category:downloaded
                      Size (bytes):1858
                      Entropy (8bit):5.253939888205379
                      Encrypted:false
                      SSDEEP:48:o7BNJfeFb8L3A6FHqIy5Z+d70OCzSfvi/3fM/r8ZQzRrw:oFuILhFHrVCz0vLZz9w
                      MD5:10FF6F99E3228E96AFD6E2C30EF97C0A
                      SHA1:4AE3DCB8D1F5A0C302D5BAD9DFF5050A7A5E8130
                      SHA-256:95E5546E1C7F311D07BB5050CC456A973E43BCC4777BA6014757376016537679
                      SHA-512:116C0B1CAC98A27044100005545AB66BE5F4801D75DC259093A9F145B3A4ACD8DC1C360AF525F6DC8421CD54B675A78023D2ED8B57F5946A3969543758C673C9
                      Malicious:false
                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBimEQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGbG-r9dBZftM0U0ZDPTNCqugT4jw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=iAskyc,ziXSP"
                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("iAskyc");._.$Z=function(a){_.X.call(this,a.Fa);this.window=a.Ea.window.get();this.Mc=a.Ea.Mc};_.J(_.$Z,_.X);_.$Z.Ba=function(){return{Ea:{window:_.lu,Mc:_.vE}}};_.$Z.prototype.Mo=function(){};_.$Z.prototype.addEncryptionRecoveryMethod=function(){};_.a_=function(a){return(a==null?void 0:a.Go)||function(){}};_.b_=function(a){return(a==null?void 0:a.N2)||function(){}};_.OOb=function(a){return(a==null?void 0:a.Mp)||function(){}};._.POb=function(a){return new Map(Array.from(a,function(b){var c=_.n(b);b=c.next().value;c=c.next().value;return[b,c.map(function(d){return{epoch:d.epoch,key:new Uint8Array(d.key)}})]}))};_.QOb=function(a){setTimeout(function(){throw a;},0)};_.$Z.prototype.WN=function(){return!0};_.iu(_.Dn,_.$Z);._.l();._.k("ziXSP");.var t_=function(a){_.$Z.call(this,a.Fa)};_.J(t_,_.$Z);t_.Ba=_.$Z.Ba;t_.prototype.Mo=function(a,b,c){var d;if((d=this.window.chrome)==nu
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):6.579786707736145
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:file.exe
                      File size:917'504 bytes
                      MD5:01c227c31afb774df17ea789878018a4
                      SHA1:9db323a49e28f69730ca0bdbc31c3d7058342737
                      SHA256:ef8f1aec6f7dccd1d1a39f575a341e4b12981337ea3ac39c8cb00c22acfdc0a5
                      SHA512:e29f9076f1039b2fd7e6e4d470a243f78e0aef03570b05740390ac8683adcc31924209398fc8b83316fa020a98f0de79b8aa8316d2dd5d7709eb9bd9e688e746
                      SSDEEP:12288:FqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgagTs:FqDEvCTbMWu7rQYlBQcBiT6rprG8a4s
                      TLSH:F8159E0273D1C062FFAB92334B5AF6515BBC69260123E61F13981DB9BE701B1563E7A3
                      File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                      Icon Hash:aaf3e3e3938382a0
                      Entrypoint:0x420577
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                      Time Stamp:0x66FB7658 [Tue Oct 1 04:11:04 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:5
                      OS Version Minor:1
                      File Version Major:5
                      File Version Minor:1
                      Subsystem Version Major:5
                      Subsystem Version Minor:1
                      Import Hash:948cc502fe9226992dce9417f952fce3
                      Instruction
                      call 00007F9851286C43h
                      jmp 00007F985128654Fh
                      push ebp
                      mov ebp, esp
                      push esi
                      push dword ptr [ebp+08h]
                      mov esi, ecx
                      call 00007F985128672Dh
                      mov dword ptr [esi], 0049FDF0h
                      mov eax, esi
                      pop esi
                      pop ebp
                      retn 0004h
                      and dword ptr [ecx+04h], 00000000h
                      mov eax, ecx
                      and dword ptr [ecx+08h], 00000000h
                      mov dword ptr [ecx+04h], 0049FDF8h
                      mov dword ptr [ecx], 0049FDF0h
                      ret
                      push ebp
                      mov ebp, esp
                      push esi
                      push dword ptr [ebp+08h]
                      mov esi, ecx
                      call 00007F98512866FAh
                      mov dword ptr [esi], 0049FE0Ch
                      mov eax, esi
                      pop esi
                      pop ebp
                      retn 0004h
                      and dword ptr [ecx+04h], 00000000h
                      mov eax, ecx
                      and dword ptr [ecx+08h], 00000000h
                      mov dword ptr [ecx+04h], 0049FE14h
                      mov dword ptr [ecx], 0049FE0Ch
                      ret
                      push ebp
                      mov ebp, esp
                      push esi
                      mov esi, ecx
                      lea eax, dword ptr [esi+04h]
                      mov dword ptr [esi], 0049FDD0h
                      and dword ptr [eax], 00000000h
                      and dword ptr [eax+04h], 00000000h
                      push eax
                      mov eax, dword ptr [ebp+08h]
                      add eax, 04h
                      push eax
                      call 00007F98512892EDh
                      pop ecx
                      pop ecx
                      mov eax, esi
                      pop esi
                      pop ebp
                      retn 0004h
                      lea eax, dword ptr [ecx+04h]
                      mov dword ptr [ecx], 0049FDD0h
                      push eax
                      call 00007F9851289338h
                      pop ecx
                      ret
                      push ebp
                      mov ebp, esp
                      push esi
                      mov esi, ecx
                      lea eax, dword ptr [esi+04h]
                      mov dword ptr [esi], 0049FDD0h
                      push eax
                      call 00007F9851289321h
                      test byte ptr [ebp+08h], 00000001h
                      pop ecx
                      Programming Language:
                      • [ C ] VS2008 SP1 build 30729
                      • [IMP] VS2008 SP1 build 30729
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x95ac.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xde0000x7594.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0xd40000x95ac0x96005b025674bcfec55aa9cb6cbbd676e852False0.2860416666666667data5.163803617791762IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0xde0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                      RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                      RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                      RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                      RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                      RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                      RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                      RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                      RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                      RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                      RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                      RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                      RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                      RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                      RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                      RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                      RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                      RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                      RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                      RT_RCDATA0xdc7b80x874data1.005083179297597
                      RT_GROUP_ICON0xdd02c0x76dataEnglishGreat Britain0.6610169491525424
                      RT_GROUP_ICON0xdd0a40x14dataEnglishGreat Britain1.25
                      RT_GROUP_ICON0xdd0b80x14dataEnglishGreat Britain1.15
                      RT_GROUP_ICON0xdd0cc0x14dataEnglishGreat Britain1.25
                      RT_VERSION0xdd0e00xdcdataEnglishGreat Britain0.6181818181818182
                      RT_MANIFEST0xdd1bc0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                      DLLImport
                      WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                      VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                      COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                      MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                      WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                      PSAPI.DLLGetProcessMemoryInfo
                      IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                      USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                      UxTheme.dllIsThemeActive
                      KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                      USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                      GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                      COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                      ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                      SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                      ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                      OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                      Language of compilation systemCountry where language is spokenMap
                      EnglishGreat Britain
                      TimestampSource PortDest PortSource IPDest IP
                      Oct 1, 2024 06:16:52.606141090 CEST49674443192.168.2.523.1.237.91
                      Oct 1, 2024 06:16:52.606236935 CEST49675443192.168.2.523.1.237.91
                      Oct 1, 2024 06:16:52.715742111 CEST49673443192.168.2.523.1.237.91
                      Oct 1, 2024 06:16:57.109515905 CEST49709443192.168.2.5142.250.185.78
                      Oct 1, 2024 06:16:57.109565020 CEST44349709142.250.185.78192.168.2.5
                      Oct 1, 2024 06:16:57.109625101 CEST49709443192.168.2.5142.250.185.78
                      Oct 1, 2024 06:16:57.109827995 CEST49709443192.168.2.5142.250.185.78
                      Oct 1, 2024 06:16:57.109843016 CEST44349709142.250.185.78192.168.2.5
                      Oct 1, 2024 06:16:57.840852976 CEST44349709142.250.185.78192.168.2.5
                      Oct 1, 2024 06:16:57.841075897 CEST49709443192.168.2.5142.250.185.78
                      Oct 1, 2024 06:16:57.841094017 CEST44349709142.250.185.78192.168.2.5
                      Oct 1, 2024 06:16:57.841471910 CEST44349709142.250.185.78192.168.2.5
                      Oct 1, 2024 06:16:57.841521978 CEST49709443192.168.2.5142.250.185.78
                      Oct 1, 2024 06:16:57.842145920 CEST44349709142.250.185.78192.168.2.5
                      Oct 1, 2024 06:16:57.842197895 CEST49709443192.168.2.5142.250.185.78
                      Oct 1, 2024 06:16:57.843076944 CEST49709443192.168.2.5142.250.185.78
                      Oct 1, 2024 06:16:57.843135118 CEST44349709142.250.185.78192.168.2.5
                      Oct 1, 2024 06:16:57.843209028 CEST49709443192.168.2.5142.250.185.78
                      Oct 1, 2024 06:16:57.843215942 CEST44349709142.250.185.78192.168.2.5
                      Oct 1, 2024 06:16:57.882896900 CEST49709443192.168.2.5142.250.185.78
                      Oct 1, 2024 06:16:58.128263950 CEST44349709142.250.185.78192.168.2.5
                      Oct 1, 2024 06:16:58.128340006 CEST44349709142.250.185.78192.168.2.5
                      Oct 1, 2024 06:16:58.128391027 CEST49709443192.168.2.5142.250.185.78
                      Oct 1, 2024 06:16:58.129496098 CEST49709443192.168.2.5142.250.185.78
                      Oct 1, 2024 06:16:58.129520893 CEST44349709142.250.185.78192.168.2.5
                      Oct 1, 2024 06:16:58.141103029 CEST49712443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:16:58.141143084 CEST44349712142.250.185.110192.168.2.5
                      Oct 1, 2024 06:16:58.141207933 CEST49712443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:16:58.141592026 CEST49712443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:16:58.141606092 CEST44349712142.250.185.110192.168.2.5
                      Oct 1, 2024 06:16:58.866379976 CEST44349712142.250.185.110192.168.2.5
                      Oct 1, 2024 06:16:58.866658926 CEST49712443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:16:58.866683006 CEST44349712142.250.185.110192.168.2.5
                      Oct 1, 2024 06:16:58.867064953 CEST44349712142.250.185.110192.168.2.5
                      Oct 1, 2024 06:16:58.867135048 CEST49712443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:16:58.867765903 CEST44349712142.250.185.110192.168.2.5
                      Oct 1, 2024 06:16:58.867820978 CEST49712443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:16:58.868908882 CEST49712443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:16:58.868966103 CEST44349712142.250.185.110192.168.2.5
                      Oct 1, 2024 06:16:58.869138002 CEST49712443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:16:58.911400080 CEST44349712142.250.185.110192.168.2.5
                      Oct 1, 2024 06:16:58.912905931 CEST49712443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:16:58.912913084 CEST44349712142.250.185.110192.168.2.5
                      Oct 1, 2024 06:16:58.959903002 CEST49712443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:16:59.171232939 CEST44349712142.250.185.110192.168.2.5
                      Oct 1, 2024 06:16:59.171262980 CEST44349712142.250.185.110192.168.2.5
                      Oct 1, 2024 06:16:59.171315908 CEST49712443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:16:59.171325922 CEST44349712142.250.185.110192.168.2.5
                      Oct 1, 2024 06:16:59.171581030 CEST49712443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:16:59.175410986 CEST49712443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:16:59.175431013 CEST44349712142.250.185.110192.168.2.5
                      Oct 1, 2024 06:17:01.516596079 CEST49717443192.168.2.5142.250.186.164
                      Oct 1, 2024 06:17:01.516638041 CEST44349717142.250.186.164192.168.2.5
                      Oct 1, 2024 06:17:01.516702890 CEST49717443192.168.2.5142.250.186.164
                      Oct 1, 2024 06:17:01.516954899 CEST49717443192.168.2.5142.250.186.164
                      Oct 1, 2024 06:17:01.516973019 CEST44349717142.250.186.164192.168.2.5
                      Oct 1, 2024 06:17:01.615201950 CEST49718443192.168.2.5184.28.90.27
                      Oct 1, 2024 06:17:01.615248919 CEST44349718184.28.90.27192.168.2.5
                      Oct 1, 2024 06:17:01.615329027 CEST49718443192.168.2.5184.28.90.27
                      Oct 1, 2024 06:17:01.616944075 CEST49718443192.168.2.5184.28.90.27
                      Oct 1, 2024 06:17:01.616962910 CEST44349718184.28.90.27192.168.2.5
                      Oct 1, 2024 06:17:02.151017904 CEST44349717142.250.186.164192.168.2.5
                      Oct 1, 2024 06:17:02.151235104 CEST49717443192.168.2.5142.250.186.164
                      Oct 1, 2024 06:17:02.151248932 CEST44349717142.250.186.164192.168.2.5
                      Oct 1, 2024 06:17:02.152299881 CEST44349717142.250.186.164192.168.2.5
                      Oct 1, 2024 06:17:02.152363062 CEST49717443192.168.2.5142.250.186.164
                      Oct 1, 2024 06:17:02.153393030 CEST49717443192.168.2.5142.250.186.164
                      Oct 1, 2024 06:17:02.153444052 CEST44349717142.250.186.164192.168.2.5
                      Oct 1, 2024 06:17:02.194289923 CEST49717443192.168.2.5142.250.186.164
                      Oct 1, 2024 06:17:02.194300890 CEST44349717142.250.186.164192.168.2.5
                      Oct 1, 2024 06:17:02.209908962 CEST49674443192.168.2.523.1.237.91
                      Oct 1, 2024 06:17:02.209912062 CEST49675443192.168.2.523.1.237.91
                      Oct 1, 2024 06:17:02.241157055 CEST49717443192.168.2.5142.250.186.164
                      Oct 1, 2024 06:17:02.276355028 CEST44349718184.28.90.27192.168.2.5
                      Oct 1, 2024 06:17:02.276433945 CEST49718443192.168.2.5184.28.90.27
                      Oct 1, 2024 06:17:02.279617071 CEST49718443192.168.2.5184.28.90.27
                      Oct 1, 2024 06:17:02.279633045 CEST44349718184.28.90.27192.168.2.5
                      Oct 1, 2024 06:17:02.279863119 CEST44349718184.28.90.27192.168.2.5
                      Oct 1, 2024 06:17:02.319273949 CEST49673443192.168.2.523.1.237.91
                      Oct 1, 2024 06:17:02.327049017 CEST49718443192.168.2.5184.28.90.27
                      Oct 1, 2024 06:17:02.367404938 CEST44349718184.28.90.27192.168.2.5
                      Oct 1, 2024 06:17:02.552241087 CEST44349718184.28.90.27192.168.2.5
                      Oct 1, 2024 06:17:02.552294016 CEST44349718184.28.90.27192.168.2.5
                      Oct 1, 2024 06:17:02.552346945 CEST49718443192.168.2.5184.28.90.27
                      Oct 1, 2024 06:17:02.728797913 CEST49718443192.168.2.5184.28.90.27
                      Oct 1, 2024 06:17:02.728827000 CEST44349718184.28.90.27192.168.2.5
                      Oct 1, 2024 06:17:02.728841066 CEST49718443192.168.2.5184.28.90.27
                      Oct 1, 2024 06:17:02.728849888 CEST44349718184.28.90.27192.168.2.5
                      Oct 1, 2024 06:17:02.807342052 CEST49723443192.168.2.5184.28.90.27
                      Oct 1, 2024 06:17:02.807373047 CEST44349723184.28.90.27192.168.2.5
                      Oct 1, 2024 06:17:02.807465076 CEST49723443192.168.2.5184.28.90.27
                      Oct 1, 2024 06:17:02.807765007 CEST49723443192.168.2.5184.28.90.27
                      Oct 1, 2024 06:17:02.807776928 CEST44349723184.28.90.27192.168.2.5
                      Oct 1, 2024 06:17:03.440937996 CEST44349723184.28.90.27192.168.2.5
                      Oct 1, 2024 06:17:03.441010952 CEST49723443192.168.2.5184.28.90.27
                      Oct 1, 2024 06:17:03.443092108 CEST49723443192.168.2.5184.28.90.27
                      Oct 1, 2024 06:17:03.443099976 CEST44349723184.28.90.27192.168.2.5
                      Oct 1, 2024 06:17:03.443301916 CEST44349723184.28.90.27192.168.2.5
                      Oct 1, 2024 06:17:03.444858074 CEST49723443192.168.2.5184.28.90.27
                      Oct 1, 2024 06:17:03.487391949 CEST44349723184.28.90.27192.168.2.5
                      Oct 1, 2024 06:17:03.717442989 CEST44349723184.28.90.27192.168.2.5
                      Oct 1, 2024 06:17:03.717504978 CEST44349723184.28.90.27192.168.2.5
                      Oct 1, 2024 06:17:03.717555046 CEST49723443192.168.2.5184.28.90.27
                      Oct 1, 2024 06:17:03.734349012 CEST49723443192.168.2.5184.28.90.27
                      Oct 1, 2024 06:17:03.734364986 CEST44349723184.28.90.27192.168.2.5
                      Oct 1, 2024 06:17:03.991449118 CEST4434970523.1.237.91192.168.2.5
                      Oct 1, 2024 06:17:03.991563082 CEST49705443192.168.2.523.1.237.91
                      Oct 1, 2024 06:17:06.471497059 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:06.471519947 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:06.471597910 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:06.471899033 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:06.471913099 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.106292009 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.106585026 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.106600046 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.107925892 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.108002901 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.110404968 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.110531092 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.111535072 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.111706972 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.111712933 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.155404091 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.162448883 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.162455082 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.209306955 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.419507980 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.419708967 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.419801950 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.419816017 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.419828892 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.419874907 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.424387932 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.424465895 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.430751085 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.430843115 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.430846930 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.430871010 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.430890083 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.436933994 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.436990023 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.436997890 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.443197966 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.443262100 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.443269968 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.443289042 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.443345070 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.443353891 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.483469009 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.505475044 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.505573034 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.505580902 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.505605936 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.505659103 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.508097887 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.508172989 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.514806032 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.514872074 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.514893055 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.514942884 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.520761013 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.520840883 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.527721882 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.527793884 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.527806044 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.533267975 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.533497095 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.533508062 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.539895058 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.540225983 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.540297031 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.565732956 CEST49734443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.565751076 CEST44349734172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.978759050 CEST49738443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.978801012 CEST44349738172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.978908062 CEST49738443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.981014013 CEST49738443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.981029034 CEST44349738172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.981628895 CEST49739443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.981659889 CEST44349739172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:07.981729984 CEST49739443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.982017040 CEST49739443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:07.982031107 CEST44349739172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:08.617628098 CEST44349738172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:08.617873907 CEST49738443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:08.617894888 CEST44349738172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:08.618218899 CEST44349738172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:08.618275881 CEST49738443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:08.618534088 CEST44349739172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:08.618678093 CEST49739443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:08.618705988 CEST44349739172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:08.618825912 CEST44349738172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:08.618870974 CEST49738443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:08.619231939 CEST44349739172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:08.619287014 CEST49739443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:08.620268106 CEST44349739172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:08.620323896 CEST49739443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:08.623958111 CEST49738443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:08.624017954 CEST44349738172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:08.624063015 CEST49739443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:08.624161005 CEST44349739172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:08.624422073 CEST49738443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:08.624433041 CEST44349738172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:08.624562025 CEST49739443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:08.624572039 CEST44349739172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:08.663959026 CEST49738443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:08.679310083 CEST49739443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:08.896135092 CEST44349739172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:08.896147013 CEST44349738172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:08.896197081 CEST44349739172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:08.896342993 CEST49739443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:08.896554947 CEST49738443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:08.896589994 CEST44349738172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:08.896625042 CEST44349738172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:08.896646023 CEST49738443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:08.896672964 CEST49738443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:08.896990061 CEST49739443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:08.897002935 CEST44349739172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:08.897691011 CEST49744443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:08.897701979 CEST44349744172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:08.897756100 CEST49744443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:08.898361921 CEST49745443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:08.898385048 CEST44349745172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:08.898442030 CEST49745443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:08.898663044 CEST49744443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:08.898675919 CEST44349744172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:08.898932934 CEST49745443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:08.898946047 CEST44349745172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:09.528664112 CEST44349745172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:09.528836966 CEST49745443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:09.528850079 CEST44349745172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:09.529341936 CEST44349745172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:09.529407024 CEST49745443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:09.530342102 CEST44349745172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:09.530422926 CEST49745443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:09.530550003 CEST49745443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:09.530625105 CEST44349745172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:09.530663013 CEST49745443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:09.530687094 CEST49745443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:09.530692101 CEST44349745172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:09.546911955 CEST44349744172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:09.547106028 CEST49744443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:09.547116041 CEST44349744172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:09.547472000 CEST44349744172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:09.547529936 CEST49744443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:09.548141003 CEST44349744172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:09.548192978 CEST49744443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:09.548305035 CEST49744443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:09.548369884 CEST44349744172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:09.548432112 CEST49744443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:09.548440933 CEST44349744172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:09.548463106 CEST49744443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:09.585650921 CEST49745443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:09.591519117 CEST44349744172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:09.601264954 CEST49744443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:09.721041918 CEST44349745172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:09.721131086 CEST44349745172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:09.721180916 CEST49745443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:09.721818924 CEST49745443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:09.721829891 CEST44349745172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:09.743423939 CEST44349744172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:09.743597031 CEST44349744172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:09.743653059 CEST49744443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:09.744427919 CEST49744443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:09.744446039 CEST44349744172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:09.817713976 CEST49717443192.168.2.5142.250.186.164
                      Oct 1, 2024 06:17:09.863395929 CEST44349717142.250.186.164192.168.2.5
                      Oct 1, 2024 06:17:10.084307909 CEST44349717142.250.186.164192.168.2.5
                      Oct 1, 2024 06:17:10.084367037 CEST44349717142.250.186.164192.168.2.5
                      Oct 1, 2024 06:17:10.084400892 CEST44349717142.250.186.164192.168.2.5
                      Oct 1, 2024 06:17:10.084413052 CEST49717443192.168.2.5142.250.186.164
                      Oct 1, 2024 06:17:10.084430933 CEST44349717142.250.186.164192.168.2.5
                      Oct 1, 2024 06:17:10.084470034 CEST49717443192.168.2.5142.250.186.164
                      Oct 1, 2024 06:17:10.084475994 CEST44349717142.250.186.164192.168.2.5
                      Oct 1, 2024 06:17:10.084799051 CEST44349717142.250.186.164192.168.2.5
                      Oct 1, 2024 06:17:10.084841967 CEST49717443192.168.2.5142.250.186.164
                      Oct 1, 2024 06:17:10.314193010 CEST49717443192.168.2.5142.250.186.164
                      Oct 1, 2024 06:17:10.314218998 CEST44349717142.250.186.164192.168.2.5
                      Oct 1, 2024 06:17:13.187714100 CEST49750443192.168.2.54.175.87.197
                      Oct 1, 2024 06:17:13.187774897 CEST443497504.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:13.187962055 CEST49750443192.168.2.54.175.87.197
                      Oct 1, 2024 06:17:13.189024925 CEST49750443192.168.2.54.175.87.197
                      Oct 1, 2024 06:17:13.189042091 CEST443497504.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:13.980659962 CEST443497504.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:13.980761051 CEST49750443192.168.2.54.175.87.197
                      Oct 1, 2024 06:17:13.983285904 CEST49750443192.168.2.54.175.87.197
                      Oct 1, 2024 06:17:13.983298063 CEST443497504.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:13.983535051 CEST443497504.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:14.037830114 CEST49750443192.168.2.54.175.87.197
                      Oct 1, 2024 06:17:14.547168970 CEST49750443192.168.2.54.175.87.197
                      Oct 1, 2024 06:17:14.591438055 CEST443497504.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:14.809020996 CEST443497504.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:14.809046984 CEST443497504.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:14.809053898 CEST443497504.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:14.809082031 CEST443497504.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:14.809092045 CEST443497504.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:14.809098959 CEST443497504.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:14.809101105 CEST49750443192.168.2.54.175.87.197
                      Oct 1, 2024 06:17:14.809124947 CEST443497504.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:14.809151888 CEST49750443192.168.2.54.175.87.197
                      Oct 1, 2024 06:17:14.809169054 CEST49750443192.168.2.54.175.87.197
                      Oct 1, 2024 06:17:14.809879065 CEST443497504.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:14.809952974 CEST49750443192.168.2.54.175.87.197
                      Oct 1, 2024 06:17:14.809962034 CEST443497504.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:14.809973001 CEST443497504.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:14.810033083 CEST49750443192.168.2.54.175.87.197
                      Oct 1, 2024 06:17:15.321425915 CEST49750443192.168.2.54.175.87.197
                      Oct 1, 2024 06:17:15.321445942 CEST443497504.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:15.496612072 CEST49756443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:15.496637106 CEST44349756172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:15.496736050 CEST49756443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:15.497268915 CEST49756443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:15.497283936 CEST44349756172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:16.140922070 CEST44349756172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:16.141143084 CEST49756443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:16.141160011 CEST44349756172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:16.141470909 CEST44349756172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:16.141789913 CEST49756443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:16.141845942 CEST44349756172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:16.141952991 CEST49756443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:16.141968012 CEST49756443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:16.141982079 CEST44349756172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:16.492566109 CEST44349756172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:16.492682934 CEST44349756172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:16.492892981 CEST49756443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:16.507467031 CEST49756443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:16.507478952 CEST44349756172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:38.291541100 CEST49758443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:38.291608095 CEST44349758172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:38.291698933 CEST49758443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:38.292377949 CEST49758443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:38.292418957 CEST44349758172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:38.341053963 CEST49759443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:38.341093063 CEST44349759172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:38.341222048 CEST49759443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:38.341955900 CEST49759443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:38.341969967 CEST44349759172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:38.886146069 CEST49760443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:38.886183977 CEST44349760172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:38.886285067 CEST49760443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:38.886831999 CEST49760443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:38.886843920 CEST44349760172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:38.928756952 CEST44349758172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:38.930095911 CEST49758443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:38.930125952 CEST44349758172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:38.930668116 CEST44349758172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:38.931237936 CEST49758443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:38.931334019 CEST44349758172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:38.931437969 CEST49758443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:38.931477070 CEST49758443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:38.931555033 CEST44349758172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:38.979221106 CEST44349759172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:38.979549885 CEST49759443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:38.979568005 CEST44349759172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:38.979882002 CEST44349759172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:38.982692957 CEST49759443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:38.982749939 CEST44349759172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:38.982934952 CEST49759443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:38.982964039 CEST49759443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:38.982970953 CEST44349759172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:39.204119921 CEST44349758172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:39.204462051 CEST44349758172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:39.204663992 CEST49758443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:39.205490112 CEST49758443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:39.205519915 CEST44349758172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:39.257702112 CEST44349759172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:39.257806063 CEST44349759172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:39.257903099 CEST49759443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:39.277671099 CEST49759443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:39.277692080 CEST44349759172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:39.534224987 CEST44349760172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:39.555346012 CEST49760443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:39.555372953 CEST44349760172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:39.555790901 CEST44349760172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:39.555870056 CEST49760443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:39.556471109 CEST44349760172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:39.556530952 CEST49760443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:39.576257944 CEST49760443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:39.576327085 CEST44349760172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:39.576881886 CEST49760443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:39.576894045 CEST44349760172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:39.576905966 CEST49760443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:39.623439074 CEST44349760172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:39.632077932 CEST49760443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:40.027688026 CEST44349760172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:40.027817965 CEST44349760172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:40.027983904 CEST49760443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:40.028868914 CEST49760443192.168.2.5172.217.16.142
                      Oct 1, 2024 06:17:40.028881073 CEST44349760172.217.16.142192.168.2.5
                      Oct 1, 2024 06:17:51.708013058 CEST49761443192.168.2.54.175.87.197
                      Oct 1, 2024 06:17:51.708095074 CEST443497614.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:51.708197117 CEST49761443192.168.2.54.175.87.197
                      Oct 1, 2024 06:17:51.708617926 CEST49761443192.168.2.54.175.87.197
                      Oct 1, 2024 06:17:51.708655119 CEST443497614.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:52.557073116 CEST443497614.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:52.557174921 CEST49761443192.168.2.54.175.87.197
                      Oct 1, 2024 06:17:52.560909033 CEST49761443192.168.2.54.175.87.197
                      Oct 1, 2024 06:17:52.560933113 CEST443497614.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:52.561191082 CEST443497614.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:52.569855928 CEST49761443192.168.2.54.175.87.197
                      Oct 1, 2024 06:17:52.611428022 CEST443497614.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:52.892352104 CEST443497614.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:52.892405033 CEST443497614.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:52.892466068 CEST443497614.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:52.892482996 CEST49761443192.168.2.54.175.87.197
                      Oct 1, 2024 06:17:52.892513037 CEST443497614.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:52.892550945 CEST49761443192.168.2.54.175.87.197
                      Oct 1, 2024 06:17:52.892574072 CEST49761443192.168.2.54.175.87.197
                      Oct 1, 2024 06:17:52.893286943 CEST443497614.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:52.893358946 CEST49761443192.168.2.54.175.87.197
                      Oct 1, 2024 06:17:52.893368959 CEST443497614.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:52.893410921 CEST443497614.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:52.893440962 CEST49761443192.168.2.54.175.87.197
                      Oct 1, 2024 06:17:52.893819094 CEST443497614.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:52.893901110 CEST49761443192.168.2.54.175.87.197
                      Oct 1, 2024 06:17:52.896802902 CEST49761443192.168.2.54.175.87.197
                      Oct 1, 2024 06:17:52.896826982 CEST443497614.175.87.197192.168.2.5
                      Oct 1, 2024 06:17:52.896857977 CEST49761443192.168.2.54.175.87.197
                      Oct 1, 2024 06:17:52.896872044 CEST443497614.175.87.197192.168.2.5
                      Oct 1, 2024 06:18:01.577991009 CEST49763443192.168.2.5142.250.184.228
                      Oct 1, 2024 06:18:01.578020096 CEST44349763142.250.184.228192.168.2.5
                      Oct 1, 2024 06:18:01.578097105 CEST49763443192.168.2.5142.250.184.228
                      Oct 1, 2024 06:18:01.578347921 CEST49763443192.168.2.5142.250.184.228
                      Oct 1, 2024 06:18:01.578361988 CEST44349763142.250.184.228192.168.2.5
                      Oct 1, 2024 06:18:02.213010073 CEST44349763142.250.184.228192.168.2.5
                      Oct 1, 2024 06:18:02.213591099 CEST49763443192.168.2.5142.250.184.228
                      Oct 1, 2024 06:18:02.213603020 CEST44349763142.250.184.228192.168.2.5
                      Oct 1, 2024 06:18:02.214413881 CEST44349763142.250.184.228192.168.2.5
                      Oct 1, 2024 06:18:02.214795113 CEST49763443192.168.2.5142.250.184.228
                      Oct 1, 2024 06:18:02.214853048 CEST44349763142.250.184.228192.168.2.5
                      Oct 1, 2024 06:18:02.256143093 CEST49763443192.168.2.5142.250.184.228
                      Oct 1, 2024 06:18:08.581578970 CEST49765443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:08.581608057 CEST44349765142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:08.581705093 CEST49765443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:08.620153904 CEST49765443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:08.620166063 CEST44349765142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:09.269187927 CEST44349765142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:09.269495010 CEST49765443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:09.269507885 CEST44349765142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:09.269824028 CEST44349765142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:09.270128012 CEST49765443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:09.270181894 CEST44349765142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:09.270284891 CEST49765443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:09.270296097 CEST49765443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:09.270307064 CEST44349765142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:09.547879934 CEST44349765142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:09.547998905 CEST44349765142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:09.548048019 CEST49765443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:09.548644066 CEST49765443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:09.548656940 CEST44349765142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:10.751950026 CEST49766443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:10.751983881 CEST44349766142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:10.752054930 CEST49766443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:10.752315044 CEST49766443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:10.752327919 CEST44349766142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:11.384074926 CEST44349766142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:11.384377003 CEST49766443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:11.384390116 CEST44349766142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:11.384766102 CEST44349766142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:11.385060072 CEST49766443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:11.385121107 CEST44349766142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:11.385220051 CEST49766443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:11.385236979 CEST49766443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:11.385257006 CEST44349766142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:11.662928104 CEST44349766142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:11.663048983 CEST44349766142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:11.663223028 CEST49766443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:11.663604975 CEST49766443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:11.663626909 CEST44349766142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:12.112483978 CEST44349763142.250.184.228192.168.2.5
                      Oct 1, 2024 06:18:12.112633944 CEST44349763142.250.184.228192.168.2.5
                      Oct 1, 2024 06:18:12.112731934 CEST49763443192.168.2.5142.250.184.228
                      Oct 1, 2024 06:18:25.627935886 CEST49763443192.168.2.5142.250.184.228
                      Oct 1, 2024 06:18:25.627974987 CEST44349763142.250.184.228192.168.2.5
                      Oct 1, 2024 06:18:40.641295910 CEST49768443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:40.641412973 CEST44349768142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:40.641510963 CEST49768443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:40.643014908 CEST49768443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:40.643053055 CEST44349768142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:41.278549910 CEST44349768142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:41.278945923 CEST49768443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:41.278996944 CEST44349768142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:41.280303001 CEST44349768142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:41.280699015 CEST49768443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:41.280869007 CEST49768443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:41.280881882 CEST44349768142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:41.280927896 CEST44349768142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:41.280932903 CEST49768443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:41.281045914 CEST44349768142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:41.335691929 CEST49768443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:41.553452015 CEST44349768142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:41.553754091 CEST44349768142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:41.553839922 CEST49768443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:41.554219007 CEST49768443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:41.554254055 CEST44349768142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:41.902659893 CEST49769443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:41.902709007 CEST44349769142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:41.902785063 CEST49769443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:41.903120041 CEST49769443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:41.903131962 CEST44349769142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:42.539999008 CEST44349769142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:42.546449900 CEST49769443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:42.546471119 CEST44349769142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:42.547760963 CEST44349769142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:42.550735950 CEST49769443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:42.550921917 CEST44349769142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:42.551050901 CEST49769443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:42.551074028 CEST49769443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:42.551091909 CEST44349769142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:42.815849066 CEST44349769142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:42.816209078 CEST44349769142.250.185.110192.168.2.5
                      Oct 1, 2024 06:18:42.816379070 CEST49769443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:42.816379070 CEST49769443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:43.116209984 CEST49769443192.168.2.5142.250.185.110
                      Oct 1, 2024 06:18:43.116240025 CEST44349769142.250.185.110192.168.2.5
                      Oct 1, 2024 06:19:01.624525070 CEST49770443192.168.2.5142.250.184.228
                      Oct 1, 2024 06:19:01.624566078 CEST44349770142.250.184.228192.168.2.5
                      Oct 1, 2024 06:19:01.624635935 CEST49770443192.168.2.5142.250.184.228
                      Oct 1, 2024 06:19:01.624953985 CEST49770443192.168.2.5142.250.184.228
                      Oct 1, 2024 06:19:01.624969006 CEST44349770142.250.184.228192.168.2.5
                      Oct 1, 2024 06:19:02.269514084 CEST44349770142.250.184.228192.168.2.5
                      Oct 1, 2024 06:19:02.269957066 CEST49770443192.168.2.5142.250.184.228
                      Oct 1, 2024 06:19:02.269970894 CEST44349770142.250.184.228192.168.2.5
                      Oct 1, 2024 06:19:02.271034002 CEST44349770142.250.184.228192.168.2.5
                      Oct 1, 2024 06:19:02.271358013 CEST49770443192.168.2.5142.250.184.228
                      Oct 1, 2024 06:19:02.271569967 CEST44349770142.250.184.228192.168.2.5
                      Oct 1, 2024 06:19:02.321369886 CEST49770443192.168.2.5142.250.184.228
                      TimestampSource PortDest PortSource IPDest IP
                      Oct 1, 2024 06:16:57.048484087 CEST6169053192.168.2.51.1.1.1
                      Oct 1, 2024 06:16:57.055115938 CEST53616901.1.1.1192.168.2.5
                      Oct 1, 2024 06:16:57.064608097 CEST53581711.1.1.1192.168.2.5
                      Oct 1, 2024 06:16:57.069905043 CEST53588401.1.1.1192.168.2.5
                      Oct 1, 2024 06:16:58.133677959 CEST5051053192.168.2.51.1.1.1
                      Oct 1, 2024 06:16:58.133865118 CEST5059653192.168.2.51.1.1.1
                      Oct 1, 2024 06:16:58.140511990 CEST53505101.1.1.1192.168.2.5
                      Oct 1, 2024 06:16:58.140559912 CEST53505961.1.1.1192.168.2.5
                      Oct 1, 2024 06:16:58.178622961 CEST53510531.1.1.1192.168.2.5
                      Oct 1, 2024 06:17:01.507951021 CEST5803353192.168.2.51.1.1.1
                      Oct 1, 2024 06:17:01.508085012 CEST5542153192.168.2.51.1.1.1
                      Oct 1, 2024 06:17:01.514691114 CEST53554211.1.1.1192.168.2.5
                      Oct 1, 2024 06:17:01.514761925 CEST53580331.1.1.1192.168.2.5
                      Oct 1, 2024 06:17:01.687019110 CEST53652931.1.1.1192.168.2.5
                      Oct 1, 2024 06:17:03.581034899 CEST53612181.1.1.1192.168.2.5
                      Oct 1, 2024 06:17:06.455954075 CEST5000553192.168.2.51.1.1.1
                      Oct 1, 2024 06:17:06.456084967 CEST4957953192.168.2.51.1.1.1
                      Oct 1, 2024 06:17:06.462953091 CEST53500051.1.1.1192.168.2.5
                      Oct 1, 2024 06:17:06.465639114 CEST53495791.1.1.1192.168.2.5
                      Oct 1, 2024 06:17:07.896588087 CEST6387353192.168.2.51.1.1.1
                      Oct 1, 2024 06:17:07.904109001 CEST53638731.1.1.1192.168.2.5
                      Oct 1, 2024 06:17:07.908488035 CEST6074253192.168.2.51.1.1.1
                      Oct 1, 2024 06:17:07.915707111 CEST53607421.1.1.1192.168.2.5
                      Oct 1, 2024 06:17:15.249279022 CEST53501741.1.1.1192.168.2.5
                      Oct 1, 2024 06:17:34.265075922 CEST53559361.1.1.1192.168.2.5
                      Oct 1, 2024 06:17:56.769604921 CEST53611381.1.1.1192.168.2.5
                      Oct 1, 2024 06:17:57.312975883 CEST53558671.1.1.1192.168.2.5
                      Oct 1, 2024 06:18:01.570199013 CEST6422353192.168.2.51.1.1.1
                      Oct 1, 2024 06:18:01.570374012 CEST4972353192.168.2.51.1.1.1
                      Oct 1, 2024 06:18:01.576921940 CEST53642231.1.1.1192.168.2.5
                      Oct 1, 2024 06:18:01.576942921 CEST53497231.1.1.1192.168.2.5
                      Oct 1, 2024 06:18:08.519373894 CEST53497781.1.1.1192.168.2.5
                      Oct 1, 2024 06:18:08.563380003 CEST6447453192.168.2.51.1.1.1
                      Oct 1, 2024 06:18:08.563558102 CEST5774653192.168.2.51.1.1.1
                      Oct 1, 2024 06:18:08.570512056 CEST53644741.1.1.1192.168.2.5
                      Oct 1, 2024 06:18:08.570519924 CEST53577461.1.1.1192.168.2.5
                      Oct 1, 2024 06:18:25.636562109 CEST53622961.1.1.1192.168.2.5
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Oct 1, 2024 06:16:57.048484087 CEST192.168.2.51.1.1.10x8c34Standard query (0)youtube.comA (IP address)IN (0x0001)false
                      Oct 1, 2024 06:16:58.133677959 CEST192.168.2.51.1.1.10x1ab0Standard query (0)www.youtube.comA (IP address)IN (0x0001)false
                      Oct 1, 2024 06:16:58.133865118 CEST192.168.2.51.1.1.10x739fStandard query (0)www.youtube.com65IN (0x0001)false
                      Oct 1, 2024 06:17:01.507951021 CEST192.168.2.51.1.1.10xe5bStandard query (0)www.google.comA (IP address)IN (0x0001)false
                      Oct 1, 2024 06:17:01.508085012 CEST192.168.2.51.1.1.10x2687Standard query (0)www.google.com65IN (0x0001)false
                      Oct 1, 2024 06:17:06.455954075 CEST192.168.2.51.1.1.10xe274Standard query (0)accounts.youtube.comA (IP address)IN (0x0001)false
                      Oct 1, 2024 06:17:06.456084967 CEST192.168.2.51.1.1.10x80bdStandard query (0)accounts.youtube.com65IN (0x0001)false
                      Oct 1, 2024 06:17:07.896588087 CEST192.168.2.51.1.1.10xc645Standard query (0)play.google.comA (IP address)IN (0x0001)false
                      Oct 1, 2024 06:17:07.908488035 CEST192.168.2.51.1.1.10x9e59Standard query (0)play.google.com65IN (0x0001)false
                      Oct 1, 2024 06:18:01.570199013 CEST192.168.2.51.1.1.10xdc06Standard query (0)www.google.comA (IP address)IN (0x0001)false
                      Oct 1, 2024 06:18:01.570374012 CEST192.168.2.51.1.1.10xd8b4Standard query (0)www.google.com65IN (0x0001)false
                      Oct 1, 2024 06:18:08.563380003 CEST192.168.2.51.1.1.10x3fa8Standard query (0)play.google.comA (IP address)IN (0x0001)false
                      Oct 1, 2024 06:18:08.563558102 CEST192.168.2.51.1.1.10x2dfbStandard query (0)play.google.com65IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Oct 1, 2024 06:16:57.055115938 CEST1.1.1.1192.168.2.50x8c34No error (0)youtube.com142.250.185.78A (IP address)IN (0x0001)false
                      Oct 1, 2024 06:16:58.140511990 CEST1.1.1.1192.168.2.50x1ab0No error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                      Oct 1, 2024 06:16:58.140511990 CEST1.1.1.1192.168.2.50x1ab0No error (0)youtube-ui.l.google.com142.250.185.110A (IP address)IN (0x0001)false
                      Oct 1, 2024 06:16:58.140511990 CEST1.1.1.1192.168.2.50x1ab0No error (0)youtube-ui.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                      Oct 1, 2024 06:16:58.140511990 CEST1.1.1.1192.168.2.50x1ab0No error (0)youtube-ui.l.google.com142.250.185.78A (IP address)IN (0x0001)false
                      Oct 1, 2024 06:16:58.140511990 CEST1.1.1.1192.168.2.50x1ab0No error (0)youtube-ui.l.google.com142.250.186.78A (IP address)IN (0x0001)false
                      Oct 1, 2024 06:16:58.140511990 CEST1.1.1.1192.168.2.50x1ab0No error (0)youtube-ui.l.google.com142.250.186.46A (IP address)IN (0x0001)false
                      Oct 1, 2024 06:16:58.140511990 CEST1.1.1.1192.168.2.50x1ab0No error (0)youtube-ui.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                      Oct 1, 2024 06:16:58.140511990 CEST1.1.1.1192.168.2.50x1ab0No error (0)youtube-ui.l.google.com142.250.185.238A (IP address)IN (0x0001)false
                      Oct 1, 2024 06:16:58.140511990 CEST1.1.1.1192.168.2.50x1ab0No error (0)youtube-ui.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                      Oct 1, 2024 06:16:58.140511990 CEST1.1.1.1192.168.2.50x1ab0No error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                      Oct 1, 2024 06:16:58.140511990 CEST1.1.1.1192.168.2.50x1ab0No error (0)youtube-ui.l.google.com216.58.212.174A (IP address)IN (0x0001)false
                      Oct 1, 2024 06:16:58.140511990 CEST1.1.1.1192.168.2.50x1ab0No error (0)youtube-ui.l.google.com142.250.184.206A (IP address)IN (0x0001)false
                      Oct 1, 2024 06:16:58.140511990 CEST1.1.1.1192.168.2.50x1ab0No error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                      Oct 1, 2024 06:16:58.140511990 CEST1.1.1.1192.168.2.50x1ab0No error (0)youtube-ui.l.google.com142.250.181.238A (IP address)IN (0x0001)false
                      Oct 1, 2024 06:16:58.140511990 CEST1.1.1.1192.168.2.50x1ab0No error (0)youtube-ui.l.google.com172.217.23.110A (IP address)IN (0x0001)false
                      Oct 1, 2024 06:16:58.140511990 CEST1.1.1.1192.168.2.50x1ab0No error (0)youtube-ui.l.google.com216.58.206.46A (IP address)IN (0x0001)false
                      Oct 1, 2024 06:16:58.140511990 CEST1.1.1.1192.168.2.50x1ab0No error (0)youtube-ui.l.google.com172.217.18.14A (IP address)IN (0x0001)false
                      Oct 1, 2024 06:16:58.140559912 CEST1.1.1.1192.168.2.50x739fNo error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                      Oct 1, 2024 06:16:58.140559912 CEST1.1.1.1192.168.2.50x739fNo error (0)youtube-ui.l.google.com65IN (0x0001)false
                      Oct 1, 2024 06:17:01.514691114 CEST1.1.1.1192.168.2.50x2687No error (0)www.google.com65IN (0x0001)false
                      Oct 1, 2024 06:17:01.514761925 CEST1.1.1.1192.168.2.50xe5bNo error (0)www.google.com142.250.186.164A (IP address)IN (0x0001)false
                      Oct 1, 2024 06:17:06.462953091 CEST1.1.1.1192.168.2.50xe274No error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                      Oct 1, 2024 06:17:06.462953091 CEST1.1.1.1192.168.2.50xe274No error (0)www3.l.google.com172.217.16.142A (IP address)IN (0x0001)false
                      Oct 1, 2024 06:17:06.465639114 CEST1.1.1.1192.168.2.50x80bdNo error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                      Oct 1, 2024 06:17:07.904109001 CEST1.1.1.1192.168.2.50xc645No error (0)play.google.com172.217.16.142A (IP address)IN (0x0001)false
                      Oct 1, 2024 06:18:01.576921940 CEST1.1.1.1192.168.2.50xdc06No error (0)www.google.com142.250.184.228A (IP address)IN (0x0001)false
                      Oct 1, 2024 06:18:01.576942921 CEST1.1.1.1192.168.2.50xd8b4No error (0)www.google.com65IN (0x0001)false
                      Oct 1, 2024 06:18:08.570512056 CEST1.1.1.1192.168.2.50x3fa8No error (0)play.google.com142.250.185.110A (IP address)IN (0x0001)false
                      • youtube.com
                      • www.youtube.com
                      • fs.microsoft.com
                      • https:
                        • accounts.youtube.com
                        • play.google.com
                        • www.google.com
                      • slscr.update.microsoft.com
                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.549709142.250.185.784437548C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 04:16:57 UTC859OUTGET /account?=https://accounts.google.com/v3/signin/challenge/pwd HTTP/1.1
                      Host: youtube.com
                      Connection: keep-alive
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      sec-ch-ua-platform: "Windows"
                      Upgrade-Insecure-Requests: 1
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIkqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: none
                      Sec-Fetch-Mode: navigate
                      Sec-Fetch-User: ?1
                      Sec-Fetch-Dest: document
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      2024-10-01 04:16:58 UTC1704INHTTP/1.1 301 Moved Permanently
                      Content-Type: application/binary
                      X-Content-Type-Options: nosniff
                      Expires: Tue, 01 Oct 2024 04:16:58 GMT
                      Date: Tue, 01 Oct 2024 04:16:58 GMT
                      Cache-Control: private, max-age=31536000
                      Location: https://www.youtube.com/account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd
                      X-Frame-Options: SAMEORIGIN
                      Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                      Content-Security-Policy: require-trusted-types-for 'script'
                      Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="youtube_main"
                      Origin-Trial: AmhMBR6zCLzDDxpW+HfpP67BqwIknWnyMOXOQGfzYswFmJe+fgaI6XZgAzcxOrzNtP7hEDsOo1jdjFnVr2IdxQ4AAAB4eyJvcmlnaW4iOiJodHRwczovL3lvdXR1YmUuY29tOjQ0MyIsImZlYXR1cmUiOiJXZWJWaWV3WFJlcXVlc3RlZFdpdGhEZXByZWNhdGlvbiIsImV4cGlyeSI6MTc1ODA2NzE5OSwiaXNTdWJkb21haW4iOnRydWV9
                      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                      Vary: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                      Report-To: {"group":"youtube_main","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/youtube_main"}]}
                      Server: ESF
                      Content-Length: 0
                      X-XSS-Protection: 0
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Connection: close


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      1192.168.2.549712142.250.185.1104437548C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 04:16:58 UTC877OUTGET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1
                      Host: www.youtube.com
                      Connection: keep-alive
                      Upgrade-Insecure-Requests: 1
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIkqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: none
                      Sec-Fetch-Mode: navigate
                      Sec-Fetch-User: ?1
                      Sec-Fetch-Dest: document
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      sec-ch-ua-platform: "Windows"
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      2024-10-01 04:16:59 UTC3014INHTTP/1.1 303 See Other
                      Content-Type: application/binary
                      X-Content-Type-Options: nosniff
                      Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                      Pragma: no-cache
                      Expires: Mon, 01 Jan 1990 00:00:00 GMT
                      Date: Tue, 01 Oct 2024 04:16:59 GMT
                      Location: https://accounts.google.com/ServiceLogin?service=youtube&uilel=3&passive=true&continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%253F%253Dhttps%25253A%25252F%25252Faccounts.google.com%25252Fv3%25252Fsignin%25252Fchallenge%25252Fpwd%26feature%3Dredirect_login&hl=en
                      Strict-Transport-Security: max-age=31536000
                      X-Frame-Options: SAMEORIGIN
                      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                      Content-Security-Policy: require-trusted-types-for 'script'
                      Content-Security-Policy-Report-Only: base-uri 'self';default-src 'self' https: blob:;font-src https: data:;img-src https: data: android-webview-video-poster:;media-src blob: https:;object-src 'none';report-uri /cspreport/common;script-src 'report-sample' 'nonce-De7BVaipTG-zVXGAY2nNvg' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';style-src https: 'unsafe-inline'
                      Origin-Trial: AmhMBR6zCLzDDxpW+HfpP67BqwIknWnyMOXOQGfzYswFmJe+fgaI6XZgAzcxOrzNtP7hEDsOo1jdjFnVr2IdxQ4AAAB4eyJvcmlnaW4iOiJodHRwczovL3lvdXR1YmUuY29tOjQ0MyIsImZlYXR1cmUiOiJXZWJWaWV3WFJlcXVlc3RlZFdpdGhEZXByZWNhdGlvbiIsImV4cGlyeSI6MTc1ODA2NzE5OSwiaXNTdWJkb21haW4iOnRydWV9
                      Report-To: {"group":"youtube_main","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/youtube_main"}]}
                      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                      Vary: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                      Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="youtube_main"
                      P3P: CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657?hl=en for more info."
                      Server: ESF
                      Content-Length: 0
                      X-XSS-Protection: 0
                      Set-Cookie: GPS=1; Domain=.youtube.com; Expires=Tue, 01-Oct-2024 04:46:59 GMT; Path=/; Secure; HttpOnly
                      Set-Cookie: YSC=Q3boLu7_0Js; Domain=.youtube.com; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                      Set-Cookie: VISITOR_INFO1_LIVE=taK_25YDrGE; Domain=.youtube.com; Expires=Sun, 30-Mar-2025 04:16:59 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                      Set-Cookie: VISITOR_PRIVACY_METADATA=CgJVUxIEGgAgWw%3D%3D; Domain=.youtube.com; Expires=Sun, 30-Mar-2025 04:16:59 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Connection: close


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      2192.168.2.549718184.28.90.27443
                      TimestampBytes transferredDirectionData
                      2024-10-01 04:17:02 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
                      Connection: Keep-Alive
                      Accept: */*
                      Accept-Encoding: identity
                      User-Agent: Microsoft BITS/7.8
                      Host: fs.microsoft.com
                      2024-10-01 04:17:02 UTC467INHTTP/1.1 200 OK
                      Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                      Content-Type: application/octet-stream
                      ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                      Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                      Server: ECAcc (lpl/EF06)
                      X-CID: 11
                      X-Ms-ApiVersion: Distribute 1.2
                      X-Ms-Region: prod-neu-z1
                      Cache-Control: public, max-age=217728
                      Date: Tue, 01 Oct 2024 04:17:02 GMT
                      Connection: close
                      X-CID: 2


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      3192.168.2.549723184.28.90.27443
                      TimestampBytes transferredDirectionData
                      2024-10-01 04:17:03 UTC239OUTGET /fs/windows/config.json HTTP/1.1
                      Connection: Keep-Alive
                      Accept: */*
                      Accept-Encoding: identity
                      If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
                      Range: bytes=0-2147483646
                      User-Agent: Microsoft BITS/7.8
                      Host: fs.microsoft.com
                      2024-10-01 04:17:03 UTC515INHTTP/1.1 200 OK
                      ApiVersion: Distribute 1.1
                      Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                      Content-Type: application/octet-stream
                      ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                      Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                      Server: ECAcc (lpl/EF06)
                      X-CID: 11
                      X-Ms-ApiVersion: Distribute 1.2
                      X-Ms-Region: prod-weu-z1
                      Cache-Control: public, max-age=217671
                      Date: Tue, 01 Oct 2024 04:17:03 GMT
                      Content-Length: 55
                      Connection: close
                      X-CID: 2
                      2024-10-01 04:17:03 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
                      Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      4192.168.2.549734172.217.16.1424437548C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 04:17:07 UTC1244OUTGET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=1835193244&timestamp=1727756225977 HTTP/1.1
                      Host: accounts.youtube.com
                      Connection: keep-alive
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      sec-ch-ua-full-version: "117.0.5938.132"
                      sec-ch-ua-arch: "x86"
                      sec-ch-ua-platform: "Windows"
                      sec-ch-ua-platform-version: "10.0.0"
                      sec-ch-ua-model: ""
                      sec-ch-ua-bitness: "64"
                      sec-ch-ua-wow64: ?0
                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                      Upgrade-Insecure-Requests: 1
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIkqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: cross-site
                      Sec-Fetch-Mode: navigate
                      Sec-Fetch-User: ?1
                      Sec-Fetch-Dest: iframe
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      2024-10-01 04:17:07 UTC1969INHTTP/1.1 200 OK
                      Content-Type: text/html; charset=utf-8
                      X-Frame-Options: ALLOW-FROM https://accounts.google.com
                      Content-Security-Policy: frame-ancestors https://accounts.google.com
                      Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport
                      Content-Security-Policy: script-src 'report-sample' 'nonce-smUU1QfVYu6EJ5qkVAuHKw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport;worker-src 'self'
                      Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport/allowlist
                      Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                      Pragma: no-cache
                      Expires: Mon, 01 Jan 1990 00:00:00 GMT
                      Date: Tue, 01 Oct 2024 04:17:07 GMT
                      Cross-Origin-Opener-Policy: same-origin
                      Cross-Origin-Resource-Policy: cross-origin
                      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                      reporting-endpoints: default="/_/AccountsDomainCookiesCheckConnectionHttp/web-reports?context=eJzjstDikmII1pBikPj6kkkNiJ3SZ7AGAHHSv_OsBUB8ufsS63UgVu25xGoMxEUSV1gbgFiIh-Pw-7fb2QQ2TNk0iVFJLym_MD4zJTWvJLOkMiU_NzEzLzk_Pzsztbg4tagstSjeyMDIxMDSyEjPwCK-wAAA5aktjw"
                      Server: ESF
                      X-XSS-Protection: 0
                      X-Content-Type-Options: nosniff
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Accept-Ranges: none
                      Vary: Accept-Encoding
                      Connection: close
                      Transfer-Encoding: chunked
                      2024-10-01 04:17:07 UTC1969INData Raw: 37 36 32 30 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 20 6e 6f 6e 63 65 3d 22 73 6d 55 55 31 51 66 56 59 75 36 45 4a 35 71 6b 56 41 75 48 4b 77 22 3e 22 75 73 65 20 73 74 72 69 63 74 22 3b 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 3d 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 7c 7c 7b 7d 3b 28 66 75 6e 63 74 69 6f 6e 28 5f 29 7b 76 61 72 20 77 69 6e 64 6f 77 3d 74 68 69 73 3b 0a 74 72 79 7b 0a 5f 2e 5f 46 5f 74 6f 67 67 6c 65 73 5f 69 6e 69 74 69 61 6c 69 7a 65 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 28 74 79 70 65 6f
                      Data Ascii: 7620<html><head><script nonce="smUU1QfVYu6EJ5qkVAuHKw">"use strict";this.default_AccountsDomaincookiesCheckconnectionJs=this.default_AccountsDomaincookiesCheckconnectionJs||{};(function(_){var window=this;try{_._F_toggles_initialize=function(a){(typeo
                      2024-10-01 04:17:07 UTC1969INData Raw: 54 72 69 64 65 6e 74 5c 2f 28 5c 64 2e 5c 64 29 2f 2e 65 78 65 63 28 62 29 2c 0a 63 5b 31 5d 3d 3d 22 37 2e 30 22 29 69 66 28 62 26 26 62 5b 31 5d 29 73 77 69 74 63 68 28 62 5b 31 5d 29 7b 63 61 73 65 20 22 34 2e 30 22 3a 61 3d 22 38 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 35 2e 30 22 3a 61 3d 22 39 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 36 2e 30 22 3a 61 3d 22 31 30 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 37 2e 30 22 3a 61 3d 22 31 31 2e 30 22 7d 65 6c 73 65 20 61 3d 22 37 2e 30 22 3b 65 6c 73 65 20 61 3d 63 5b 31 5d 3b 62 3d 61 7d 65 6c 73 65 20 62 3d 22 22 3b 72 65 74 75 72 6e 20 62 7d 76 61 72 20 64 3d 52 65 67 45 78 70 28 22 28 5b 41 2d 5a 5d 5b 5c 5c 77 20 5d 2b 29 2f 28 5b 5e 5c 5c 73 5d 2b 29 5c 5c 73 2a 28 3f 3a 5c 5c 28
                      Data Ascii: Trident\/(\d.\d)/.exec(b),c[1]=="7.0")if(b&&b[1])switch(b[1]){case "4.0":a="8.0";break;case "5.0":a="9.0";break;case "6.0":a="10.0";break;case "7.0":a="11.0"}else a="7.0";else a=c[1];b=a}else b="";return b}var d=RegExp("([A-Z][\\w ]+)/([^\\s]+)\\s*(?:\\(
                      2024-10-01 04:17:07 UTC1969INData Raw: 74 63 68 28 74 79 70 65 6f 66 20 61 29 7b 63 61 73 65 20 22 6e 75 6d 62 65 72 22 3a 72 65 74 75 72 6e 20 69 73 46 69 6e 69 74 65 28 61 29 3f 61 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 69 67 69 6e 74 22 3a 72 65 74 75 72 6e 28 41 61 3f 0a 61 3e 3d 42 61 26 26 61 3c 3d 43 61 3a 61 5b 30 5d 3d 3d 3d 22 2d 22 3f 75 61 28 61 2c 44 61 29 3a 75 61 28 61 2c 45 61 29 29 3f 4e 75 6d 62 65 72 28 61 29 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 72 65 74 75 72 6e 20 61 3f 31 3a 30 3b 63 61 73 65 20 22 6f 62 6a 65 63 74 22 3a 69 66 28 61 29 69 66 28 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 61 29 29 7b 69 66 28 43 28 61 29 29 72 65 74 75 72 6e 7d 65 6c 73 65 20 69 66 28 46 61 26 26 61 21 3d 6e 75 6c 6c 26 26 61 20 69 6e
                      Data Ascii: tch(typeof a){case "number":return isFinite(a)?a:String(a);case "bigint":return(Aa?a>=Ba&&a<=Ca:a[0]==="-"?ua(a,Da):ua(a,Ea))?Number(a):String(a);case "boolean":return a?1:0;case "object":if(a)if(Array.isArray(a)){if(C(a))return}else if(Fa&&a!=null&&a in
                      2024-10-01 04:17:07 UTC1969INData Raw: 7b 76 61 72 20 62 3b 69 66 28 61 26 26 28 62 3d 51 61 29 21 3d 6e 75 6c 6c 26 26 62 2e 68 61 73 28 61 29 26 26 28 62 3d 61 2e 43 29 29 66 6f 72 28 76 61 72 20 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 62 5b 63 5d 3b 69 66 28 63 3d 3d 3d 62 2e 6c 65 6e 67 74 68 2d 31 26 26 41 28 64 29 29 66 6f 72 28 76 61 72 20 65 20 69 6e 20 64 29 7b 76 61 72 20 66 3d 64 5b 65 5d 3b 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 66 29 26 26 0a 52 61 28 66 2c 61 29 7d 65 6c 73 65 20 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 64 29 26 26 52 61 28 64 2c 61 29 7d 61 3d 45 3f 61 2e 43 3a 4d 61 28 61 2e 43 2c 50 61 2c 76 6f 69 64 20 30 2c 76 6f 69 64 20 30 2c 21 31 29 3b 65 3d 21 45 3b 69 66 28 62 3d 61 2e 6c 65 6e 67 74 68 29 7b 64 3d 61 5b 62 2d
                      Data Ascii: {var b;if(a&&(b=Qa)!=null&&b.has(a)&&(b=a.C))for(var c=0;c<b.length;c++){var d=b[c];if(c===b.length-1&&A(d))for(var e in d){var f=d[e];Array.isArray(f)&&Ra(f,a)}else Array.isArray(d)&&Ra(d,a)}a=E?a.C:Ma(a.C,Pa,void 0,void 0,!1);e=!E;if(b=a.length){d=a[b-
                      2024-10-01 04:17:07 UTC1969INData Raw: 6f 6c 2e 69 74 65 72 61 74 6f 72 22 2c 66 75 6e 63 74 69 6f 6e 28 61 29 7b 69 66 28 61 29 72 65 74 75 72 6e 20 61 3b 61 3d 53 79 6d 62 6f 6c 28 22 63 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 22 41 72 72 61 79 20 49 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 43 6c 61 6d 70 65 64 41 72 72 61 79 20 49 6e 74 31 36 41 72 72 61 79 20 55 69 6e 74 31 36 41 72 72 61 79 20 49 6e 74 33 32 41 72 72 61 79 20 55 69 6e 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 36 34 41 72 72 61 79 22 2e 73 70 6c 69 74 28 22 20 22 29 2c 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 57 61 5b 62 5b 63 5d 5d 3b 74 79 70 65 6f 66 20 64 3d 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 26 26 74 79 70 65
                      Data Ascii: ol.iterator",function(a){if(a)return a;a=Symbol("c");for(var b="Array Int8Array Uint8Array Uint8ClampedArray Int16Array Uint16Array Int32Array Uint32Array Float32Array Float64Array".split(" "),c=0;c<b.length;c++){var d=Wa[b[c]];typeof d==="function"&&type
                      2024-10-01 04:17:07 UTC1969INData Raw: 29 3b 65 28 22 66 72 65 65 7a 65 22 29 3b 65 28 22 70 72 65 76 65 6e 74 45 78 74 65 6e 73 69 6f 6e 73 22 29 3b 65 28 22 73 65 61 6c 22 29 3b 76 61 72 20 68 3d 30 2c 67 3d 66 75 6e 63 74 69 6f 6e 28 6b 29 7b 74 68 69 73 2e 67 3d 28 68 2b 3d 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2b 31 29 2e 74 6f 53 74 72 69 6e 67 28 29 3b 69 66 28 6b 29 7b 6b 3d 48 28 6b 29 3b 66 6f 72 28 76 61 72 20 6c 3b 21 28 6c 3d 6b 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6c 3d 6c 2e 76 61 6c 75 65 2c 74 68 69 73 2e 73 65 74 28 6c 5b 30 5d 2c 6c 5b 31 5d 29 7d 7d 3b 67 2e 70 72 6f 74 6f 74 79 70 65 2e 73 65 74 3d 66 75 6e 63 74 69 6f 6e 28 6b 2c 6c 29 7b 69 66 28 21 63 28 6b 29 29 74 68 72 6f 77 20 45 72 72 6f 72 28 22 69 22 29 3b 64 28 6b 29 3b 69 66 28 21 49 28 6b 2c 66 29 29
                      Data Ascii: );e("freeze");e("preventExtensions");e("seal");var h=0,g=function(k){this.g=(h+=Math.random()+1).toString();if(k){k=H(k);for(var l;!(l=k.next()).done;)l=l.value,this.set(l[0],l[1])}};g.prototype.set=function(k,l){if(!c(k))throw Error("i");d(k);if(!I(k,f))
                      2024-10-01 04:17:07 UTC1969INData Raw: 75 72 6e 20 67 2e 76 61 6c 75 65 7d 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 2e 66 6f 72 45 61 63 68 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 66 6f 72 28 76 61 72 20 6c 3d 74 68 69 73 2e 65 6e 74 72 69 65 73 28 29 2c 6d 3b 21 28 6d 3d 6c 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6d 3d 0a 6d 2e 76 61 6c 75 65 2c 67 2e 63 61 6c 6c 28 6b 2c 6d 5b 31 5d 2c 6d 5b 30 5d 2c 74 68 69 73 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 5b 53 79 6d 62 6f 6c 2e 69 74 65 72 61 74 6f 72 5d 3d 63 2e 70 72 6f 74 6f 74 79 70 65 2e 65 6e 74 72 69 65 73 3b 76 61 72 20 64 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 76 61 72 20 6c 3d 6b 26 26 74 79 70 65 6f 66 20 6b 3b 6c 3d 3d 22 6f 62 6a 65 63 74 22 7c 7c 6c 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 3f 62 2e 68 61 73 28 6b 29
                      Data Ascii: urn g.value})};c.prototype.forEach=function(g,k){for(var l=this.entries(),m;!(m=l.next()).done;)m=m.value,g.call(k,m[1],m[0],this)};c.prototype[Symbol.iterator]=c.prototype.entries;var d=function(g,k){var l=k&&typeof k;l=="object"||l=="function"?b.has(k)
                      2024-10-01 04:17:07 UTC1969INData Raw: 6f 6e 28 61 29 7b 72 65 74 75 72 6e 20 61 3f 61 3a 66 75 6e 63 74 69 6f 6e 28 62 29 7b 72 65 74 75 72 6e 20 74 79 70 65 6f 66 20 62 3d 3d 3d 22 6e 75 6d 62 65 72 22 26 26 69 73 4e 61 4e 28 62 29 7d 7d 29 3b 76 61 72 20 66 62 3d 66 62 7c 7c 7b 7d 2c 71 3d 74 68 69 73 7c 7c 73 65 6c 66 2c 67 62 3d 71 2e 5f 46 5f 74 6f 67 67 6c 65 73 7c 7c 5b 5d 2c 68 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 61 3d 61 2e 73 70 6c 69 74 28 22 2e 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 71 2c 63 3d 30 3b 63 3c 61 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 69 66 28 62 3d 62 5b 61 5b 63 5d 5d 2c 62 3d 3d 6e 75 6c 6c 29 72 65 74 75 72 6e 20 6e 75 6c 6c 3b 72 65 74 75 72 6e 20 62 7d 2c 69 62 3d 22 63 6c 6f 73 75 72 65 5f 75 69 64 5f 22 2b 28 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2a 31 45
                      Data Ascii: on(a){return a?a:function(b){return typeof b==="number"&&isNaN(b)}});var fb=fb||{},q=this||self,gb=q._F_toggles||[],hb=function(a){a=a.split(".");for(var b=q,c=0;c<a.length;c++)if(b=b[a[c]],b==null)return null;return b},ib="closure_uid_"+(Math.random()*1E
                      2024-10-01 04:17:07 UTC1969INData Raw: 74 65 78 74 5f 5f 39 38 34 33 38 32 3d 7b 7d 29 3b 61 2e 5f 5f 63 6c 6f 73 75 72 65 5f 5f 65 72 72 6f 72 5f 5f 63 6f 6e 74 65 78 74 5f 5f 39 38 34 33 38 32 2e 73 65 76 65 72 69 74 79 3d 62 7d 3b 76 61 72 20 71 62 3d 66 75 6e 63 74 69 6f 6e 28 61 2c 62 2c 63 29 7b 63 3d 63 7c 7c 71 3b 76 61 72 20 64 3d 63 2e 6f 6e 65 72 72 6f 72 2c 65 3d 21 21 62 3b 63 2e 6f 6e 65 72 72 6f 72 3d 66 75 6e 63 74 69 6f 6e 28 66 2c 68 2c 67 2c 6b 2c 6c 29 7b 64 26 26 64 28 66 2c 68 2c 67 2c 6b 2c 6c 29 3b 61 28 7b 6d 65 73 73 61 67 65 3a 66 2c 66 69 6c 65 4e 61 6d 65 3a 68 2c 6c 69 6e 65 3a 67 2c 6c 69 6e 65 4e 75 6d 62 65 72 3a 67 2c 63 61 3a 6b 2c 65 72 72 6f 72 3a 6c 7d 29 3b 72 65 74 75 72 6e 20 65 7d 7d 2c 74 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 76 61 72 20 62 3d 68
                      Data Ascii: text__984382={});a.__closure__error__context__984382.severity=b};var qb=function(a,b,c){c=c||q;var d=c.onerror,e=!!b;c.onerror=function(f,h,g,k,l){d&&d(f,h,g,k,l);a({message:f,fileName:h,line:g,lineNumber:g,ca:k,error:l});return e}},tb=function(a){var b=h
                      2024-10-01 04:17:07 UTC1969INData Raw: 22 6e 75 6d 62 65 72 22 3a 66 3d 53 74 72 69 6e 67 28 66 29 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 66 3d 66 3f 22 74 72 75 65 22 3a 22 66 61 6c 73 65 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 66 75 6e 63 74 69 6f 6e 22 3a 66 3d 28 66 3d 73 62 28 66 29 29 3f 66 3a 22 5b 66 6e 5d 22 3b 62 72 65 61 6b 3b 64 65 66 61 75 6c 74 3a 66 3d 0a 74 79 70 65 6f 66 20 66 7d 66 2e 6c 65 6e 67 74 68 3e 34 30 26 26 28 66 3d 66 2e 73 6c 69 63 65 28 30 2c 34 30 29 2b 22 2e 2e 2e 22 29 3b 63 2e 70 75 73 68 28 66 29 7d 62 2e 70 75 73 68 28 61 29 3b 63 2e 70 75 73 68 28 22 29 5c 6e 22 29 3b 74 72 79 7b 63 2e 70 75 73 68 28 77 62 28 61 2e 63 61 6c 6c 65 72 2c 62 29 29 7d 63 61 74 63 68 28 68 29 7b 63 2e 70 75 73 68 28 22 5b 65 78 63 65 70 74 69 6f 6e
                      Data Ascii: "number":f=String(f);break;case "boolean":f=f?"true":"false";break;case "function":f=(f=sb(f))?f:"[fn]";break;default:f=typeof f}f.length>40&&(f=f.slice(0,40)+"...");c.push(f)}b.push(a);c.push(")\n");try{c.push(wb(a.caller,b))}catch(h){c.push("[exception


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      5192.168.2.549738172.217.16.1424437548C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 04:17:08 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                      Host: play.google.com
                      Connection: keep-alive
                      Accept: */*
                      Access-Control-Request-Method: POST
                      Access-Control-Request-Headers: x-goog-authuser
                      Origin: https://accounts.google.com
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      Sec-Fetch-Mode: cors
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Dest: empty
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      2024-10-01 04:17:08 UTC520INHTTP/1.1 200 OK
                      Access-Control-Allow-Origin: https://accounts.google.com
                      Access-Control-Allow-Methods: GET, POST, OPTIONS
                      Access-Control-Max-Age: 86400
                      Access-Control-Allow-Credentials: true
                      Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                      Content-Type: text/plain; charset=UTF-8
                      Date: Tue, 01 Oct 2024 04:17:08 GMT
                      Server: Playlog
                      Content-Length: 0
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Connection: close


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      6192.168.2.549739172.217.16.1424437548C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 04:17:08 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                      Host: play.google.com
                      Connection: keep-alive
                      Accept: */*
                      Access-Control-Request-Method: POST
                      Access-Control-Request-Headers: x-goog-authuser
                      Origin: https://accounts.google.com
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      Sec-Fetch-Mode: cors
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Dest: empty
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      2024-10-01 04:17:08 UTC520INHTTP/1.1 200 OK
                      Access-Control-Allow-Origin: https://accounts.google.com
                      Access-Control-Allow-Methods: GET, POST, OPTIONS
                      Access-Control-Max-Age: 86400
                      Access-Control-Allow-Credentials: true
                      Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                      Content-Type: text/plain; charset=UTF-8
                      Date: Tue, 01 Oct 2024 04:17:08 GMT
                      Server: Playlog
                      Content-Length: 0
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Connection: close


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      7192.168.2.549745172.217.16.1424437548C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 04:17:09 UTC1132OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                      Host: play.google.com
                      Connection: keep-alive
                      Content-Length: 519
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      sec-ch-ua-arch: "x86"
                      Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                      sec-ch-ua-full-version: "117.0.5938.132"
                      sec-ch-ua-platform-version: "10.0.0"
                      X-Goog-AuthUser: 0
                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                      sec-ch-ua-bitness: "64"
                      sec-ch-ua-model: ""
                      sec-ch-ua-wow64: ?0
                      sec-ch-ua-platform: "Windows"
                      Accept: */*
                      Origin: https://accounts.google.com
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIkqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Mode: cors
                      Sec-Fetch-Dest: empty
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      2024-10-01 04:17:09 UTC519OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 35 36 32 32 37 30 38 32 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727756227082",null,null,null
                      2024-10-01 04:17:09 UTC932INHTTP/1.1 200 OK
                      Access-Control-Allow-Origin: https://accounts.google.com
                      Cross-Origin-Resource-Policy: cross-origin
                      Access-Control-Allow-Credentials: true
                      Access-Control-Allow-Headers: X-Playlog-Web
                      Set-Cookie: NID=517=B0ENCOMkvp-9i7m9VmeBu5m65QSQrqXHJCE8eytr4KDAD3FwY7b2ne2ou3SfOz5thRmm_n8_NjOfb2ccyijEtXaFqxCceIc__B2b2ipTuAy-bq4oF0VVsNC1aC-ESbgRQAI5ZTIQnSqqFheKt5wljtqfO4EVir6m5UGmxxR0Q7lNp8kX5A; expires=Wed, 02-Apr-2025 04:17:09 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                      P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                      Content-Type: text/plain; charset=UTF-8
                      Date: Tue, 01 Oct 2024 04:17:09 GMT
                      Server: Playlog
                      Cache-Control: private
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Accept-Ranges: none
                      Vary: Accept-Encoding
                      Expires: Tue, 01 Oct 2024 04:17:09 GMT
                      Connection: close
                      Transfer-Encoding: chunked
                      2024-10-01 04:17:09 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                      2024-10-01 04:17:09 UTC5INData Raw: 30 0d 0a 0d 0a
                      Data Ascii: 0


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      8192.168.2.549744172.217.16.1424437548C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 04:17:09 UTC1132OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                      Host: play.google.com
                      Connection: keep-alive
                      Content-Length: 519
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      sec-ch-ua-arch: "x86"
                      Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                      sec-ch-ua-full-version: "117.0.5938.132"
                      sec-ch-ua-platform-version: "10.0.0"
                      X-Goog-AuthUser: 0
                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                      sec-ch-ua-bitness: "64"
                      sec-ch-ua-model: ""
                      sec-ch-ua-wow64: ?0
                      sec-ch-ua-platform: "Windows"
                      Accept: */*
                      Origin: https://accounts.google.com
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIkqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Mode: cors
                      Sec-Fetch-Dest: empty
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      2024-10-01 04:17:09 UTC519OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 35 36 32 32 37 34 33 37 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727756227437",null,null,null
                      2024-10-01 04:17:09 UTC932INHTTP/1.1 200 OK
                      Access-Control-Allow-Origin: https://accounts.google.com
                      Cross-Origin-Resource-Policy: cross-origin
                      Access-Control-Allow-Credentials: true
                      Access-Control-Allow-Headers: X-Playlog-Web
                      Set-Cookie: NID=517=qpyNBSLd6FRkZvb02Ao4cx7nrLrnZZ4LYGbSj4uUnyqAHrvclw9CDJ-wmMoEQSfBPac8kcMzJxIIjVtN634ezD7TB1yqdqCxV4CZWrGUwfaiCB5srIhe6u0d0mvayAt9kVs0W_fnOQBpq6P3BCd_ukB2sEcKsKc1XHutkkz3lGYmGAu-og; expires=Wed, 02-Apr-2025 04:17:09 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                      P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                      Content-Type: text/plain; charset=UTF-8
                      Date: Tue, 01 Oct 2024 04:17:09 GMT
                      Server: Playlog
                      Cache-Control: private
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Accept-Ranges: none
                      Vary: Accept-Encoding
                      Expires: Tue, 01 Oct 2024 04:17:09 GMT
                      Connection: close
                      Transfer-Encoding: chunked
                      2024-10-01 04:17:09 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                      2024-10-01 04:17:09 UTC5INData Raw: 30 0d 0a 0d 0a
                      Data Ascii: 0


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      9192.168.2.549717142.250.186.1644437548C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 04:17:09 UTC1221OUTGET /favicon.ico HTTP/1.1
                      Host: www.google.com
                      Connection: keep-alive
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      sec-ch-ua-arch: "x86"
                      sec-ch-ua-full-version: "117.0.5938.132"
                      sec-ch-ua-platform-version: "10.0.0"
                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                      sec-ch-ua-bitness: "64"
                      sec-ch-ua-model: ""
                      sec-ch-ua-wow64: ?0
                      sec-ch-ua-platform: "Windows"
                      Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIkqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Mode: no-cors
                      Sec-Fetch-Dest: image
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      Cookie: NID=517=qpyNBSLd6FRkZvb02Ao4cx7nrLrnZZ4LYGbSj4uUnyqAHrvclw9CDJ-wmMoEQSfBPac8kcMzJxIIjVtN634ezD7TB1yqdqCxV4CZWrGUwfaiCB5srIhe6u0d0mvayAt9kVs0W_fnOQBpq6P3BCd_ukB2sEcKsKc1XHutkkz3lGYmGAu-og
                      2024-10-01 04:17:10 UTC705INHTTP/1.1 200 OK
                      Accept-Ranges: bytes
                      Cross-Origin-Resource-Policy: cross-origin
                      Cross-Origin-Opener-Policy-Report-Only: same-origin; report-to="static-on-bigtable"
                      Report-To: {"group":"static-on-bigtable","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/static-on-bigtable"}]}
                      Content-Length: 5430
                      X-Content-Type-Options: nosniff
                      Server: sffe
                      X-XSS-Protection: 0
                      Date: Tue, 01 Oct 2024 03:27:47 GMT
                      Expires: Wed, 09 Oct 2024 03:27:47 GMT
                      Cache-Control: public, max-age=691200
                      Last-Modified: Tue, 22 Oct 2019 18:30:00 GMT
                      Content-Type: image/x-icon
                      Vary: Accept-Encoding
                      Age: 2962
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Connection: close
                      2024-10-01 04:17:10 UTC685INData Raw: 00 00 01 00 02 00 10 10 00 00 01 00 20 00 68 04 00 00 26 00 00 00 20 20 00 00 01 00 20 00 a8 10 00 00 8e 04 00 00 28 00 00 00 10 00 00 00 20 00 00 00 01 00 20 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 30 fd fd fd 96 fd fd fd d8 fd fd fd f9 fd fd fd f9 fd fd fd d7 fd fd fd 94 fe fe fe 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd 99 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 95 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd c1 ff ff ff ff fa fd f9 ff b4 d9 a7 ff 76 ba 5d ff 58 ab 3a ff 58 aa 3a ff 72 b8 59 ff ac d5 9d ff f8 fb f6 ff ff
                      Data Ascii: h& ( 0.v]X:X:rY
                      2024-10-01 04:17:10 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d8 fd fd fd 99 ff ff ff ff 92 cf fb ff 37 52 ec ff 38 46 ea ff d0 d4 fa ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 96 fe fe fe 32 ff ff ff ff f9 f9 fe ff 56 62 ed ff 35 43 ea ff 3b 49 eb ff 95 9c f4 ff cf d2 fa ff d1 d4 fa ff 96 9d f4 ff 52 5e ed ff e1 e3 fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 30 00 00 00 00 fd fd fd 9d ff ff ff ff e8 ea fd ff 58 63 ee ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 6c 76 f0 ff ff ff ff ff ff ff ff ff fd fd fd 98 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd c3 ff ff ff ff f9 f9 fe ff a5 ac f6 ff 5d 69 ee ff 3c 4a
                      Data Ascii: 7R8F2Vb5C;IR^0Xc5C5C5C5C5C5Clv]i<J
                      2024-10-01 04:17:10 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff fd fd fd d0 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fd fd fd 8b ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff b1 d8 a3 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 60 a5 35 ff ca 8e 3e ff f9 c1 9f ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 87 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 25 fd fd fd fb ff ff ff ff ff ff ff ff ff ff ff ff c2 e0 b7 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 6e b6 54 ff 9f ce 8d ff b7 da aa ff b8 db ab ff a5 d2 95 ff 7b bc 64 ff 54 a8 35 ff 53 a8 34 ff 77 a0 37 ff e3 89 41 ff f4 85 42 ff f4 85 42 ff
                      Data Ascii: S4S4S4S4S4S4S4S4S4S4S4S4S4S4`5>%S4S4S4S4S4S4nT{dT5S4w7ABB
                      2024-10-01 04:17:10 UTC1390INData Raw: ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff fb d5 bf ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd ea fd fd fd cb ff ff ff ff ff ff ff ff ff ff ff ff 46 cd fc ff 05 bc fb ff 05 bc fb ff 05 bc fb ff 21 ae f9 ff fb fb ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd c8 fd fd fd 9c ff ff ff ff ff ff ff ff ff ff ff ff 86 df fd ff 05 bc fb ff 05 bc fb ff 15 93 f5 ff 34 49 eb ff b3 b8 f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                      Data Ascii: BBBBBBF!4I
                      2024-10-01 04:17:10 UTC575INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d2 fe fe fe 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd 8d fd fd fd fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd fb fd fd fd 8b fe fe fe 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 27 fd fd fd 9f fd fd fd f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                      Data Ascii: $'


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      10192.168.2.5497504.175.87.197443
                      TimestampBytes transferredDirectionData
                      2024-10-01 04:17:14 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=kKN7D7gLng6rxTc&MD=E4HEG3fR HTTP/1.1
                      Connection: Keep-Alive
                      Accept: */*
                      User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                      Host: slscr.update.microsoft.com
                      2024-10-01 04:17:14 UTC560INHTTP/1.1 200 OK
                      Cache-Control: no-cache
                      Pragma: no-cache
                      Content-Type: application/octet-stream
                      Expires: -1
                      Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                      ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                      MS-CorrelationId: ec57ea65-aa89-400d-8f32-68b4a630291f
                      MS-RequestId: 2cc4c945-fab4-471d-b776-3d728ca09a3a
                      MS-CV: kJjl9UXrTEak1ODW.0
                      X-Microsoft-SLSClientCache: 2880
                      Content-Disposition: attachment; filename=environment.cab
                      X-Content-Type-Options: nosniff
                      Date: Tue, 01 Oct 2024 04:17:13 GMT
                      Connection: close
                      Content-Length: 24490
                      2024-10-01 04:17:14 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                      Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                      2024-10-01 04:17:14 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                      Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      11192.168.2.549756172.217.16.1424437548C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 04:17:16 UTC1306OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                      Host: play.google.com
                      Connection: keep-alive
                      Content-Length: 1218
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      sec-ch-ua-arch: "x86"
                      Content-Type: text/plain;charset=UTF-8
                      sec-ch-ua-full-version: "117.0.5938.132"
                      sec-ch-ua-platform-version: "10.0.0"
                      X-Goog-AuthUser: 0
                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                      sec-ch-ua-bitness: "64"
                      sec-ch-ua-model: ""
                      sec-ch-ua-wow64: ?0
                      sec-ch-ua-platform: "Windows"
                      Accept: */*
                      Origin: https://accounts.google.com
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIkqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Mode: cors
                      Sec-Fetch-Dest: empty
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      Cookie: NID=517=qpyNBSLd6FRkZvb02Ao4cx7nrLrnZZ4LYGbSj4uUnyqAHrvclw9CDJ-wmMoEQSfBPac8kcMzJxIIjVtN634ezD7TB1yqdqCxV4CZWrGUwfaiCB5srIhe6u0d0mvayAt9kVs0W_fnOQBpq6P3BCd_ukB2sEcKsKc1XHutkkz3lGYmGAu-og
                      2024-10-01 04:17:16 UTC1218OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 34 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 35 35 38 2c 5b 5b 22 31 37 32 37 37 35 36 32 32 35 30 30 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c
                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,null,null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[4,0,0,0,0]]],558,[["1727756225000",null,null,null,
                      2024-10-01 04:17:16 UTC940INHTTP/1.1 200 OK
                      Access-Control-Allow-Origin: https://accounts.google.com
                      Cross-Origin-Resource-Policy: cross-origin
                      Access-Control-Allow-Credentials: true
                      Access-Control-Allow-Headers: X-Playlog-Web
                      Set-Cookie: NID=517=m3hwRptIMGWR9sNHSc-4D_ydzbrligBZ1wcWT28wVOFpkgR7zNpMIyz2FQwYpTZ1TTNTuH1XHAXBLp8hPBgp4XyNuIAqr1jNVBeSEG3DYr8c-dEJzf36YgfcVxRdO5_dxAfD3DTqtlEen8DkQbdBvmqhRb6EFtkulNWDXjdMwPRwltHHmqlZ9GgfqQ; expires=Wed, 02-Apr-2025 04:17:16 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                      P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                      Content-Type: text/plain; charset=UTF-8
                      Date: Tue, 01 Oct 2024 04:17:16 GMT
                      Server: Playlog
                      Cache-Control: private
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Accept-Ranges: none
                      Vary: Accept-Encoding
                      Expires: Tue, 01 Oct 2024 04:17:16 GMT
                      Connection: close
                      Transfer-Encoding: chunked
                      2024-10-01 04:17:16 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                      2024-10-01 04:17:16 UTC5INData Raw: 30 0d 0a 0d 0a
                      Data Ascii: 0


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      12192.168.2.549758172.217.16.1424437548C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 04:17:38 UTC1337OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                      Host: play.google.com
                      Connection: keep-alive
                      Content-Length: 1264
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      sec-ch-ua-arch: "x86"
                      Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                      sec-ch-ua-full-version: "117.0.5938.132"
                      sec-ch-ua-platform-version: "10.0.0"
                      X-Goog-AuthUser: 0
                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                      sec-ch-ua-bitness: "64"
                      sec-ch-ua-model: ""
                      sec-ch-ua-wow64: ?0
                      sec-ch-ua-platform: "Windows"
                      Accept: */*
                      Origin: https://accounts.google.com
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIkqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Mode: cors
                      Sec-Fetch-Dest: empty
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      Cookie: NID=517=m3hwRptIMGWR9sNHSc-4D_ydzbrligBZ1wcWT28wVOFpkgR7zNpMIyz2FQwYpTZ1TTNTuH1XHAXBLp8hPBgp4XyNuIAqr1jNVBeSEG3DYr8c-dEJzf36YgfcVxRdO5_dxAfD3DTqtlEen8DkQbdBvmqhRb6EFtkulNWDXjdMwPRwltHHmqlZ9GgfqQ
                      2024-10-01 04:17:38 UTC1264OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 35 36 32 35 37 38 31 38 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727756257818",null,null,null
                      2024-10-01 04:17:39 UTC523INHTTP/1.1 200 OK
                      Access-Control-Allow-Origin: https://accounts.google.com
                      Cross-Origin-Resource-Policy: cross-origin
                      Access-Control-Allow-Credentials: true
                      Access-Control-Allow-Headers: X-Playlog-Web
                      Content-Type: text/plain; charset=UTF-8
                      Date: Tue, 01 Oct 2024 04:17:39 GMT
                      Server: Playlog
                      Cache-Control: private
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Accept-Ranges: none
                      Vary: Accept-Encoding
                      Connection: close
                      Transfer-Encoding: chunked
                      2024-10-01 04:17:39 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                      2024-10-01 04:17:39 UTC5INData Raw: 30 0d 0a 0d 0a
                      Data Ascii: 0


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      13192.168.2.549759172.217.16.1424437548C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 04:17:38 UTC1337OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                      Host: play.google.com
                      Connection: keep-alive
                      Content-Length: 1366
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      sec-ch-ua-arch: "x86"
                      Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                      sec-ch-ua-full-version: "117.0.5938.132"
                      sec-ch-ua-platform-version: "10.0.0"
                      X-Goog-AuthUser: 0
                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                      sec-ch-ua-bitness: "64"
                      sec-ch-ua-model: ""
                      sec-ch-ua-wow64: ?0
                      sec-ch-ua-platform: "Windows"
                      Accept: */*
                      Origin: https://accounts.google.com
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIkqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Mode: cors
                      Sec-Fetch-Dest: empty
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      Cookie: NID=517=m3hwRptIMGWR9sNHSc-4D_ydzbrligBZ1wcWT28wVOFpkgR7zNpMIyz2FQwYpTZ1TTNTuH1XHAXBLp8hPBgp4XyNuIAqr1jNVBeSEG3DYr8c-dEJzf36YgfcVxRdO5_dxAfD3DTqtlEen8DkQbdBvmqhRb6EFtkulNWDXjdMwPRwltHHmqlZ9GgfqQ
                      2024-10-01 04:17:38 UTC1366OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 35 36 32 35 37 38 36 38 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727756257868",null,null,null
                      2024-10-01 04:17:39 UTC523INHTTP/1.1 200 OK
                      Access-Control-Allow-Origin: https://accounts.google.com
                      Cross-Origin-Resource-Policy: cross-origin
                      Access-Control-Allow-Credentials: true
                      Access-Control-Allow-Headers: X-Playlog-Web
                      Content-Type: text/plain; charset=UTF-8
                      Date: Tue, 01 Oct 2024 04:17:39 GMT
                      Server: Playlog
                      Cache-Control: private
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Accept-Ranges: none
                      Vary: Accept-Encoding
                      Connection: close
                      Transfer-Encoding: chunked
                      2024-10-01 04:17:39 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                      2024-10-01 04:17:39 UTC5INData Raw: 30 0d 0a 0d 0a
                      Data Ascii: 0


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      14192.168.2.549760172.217.16.1424437548C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 04:17:39 UTC1297OUTPOST /log?hasfast=true&authuser=0&format=json HTTP/1.1
                      Host: play.google.com
                      Connection: keep-alive
                      Content-Length: 1027
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      sec-ch-ua-arch: "x86"
                      sec-ch-ua-full-version: "117.0.5938.132"
                      Content-Type: text/plain;charset=UTF-8
                      sec-ch-ua-platform-version: "10.0.0"
                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                      sec-ch-ua-bitness: "64"
                      sec-ch-ua-model: ""
                      sec-ch-ua-wow64: ?0
                      sec-ch-ua-platform: "Windows"
                      Accept: */*
                      Origin: https://accounts.google.com
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIkqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Mode: no-cors
                      Sec-Fetch-Dest: empty
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      Cookie: NID=517=m3hwRptIMGWR9sNHSc-4D_ydzbrligBZ1wcWT28wVOFpkgR7zNpMIyz2FQwYpTZ1TTNTuH1XHAXBLp8hPBgp4XyNuIAqr1jNVBeSEG3DYr8c-dEJzf36YgfcVxRdO5_dxAfD3DTqtlEen8DkQbdBvmqhRb6EFtkulNWDXjdMwPRwltHHmqlZ9GgfqQ
                      2024-10-01 04:17:39 UTC1027OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 62 6f 71 5f 69 64 65 6e 74 69 74 79 66 72 6f 6e 74 65 6e 64 61 75 74 68 75 69 73 65 72 76 65 72 5f 32 30 32 34 30 39 32 34 2e 30 32 5f 70 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 33 2c 30 2c 30
                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"boq_identityfrontendauthuiserver_20240924.02_p0",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[3,0,0
                      2024-10-01 04:17:40 UTC523INHTTP/1.1 200 OK
                      Access-Control-Allow-Origin: https://accounts.google.com
                      Cross-Origin-Resource-Policy: cross-origin
                      Access-Control-Allow-Credentials: true
                      Access-Control-Allow-Headers: X-Playlog-Web
                      Content-Type: text/plain; charset=UTF-8
                      Date: Tue, 01 Oct 2024 04:17:39 GMT
                      Server: Playlog
                      Cache-Control: private
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Accept-Ranges: none
                      Vary: Accept-Encoding
                      Connection: close
                      Transfer-Encoding: chunked
                      2024-10-01 04:17:40 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                      2024-10-01 04:17:40 UTC5INData Raw: 30 0d 0a 0d 0a
                      Data Ascii: 0


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      15192.168.2.5497614.175.87.197443
                      TimestampBytes transferredDirectionData
                      2024-10-01 04:17:52 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=kKN7D7gLng6rxTc&MD=E4HEG3fR HTTP/1.1
                      Connection: Keep-Alive
                      Accept: */*
                      User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                      Host: slscr.update.microsoft.com
                      2024-10-01 04:17:52 UTC560INHTTP/1.1 200 OK
                      Cache-Control: no-cache
                      Pragma: no-cache
                      Content-Type: application/octet-stream
                      Expires: -1
                      Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                      ETag: "vic+p1MiJJ+/WMnK08jaWnCBGDfvkGRzPk9f8ZadQHg=_1440"
                      MS-CorrelationId: f82b1213-3e3c-4c9f-a76c-e3642727ff5a
                      MS-RequestId: e12a2b42-5fb4-4131-84da-18323836acc8
                      MS-CV: 1qDo5b3qNEebPPSS.0
                      X-Microsoft-SLSClientCache: 1440
                      Content-Disposition: attachment; filename=environment.cab
                      X-Content-Type-Options: nosniff
                      Date: Tue, 01 Oct 2024 04:17:52 GMT
                      Connection: close
                      Content-Length: 30005
                      2024-10-01 04:17:52 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 8d 2b 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 5b 49 00 00 14 00 00 00 00 00 10 00 8d 2b 00 00 a8 49 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 72 4d 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 fe f6 51 be 21 2b 72 4d 43 4b ed 7c 05 58 54 eb da f6 14 43 49 37 0a 02 d2 b9 86 0e 41 52 a4 1b 24 a5 bb 43 24 44 18 94 90 92 52 41 3a 05 09 95 ee 54 b0 00 91 2e e9 12 10 04 11 c9 6f 10 b7 a2 67 9f bd cf 3e ff b7 ff b3 bf 73 ed e1 9a 99 f5 c6 7a d7 bb de f5 3e cf fd 3c f7 dc 17 4a 1a 52 e7 41 a8 97 1e 14 f4 e5 25 7d f4 05 82 82 c1 20 30 08 06 ba c3 05 02 11 7f a9 c1 ff d2 87 5c 1e f4 ed 65 8e 7a 1f f6 0a 40 03 1d 7b f9 83 2c 1c 2f db b8 3a 39 3a 58 38 ba 73 5e
                      Data Ascii: MSCF+D[I+IdrMenvironment.cabQ!+rMCK|XTCI7AR$C$DRA:T.og>sz><JRA%} 0\ez@{,/:9:X8s^
                      2024-10-01 04:17:52 UTC14181INData Raw: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 26 30 24 06 03 55 04 03 13 1d 4d 69 63 72 6f 73 6f 66 74 20 54 69 6d 65 2d 53 74 61 6d 70 20 50 43 41 20 32 30 31 30 30 1e 17 0d 32 33 31 30 31 32 31 39 30 37 32 35 5a 17 0d 32 35 30 31 31 30 31 39 30 37 32 35 5a 30 81 d2 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 2d 30 2b 06 03 55 04 0b 13 24 4d 69 63 72 6f
                      Data Ascii: UUS10UWashington10URedmond10UMicrosoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100231012190725Z250110190725Z010UUS10UWashington10URedmond10UMicrosoft Corporation1-0+U$Micro


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      16192.168.2.549765142.250.185.1104437548C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 04:18:09 UTC1337OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                      Host: play.google.com
                      Connection: keep-alive
                      Content-Length: 1431
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      sec-ch-ua-arch: "x86"
                      Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                      sec-ch-ua-full-version: "117.0.5938.132"
                      sec-ch-ua-platform-version: "10.0.0"
                      X-Goog-AuthUser: 0
                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                      sec-ch-ua-bitness: "64"
                      sec-ch-ua-model: ""
                      sec-ch-ua-wow64: ?0
                      sec-ch-ua-platform: "Windows"
                      Accept: */*
                      Origin: https://accounts.google.com
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIkqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Mode: cors
                      Sec-Fetch-Dest: empty
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      Cookie: NID=517=m3hwRptIMGWR9sNHSc-4D_ydzbrligBZ1wcWT28wVOFpkgR7zNpMIyz2FQwYpTZ1TTNTuH1XHAXBLp8hPBgp4XyNuIAqr1jNVBeSEG3DYr8c-dEJzf36YgfcVxRdO5_dxAfD3DTqtlEen8DkQbdBvmqhRb6EFtkulNWDXjdMwPRwltHHmqlZ9GgfqQ
                      2024-10-01 04:18:09 UTC1431OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 35 36 32 38 38 31 30 31 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727756288101",null,null,null
                      2024-10-01 04:18:09 UTC523INHTTP/1.1 200 OK
                      Access-Control-Allow-Origin: https://accounts.google.com
                      Cross-Origin-Resource-Policy: cross-origin
                      Access-Control-Allow-Credentials: true
                      Access-Control-Allow-Headers: X-Playlog-Web
                      Content-Type: text/plain; charset=UTF-8
                      Date: Tue, 01 Oct 2024 04:18:09 GMT
                      Server: Playlog
                      Cache-Control: private
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Accept-Ranges: none
                      Vary: Accept-Encoding
                      Connection: close
                      Transfer-Encoding: chunked
                      2024-10-01 04:18:09 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                      2024-10-01 04:18:09 UTC5INData Raw: 30 0d 0a 0d 0a
                      Data Ascii: 0


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      17192.168.2.549766142.250.185.1104437548C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 04:18:11 UTC1337OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                      Host: play.google.com
                      Connection: keep-alive
                      Content-Length: 1405
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      sec-ch-ua-arch: "x86"
                      Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                      sec-ch-ua-full-version: "117.0.5938.132"
                      sec-ch-ua-platform-version: "10.0.0"
                      X-Goog-AuthUser: 0
                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                      sec-ch-ua-bitness: "64"
                      sec-ch-ua-model: ""
                      sec-ch-ua-wow64: ?0
                      sec-ch-ua-platform: "Windows"
                      Accept: */*
                      Origin: https://accounts.google.com
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIkqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Mode: cors
                      Sec-Fetch-Dest: empty
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      Cookie: NID=517=m3hwRptIMGWR9sNHSc-4D_ydzbrligBZ1wcWT28wVOFpkgR7zNpMIyz2FQwYpTZ1TTNTuH1XHAXBLp8hPBgp4XyNuIAqr1jNVBeSEG3DYr8c-dEJzf36YgfcVxRdO5_dxAfD3DTqtlEen8DkQbdBvmqhRb6EFtkulNWDXjdMwPRwltHHmqlZ9GgfqQ
                      2024-10-01 04:18:11 UTC1405OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 35 36 32 39 30 32 39 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727756290290",null,null,null
                      2024-10-01 04:18:11 UTC523INHTTP/1.1 200 OK
                      Access-Control-Allow-Origin: https://accounts.google.com
                      Cross-Origin-Resource-Policy: cross-origin
                      Access-Control-Allow-Credentials: true
                      Access-Control-Allow-Headers: X-Playlog-Web
                      Content-Type: text/plain; charset=UTF-8
                      Date: Tue, 01 Oct 2024 04:18:11 GMT
                      Server: Playlog
                      Cache-Control: private
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Accept-Ranges: none
                      Vary: Accept-Encoding
                      Connection: close
                      Transfer-Encoding: chunked
                      2024-10-01 04:18:11 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                      2024-10-01 04:18:11 UTC5INData Raw: 30 0d 0a 0d 0a
                      Data Ascii: 0


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      18192.168.2.549768142.250.185.1104437548C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 04:18:41 UTC1337OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                      Host: play.google.com
                      Connection: keep-alive
                      Content-Length: 1444
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      sec-ch-ua-arch: "x86"
                      Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                      sec-ch-ua-full-version: "117.0.5938.132"
                      sec-ch-ua-platform-version: "10.0.0"
                      X-Goog-AuthUser: 0
                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                      sec-ch-ua-bitness: "64"
                      sec-ch-ua-model: ""
                      sec-ch-ua-wow64: ?0
                      sec-ch-ua-platform: "Windows"
                      Accept: */*
                      Origin: https://accounts.google.com
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIkqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Mode: cors
                      Sec-Fetch-Dest: empty
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      Cookie: NID=517=m3hwRptIMGWR9sNHSc-4D_ydzbrligBZ1wcWT28wVOFpkgR7zNpMIyz2FQwYpTZ1TTNTuH1XHAXBLp8hPBgp4XyNuIAqr1jNVBeSEG3DYr8c-dEJzf36YgfcVxRdO5_dxAfD3DTqtlEen8DkQbdBvmqhRb6EFtkulNWDXjdMwPRwltHHmqlZ9GgfqQ
                      2024-10-01 04:18:41 UTC1444OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 35 36 33 32 30 31 37 39 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727756320179",null,null,null
                      2024-10-01 04:18:41 UTC523INHTTP/1.1 200 OK
                      Access-Control-Allow-Origin: https://accounts.google.com
                      Cross-Origin-Resource-Policy: cross-origin
                      Access-Control-Allow-Credentials: true
                      Access-Control-Allow-Headers: X-Playlog-Web
                      Content-Type: text/plain; charset=UTF-8
                      Date: Tue, 01 Oct 2024 04:18:41 GMT
                      Server: Playlog
                      Cache-Control: private
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Accept-Ranges: none
                      Vary: Accept-Encoding
                      Connection: close
                      Transfer-Encoding: chunked
                      2024-10-01 04:18:41 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                      2024-10-01 04:18:41 UTC5INData Raw: 30 0d 0a 0d 0a
                      Data Ascii: 0


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      19192.168.2.549769142.250.185.1104437548C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 04:18:42 UTC1337OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                      Host: play.google.com
                      Connection: keep-alive
                      Content-Length: 1185
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      sec-ch-ua-arch: "x86"
                      Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                      sec-ch-ua-full-version: "117.0.5938.132"
                      sec-ch-ua-platform-version: "10.0.0"
                      X-Goog-AuthUser: 0
                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                      sec-ch-ua-bitness: "64"
                      sec-ch-ua-model: ""
                      sec-ch-ua-wow64: ?0
                      sec-ch-ua-platform: "Windows"
                      Accept: */*
                      Origin: https://accounts.google.com
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIkqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Mode: cors
                      Sec-Fetch-Dest: empty
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      Cookie: NID=517=m3hwRptIMGWR9sNHSc-4D_ydzbrligBZ1wcWT28wVOFpkgR7zNpMIyz2FQwYpTZ1TTNTuH1XHAXBLp8hPBgp4XyNuIAqr1jNVBeSEG3DYr8c-dEJzf36YgfcVxRdO5_dxAfD3DTqtlEen8DkQbdBvmqhRb6EFtkulNWDXjdMwPRwltHHmqlZ9GgfqQ
                      2024-10-01 04:18:42 UTC1185OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 35 36 33 32 31 34 34 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727756321440",null,null,null
                      2024-10-01 04:18:42 UTC523INHTTP/1.1 200 OK
                      Access-Control-Allow-Origin: https://accounts.google.com
                      Cross-Origin-Resource-Policy: cross-origin
                      Access-Control-Allow-Credentials: true
                      Access-Control-Allow-Headers: X-Playlog-Web
                      Content-Type: text/plain; charset=UTF-8
                      Date: Tue, 01 Oct 2024 04:18:42 GMT
                      Server: Playlog
                      Cache-Control: private
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Accept-Ranges: none
                      Vary: Accept-Encoding
                      Connection: close
                      Transfer-Encoding: chunked
                      2024-10-01 04:18:42 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                      2024-10-01 04:18:42 UTC5INData Raw: 30 0d 0a 0d 0a
                      Data Ascii: 0


                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:00:16:55
                      Start date:01/10/2024
                      Path:C:\Users\user\Desktop\file.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\file.exe"
                      Imagebase:0x680000
                      File size:917'504 bytes
                      MD5 hash:01C227C31AFB774DF17EA789878018A4
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Target ID:1
                      Start time:00:16:55
                      Start date:01/10/2024
                      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecovery
                      Imagebase:0x7ff715980000
                      File size:3'242'272 bytes
                      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:4
                      Start time:00:16:56
                      Start date:01/10/2024
                      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=2000,i,9753138536552679466,13078363827801133179,262144 --disable-features=CrashRecovery /prefetch:8
                      Imagebase:0x7ff715980000
                      File size:3'242'272 bytes
                      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:5
                      Start time:00:17:07
                      Start date:01/10/2024
                      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5572 --field-trial-handle=2000,i,9753138536552679466,13078363827801133179,262144 --disable-features=CrashRecovery /prefetch:8
                      Imagebase:0x7ff715980000
                      File size:3'242'272 bytes
                      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:6
                      Start time:00:17:07
                      Start date:01/10/2024
                      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4596 --field-trial-handle=2000,i,9753138536552679466,13078363827801133179,262144 --disable-features=CrashRecovery /prefetch:8
                      Imagebase:0x7ff715980000
                      File size:3'242'272 bytes
                      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:1.8%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:7.2%
                        Total number of Nodes:1416
                        Total number of Limit Nodes:46
                        execution_graph 94939 681cad SystemParametersInfoW 94940 6b8402 94945 6b81be 94940->94945 94943 6b842a 94946 6b81ef try_get_first_available_module 94945->94946 94956 6b8338 94946->94956 94960 6a8e0b 40 API calls 2 library calls 94946->94960 94948 6b83ee 94964 6b27ec 26 API calls pre_c_initialization 94948->94964 94950 6b8343 94950->94943 94957 6c0984 94950->94957 94952 6b838c 94952->94956 94961 6a8e0b 40 API calls 2 library calls 94952->94961 94954 6b83ab 94954->94956 94962 6a8e0b 40 API calls 2 library calls 94954->94962 94956->94950 94963 6af2d9 20 API calls _free 94956->94963 94965 6c0081 94957->94965 94959 6c099f 94959->94943 94960->94952 94961->94954 94962->94956 94963->94948 94964->94950 94967 6c008d BuildCatchObjectHelperInternal 94965->94967 94966 6c009b 95023 6af2d9 20 API calls _free 94966->95023 94967->94966 94969 6c00d4 94967->94969 94976 6c065b 94969->94976 94970 6c00a0 95024 6b27ec 26 API calls pre_c_initialization 94970->95024 94975 6c00aa __wsopen_s 94975->94959 95026 6c042f 94976->95026 94979 6c068d 95058 6af2c6 20 API calls _free 94979->95058 94980 6c06a6 95044 6b5221 94980->95044 94983 6c06ab 94985 6c06cb 94983->94985 94986 6c06b4 94983->94986 94984 6c0692 95059 6af2d9 20 API calls _free 94984->95059 95057 6c039a CreateFileW 94985->95057 95060 6af2c6 20 API calls _free 94986->95060 94990 6c06b9 95061 6af2d9 20 API calls _free 94990->95061 94991 6c00f8 95025 6c0121 LeaveCriticalSection __wsopen_s 94991->95025 94993 6c0781 GetFileType 94994 6c078c GetLastError 94993->94994 94995 6c07d3 94993->94995 95064 6af2a3 20 API calls 2 library calls 94994->95064 95066 6b516a 21 API calls 3 library calls 94995->95066 94996 6c0756 GetLastError 95063 6af2a3 20 API calls 2 library calls 94996->95063 94999 6c0704 94999->94993 94999->94996 95062 6c039a CreateFileW 94999->95062 95000 6c079a CloseHandle 95000->94984 95002 6c07c3 95000->95002 95065 6af2d9 20 API calls _free 95002->95065 95004 6c0749 95004->94993 95004->94996 95006 6c07f4 95007 6c0840 95006->95007 95067 6c05ab 72 API calls 4 library calls 95006->95067 95012 6c086d 95007->95012 95068 6c014d 72 API calls 4 library calls 95007->95068 95008 6c07c8 95008->94984 95011 6c0866 95011->95012 95013 6c087e 95011->95013 95069 6b86ae 95012->95069 95013->94991 95015 6c08fc CloseHandle 95013->95015 95084 6c039a CreateFileW 95015->95084 95017 6c0927 95018 6c0931 GetLastError 95017->95018 95022 6c095d 95017->95022 95085 6af2a3 20 API calls 2 library calls 95018->95085 95020 6c093d 95086 6b5333 21 API calls 3 library calls 95020->95086 95022->94991 95023->94970 95024->94975 95025->94975 95027 6c046a 95026->95027 95028 6c0450 95026->95028 95087 6c03bf 95027->95087 95028->95027 95094 6af2d9 20 API calls _free 95028->95094 95031 6c045f 95095 6b27ec 26 API calls pre_c_initialization 95031->95095 95033 6c04a2 95034 6c04d1 95033->95034 95096 6af2d9 20 API calls _free 95033->95096 95037 6c0524 95034->95037 95098 6ad70d 26 API calls 2 library calls 95034->95098 95037->94979 95037->94980 95038 6c051f 95038->95037 95040 6c059e 95038->95040 95039 6c04c6 95097 6b27ec 26 API calls pre_c_initialization 95039->95097 95099 6b27fc 11 API calls _abort 95040->95099 95043 6c05aa 95045 6b522d BuildCatchObjectHelperInternal 95044->95045 95102 6b2f5e EnterCriticalSection 95045->95102 95047 6b527b 95103 6b532a 95047->95103 95049 6b5259 95106 6b5000 21 API calls 2 library calls 95049->95106 95050 6b5234 95050->95047 95050->95049 95054 6b52c7 EnterCriticalSection 95050->95054 95052 6b52a4 __wsopen_s 95052->94983 95053 6b525e 95053->95047 95107 6b5147 EnterCriticalSection 95053->95107 95054->95047 95056 6b52d4 LeaveCriticalSection 95054->95056 95056->95050 95057->94999 95058->94984 95059->94991 95060->94990 95061->94984 95062->95004 95063->94984 95064->95000 95065->95008 95066->95006 95067->95007 95068->95011 95109 6b53c4 95069->95109 95071 6b86c4 95122 6b5333 21 API calls 3 library calls 95071->95122 95073 6b86be 95073->95071 95074 6b86f6 95073->95074 95076 6b53c4 __wsopen_s 26 API calls 95073->95076 95074->95071 95077 6b53c4 __wsopen_s 26 API calls 95074->95077 95075 6b871c 95079 6b873e 95075->95079 95123 6af2a3 20 API calls 2 library calls 95075->95123 95080 6b86ed 95076->95080 95078 6b8702 CloseHandle 95077->95078 95078->95071 95081 6b870e GetLastError 95078->95081 95079->94991 95083 6b53c4 __wsopen_s 26 API calls 95080->95083 95081->95071 95083->95074 95084->95017 95085->95020 95086->95022 95088 6c03d7 95087->95088 95091 6c03f2 95088->95091 95100 6af2d9 20 API calls _free 95088->95100 95090 6c0416 95101 6b27ec 26 API calls pre_c_initialization 95090->95101 95091->95033 95093 6c0421 95093->95033 95094->95031 95095->95027 95096->95039 95097->95034 95098->95038 95099->95043 95100->95090 95101->95093 95102->95050 95108 6b2fa6 LeaveCriticalSection 95103->95108 95105 6b5331 95105->95052 95106->95053 95107->95047 95108->95105 95110 6b53d1 95109->95110 95112 6b53e6 95109->95112 95124 6af2c6 20 API calls _free 95110->95124 95117 6b540b 95112->95117 95126 6af2c6 20 API calls _free 95112->95126 95114 6b53d6 95125 6af2d9 20 API calls _free 95114->95125 95115 6b5416 95127 6af2d9 20 API calls _free 95115->95127 95117->95073 95119 6b53de 95119->95073 95120 6b541e 95128 6b27ec 26 API calls pre_c_initialization 95120->95128 95122->95075 95123->95079 95124->95114 95125->95119 95126->95115 95127->95120 95128->95119 95129 6c2ba5 95130 6c2baf 95129->95130 95131 682b25 95129->95131 95175 683a5a 95130->95175 95157 682b83 7 API calls 95131->95157 95135 6c2bb8 95182 689cb3 95135->95182 95138 682b2f 95147 682b44 95138->95147 95161 683837 95138->95161 95139 6c2bc6 95140 6c2bce 95139->95140 95141 6c2bf5 95139->95141 95188 6833c6 95140->95188 95144 6833c6 22 API calls 95141->95144 95155 6c2bf1 GetForegroundWindow ShellExecuteW 95144->95155 95148 682b5f 95147->95148 95171 6830f2 95147->95171 95154 682b66 SetCurrentDirectoryW 95148->95154 95150 6c2be7 95153 6833c6 22 API calls 95150->95153 95152 6c2c26 95152->95148 95153->95155 95156 682b7a 95154->95156 95155->95152 95198 682cd4 7 API calls 95157->95198 95159 682b2a 95160 682c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 95159->95160 95160->95138 95162 683862 ___scrt_fastfail 95161->95162 95199 684212 95162->95199 95165 6838e8 95167 6c3386 Shell_NotifyIconW 95165->95167 95168 683906 Shell_NotifyIconW 95165->95168 95203 683923 95168->95203 95170 68391c 95170->95147 95172 683154 95171->95172 95173 683104 ___scrt_fastfail 95171->95173 95172->95148 95174 683123 Shell_NotifyIconW 95173->95174 95174->95172 95292 6c1f50 95175->95292 95178 689cb3 22 API calls 95179 683a8d 95178->95179 95294 683aa2 95179->95294 95181 683a97 95181->95135 95183 689cc2 _wcslen 95182->95183 95184 69fe0b 22 API calls 95183->95184 95185 689cea __fread_nolock 95184->95185 95186 69fddb 22 API calls 95185->95186 95187 689d00 95186->95187 95187->95139 95189 6833dd 95188->95189 95190 6c30bb 95188->95190 95314 6833ee 95189->95314 95192 69fddb 22 API calls 95190->95192 95194 6c30c5 _wcslen 95192->95194 95193 6833e8 95197 686350 22 API calls 95193->95197 95195 69fe0b 22 API calls 95194->95195 95196 6c30fe __fread_nolock 95195->95196 95197->95150 95198->95159 95200 6c35a4 95199->95200 95201 6838b7 95199->95201 95200->95201 95202 6c35ad DestroyIcon 95200->95202 95201->95165 95225 6ec874 42 API calls _strftime 95201->95225 95202->95201 95204 68393f 95203->95204 95223 683a13 95203->95223 95226 686270 95204->95226 95207 68395a 95231 686b57 95207->95231 95208 6c3393 LoadStringW 95210 6c33ad 95208->95210 95218 683994 ___scrt_fastfail 95210->95218 95244 68a8c7 22 API calls __fread_nolock 95210->95244 95211 68396f 95212 68397c 95211->95212 95213 6c33c9 95211->95213 95212->95210 95215 683986 95212->95215 95245 686350 22 API calls 95213->95245 95243 686350 22 API calls 95215->95243 95221 6839f9 Shell_NotifyIconW 95218->95221 95219 6c33d7 95219->95218 95220 6833c6 22 API calls 95219->95220 95222 6c33f9 95220->95222 95221->95223 95224 6833c6 22 API calls 95222->95224 95223->95170 95224->95218 95225->95165 95246 69fe0b 95226->95246 95228 686295 95256 69fddb 95228->95256 95230 68394d 95230->95207 95230->95208 95232 6c4ba1 95231->95232 95233 686b67 _wcslen 95231->95233 95282 6893b2 95232->95282 95236 686b7d 95233->95236 95237 686ba2 95233->95237 95235 6c4baa 95235->95235 95281 686f34 22 API calls 95236->95281 95238 69fddb 22 API calls 95237->95238 95240 686bae 95238->95240 95241 69fe0b 22 API calls 95240->95241 95242 686b85 __fread_nolock 95241->95242 95242->95211 95243->95218 95244->95218 95245->95219 95249 69fddb 95246->95249 95248 69fdfa 95248->95228 95249->95248 95251 69fdfc 95249->95251 95266 6aea0c 95249->95266 95273 6a4ead 7 API calls 2 library calls 95249->95273 95252 6a066d 95251->95252 95274 6a32a4 RaiseException 95251->95274 95275 6a32a4 RaiseException 95252->95275 95255 6a068a 95255->95228 95259 69fde0 95256->95259 95257 6aea0c ___std_exception_copy 21 API calls 95257->95259 95258 69fdfa 95258->95230 95259->95257 95259->95258 95262 69fdfc 95259->95262 95278 6a4ead 7 API calls 2 library calls 95259->95278 95261 6a066d 95280 6a32a4 RaiseException 95261->95280 95262->95261 95279 6a32a4 RaiseException 95262->95279 95265 6a068a 95265->95230 95271 6b3820 _free 95266->95271 95267 6b385e 95277 6af2d9 20 API calls _free 95267->95277 95268 6b3849 RtlAllocateHeap 95270 6b385c 95268->95270 95268->95271 95270->95249 95271->95267 95271->95268 95276 6a4ead 7 API calls 2 library calls 95271->95276 95273->95249 95274->95252 95275->95255 95276->95271 95277->95270 95278->95259 95279->95261 95280->95265 95281->95242 95283 6893c0 95282->95283 95285 6893c9 __fread_nolock 95282->95285 95283->95285 95286 68aec9 95283->95286 95285->95235 95287 68aedc 95286->95287 95291 68aed9 __fread_nolock 95286->95291 95288 69fddb 22 API calls 95287->95288 95289 68aee7 95288->95289 95290 69fe0b 22 API calls 95289->95290 95290->95291 95291->95285 95293 683a67 GetModuleFileNameW 95292->95293 95293->95178 95295 6c1f50 __wsopen_s 95294->95295 95296 683aaf GetFullPathNameW 95295->95296 95297 683ae9 95296->95297 95298 683ace 95296->95298 95308 68a6c3 95297->95308 95299 686b57 22 API calls 95298->95299 95301 683ada 95299->95301 95304 6837a0 95301->95304 95305 6837ae 95304->95305 95306 6893b2 22 API calls 95305->95306 95307 6837c2 95306->95307 95307->95181 95309 68a6dd 95308->95309 95310 68a6d0 95308->95310 95311 69fddb 22 API calls 95309->95311 95310->95301 95312 68a6e7 95311->95312 95313 69fe0b 22 API calls 95312->95313 95313->95310 95315 6833fe _wcslen 95314->95315 95316 6c311d 95315->95316 95317 683411 95315->95317 95319 69fddb 22 API calls 95316->95319 95324 68a587 95317->95324 95321 6c3127 95319->95321 95320 68341e __fread_nolock 95320->95193 95322 69fe0b 22 API calls 95321->95322 95323 6c3157 __fread_nolock 95322->95323 95325 68a59d 95324->95325 95328 68a598 __fread_nolock 95324->95328 95326 6cf80f 95325->95326 95327 69fe0b 22 API calls 95325->95327 95327->95328 95328->95320 95329 682de3 95330 682df0 __wsopen_s 95329->95330 95331 682e09 95330->95331 95332 6c2c2b ___scrt_fastfail 95330->95332 95333 683aa2 23 API calls 95331->95333 95335 6c2c47 GetOpenFileNameW 95332->95335 95334 682e12 95333->95334 95345 682da5 95334->95345 95337 6c2c96 95335->95337 95339 686b57 22 API calls 95337->95339 95341 6c2cab 95339->95341 95341->95341 95342 682e27 95363 6844a8 95342->95363 95346 6c1f50 __wsopen_s 95345->95346 95347 682db2 GetLongPathNameW 95346->95347 95348 686b57 22 API calls 95347->95348 95349 682dda 95348->95349 95350 683598 95349->95350 95392 68a961 95350->95392 95353 683aa2 23 API calls 95354 6835b5 95353->95354 95355 6835c0 95354->95355 95359 6c32eb 95354->95359 95397 68515f 95355->95397 95361 6c330d 95359->95361 95409 69ce60 41 API calls 95359->95409 95362 6835df 95362->95342 95410 684ecb 95363->95410 95366 6c3833 95432 6f2cf9 95366->95432 95367 684ecb 94 API calls 95369 6844e1 95367->95369 95369->95366 95371 6844e9 95369->95371 95370 6c3848 95372 6c384c 95370->95372 95373 6c3869 95370->95373 95376 6c3854 95371->95376 95377 6844f5 95371->95377 95459 684f39 95372->95459 95375 69fe0b 22 API calls 95373->95375 95379 6c38ae 95375->95379 95465 6eda5a 82 API calls 95376->95465 95458 68940c 136 API calls 2 library calls 95377->95458 95383 6c3a5f 95379->95383 95389 689cb3 22 API calls 95379->95389 95466 6e967e 22 API calls __fread_nolock 95379->95466 95467 6e95ad 42 API calls _wcslen 95379->95467 95468 6f0b5a 22 API calls 95379->95468 95469 68a4a1 22 API calls __fread_nolock 95379->95469 95470 683ff7 22 API calls 95379->95470 95381 6c3862 95381->95373 95382 682e31 95384 684f39 68 API calls 95383->95384 95471 6e989b 82 API calls __wsopen_s 95383->95471 95384->95383 95389->95379 95393 69fe0b 22 API calls 95392->95393 95394 68a976 95393->95394 95395 69fddb 22 API calls 95394->95395 95396 6835aa 95395->95396 95396->95353 95398 68516e 95397->95398 95402 68518f __fread_nolock 95397->95402 95401 69fe0b 22 API calls 95398->95401 95399 69fddb 22 API calls 95400 6835cc 95399->95400 95403 6835f3 95400->95403 95401->95402 95402->95399 95404 683624 __fread_nolock 95403->95404 95405 683605 95403->95405 95406 69fddb 22 API calls 95404->95406 95408 69fe0b 22 API calls 95405->95408 95407 68363b 95406->95407 95407->95362 95408->95404 95409->95359 95472 684e90 LoadLibraryA 95410->95472 95415 6c3ccf 95417 684f39 68 API calls 95415->95417 95416 684ef6 LoadLibraryExW 95480 684e59 LoadLibraryA 95416->95480 95420 6c3cd6 95417->95420 95422 684e59 3 API calls 95420->95422 95424 6c3cde 95422->95424 95423 684f20 95423->95424 95425 684f2c 95423->95425 95502 6850f5 40 API calls __fread_nolock 95424->95502 95426 684f39 68 API calls 95425->95426 95428 6844cd 95426->95428 95428->95366 95428->95367 95429 6c3cf5 95503 6f28fe 27 API calls 95429->95503 95431 6c3d05 95433 6f2d15 95432->95433 95573 68511f 64 API calls 95433->95573 95435 6f2d29 95574 6f2e66 75 API calls 95435->95574 95437 6f2d3b 95438 6f2d3f 95437->95438 95575 6850f5 40 API calls __fread_nolock 95437->95575 95438->95370 95440 6f2d56 95576 6850f5 40 API calls __fread_nolock 95440->95576 95442 6f2d66 95577 6850f5 40 API calls __fread_nolock 95442->95577 95444 6f2d81 95578 6850f5 40 API calls __fread_nolock 95444->95578 95446 6f2d9c 95579 68511f 64 API calls 95446->95579 95448 6f2db3 95449 6aea0c ___std_exception_copy 21 API calls 95448->95449 95450 6f2dba 95449->95450 95451 6aea0c ___std_exception_copy 21 API calls 95450->95451 95452 6f2dc4 95451->95452 95580 6850f5 40 API calls __fread_nolock 95452->95580 95454 6f2dd8 95581 6f28fe 27 API calls 95454->95581 95456 6f2dee 95456->95438 95582 6f22ce 95456->95582 95458->95382 95460 684f4a 95459->95460 95461 684f43 95459->95461 95463 684f59 95460->95463 95464 684f6a FreeLibrary 95460->95464 95462 6ae678 67 API calls 95461->95462 95462->95460 95463->95376 95464->95463 95465->95381 95466->95379 95467->95379 95468->95379 95469->95379 95470->95379 95471->95383 95473 684ea8 GetProcAddress 95472->95473 95474 684ec6 95472->95474 95475 684eb8 95473->95475 95477 6ae5eb 95474->95477 95475->95474 95476 684ebf FreeLibrary 95475->95476 95476->95474 95504 6ae52a 95477->95504 95479 684eea 95479->95415 95479->95416 95481 684e8d 95480->95481 95482 684e6e GetProcAddress 95480->95482 95485 684f80 95481->95485 95483 684e7e 95482->95483 95483->95481 95484 684e86 FreeLibrary 95483->95484 95484->95481 95486 69fe0b 22 API calls 95485->95486 95487 684f95 95486->95487 95559 685722 95487->95559 95489 684fa1 __fread_nolock 95490 6c3d1d 95489->95490 95491 6850a5 95489->95491 95501 684fdc 95489->95501 95570 6f304d 74 API calls 95490->95570 95562 6842a2 CreateStreamOnHGlobal 95491->95562 95494 6c3d22 95571 68511f 64 API calls 95494->95571 95497 6c3d45 95572 6850f5 40 API calls __fread_nolock 95497->95572 95499 68506e messages 95499->95423 95501->95494 95501->95499 95568 6850f5 40 API calls __fread_nolock 95501->95568 95569 68511f 64 API calls 95501->95569 95502->95429 95503->95431 95505 6ae536 BuildCatchObjectHelperInternal 95504->95505 95506 6ae544 95505->95506 95509 6ae574 95505->95509 95529 6af2d9 20 API calls _free 95506->95529 95508 6ae549 95530 6b27ec 26 API calls pre_c_initialization 95508->95530 95511 6ae579 95509->95511 95512 6ae586 95509->95512 95531 6af2d9 20 API calls _free 95511->95531 95521 6b8061 95512->95521 95515 6ae58f 95516 6ae5a2 95515->95516 95517 6ae595 95515->95517 95533 6ae5d4 LeaveCriticalSection __fread_nolock 95516->95533 95532 6af2d9 20 API calls _free 95517->95532 95519 6ae554 __wsopen_s 95519->95479 95522 6b806d BuildCatchObjectHelperInternal 95521->95522 95534 6b2f5e EnterCriticalSection 95522->95534 95524 6b807b 95535 6b80fb 95524->95535 95528 6b80ac __wsopen_s 95528->95515 95529->95508 95530->95519 95531->95519 95532->95519 95533->95519 95534->95524 95543 6b811e 95535->95543 95536 6b8088 95549 6b80b7 95536->95549 95537 6b8177 95554 6b4c7d 20 API calls _free 95537->95554 95539 6b8180 95555 6b29c8 20 API calls _free 95539->95555 95542 6b8189 95542->95536 95556 6b3405 11 API calls 2 library calls 95542->95556 95543->95536 95543->95537 95543->95543 95552 6a918d EnterCriticalSection 95543->95552 95553 6a91a1 LeaveCriticalSection 95543->95553 95545 6b81a8 95557 6a918d EnterCriticalSection 95545->95557 95548 6b81bb 95548->95536 95558 6b2fa6 LeaveCriticalSection 95549->95558 95551 6b80be 95551->95528 95552->95543 95553->95543 95554->95539 95555->95542 95556->95545 95557->95548 95558->95551 95560 69fddb 22 API calls 95559->95560 95561 685734 95560->95561 95561->95489 95563 6842bc FindResourceExW 95562->95563 95564 6842d9 95562->95564 95563->95564 95565 6c35ba LoadResource 95563->95565 95564->95501 95565->95564 95566 6c35cf SizeofResource 95565->95566 95566->95564 95567 6c35e3 LockResource 95566->95567 95567->95564 95568->95501 95569->95501 95570->95494 95571->95497 95572->95499 95573->95435 95574->95437 95575->95440 95576->95442 95577->95444 95578->95446 95579->95448 95580->95454 95581->95456 95583 6f22d9 95582->95583 95586 6f22e7 95582->95586 95584 6ae5eb 29 API calls 95583->95584 95584->95586 95585 6f232c 95611 6f2557 40 API calls __fread_nolock 95585->95611 95586->95585 95587 6ae5eb 29 API calls 95586->95587 95610 6f22f0 95586->95610 95588 6f2311 95587->95588 95588->95585 95590 6f231a 95588->95590 95590->95610 95619 6ae678 95590->95619 95591 6f2370 95592 6f2395 95591->95592 95593 6f2374 95591->95593 95612 6f2171 95592->95612 95594 6f2381 95593->95594 95597 6ae678 67 API calls 95593->95597 95599 6ae678 67 API calls 95594->95599 95594->95610 95597->95594 95598 6f239d 95600 6f23c3 95598->95600 95601 6f23a3 95598->95601 95599->95610 95632 6f23f3 74 API calls 95600->95632 95603 6f23b0 95601->95603 95604 6ae678 67 API calls 95601->95604 95605 6ae678 67 API calls 95603->95605 95603->95610 95604->95603 95605->95610 95606 6f23de 95609 6ae678 67 API calls 95606->95609 95606->95610 95607 6f23ca 95607->95606 95608 6ae678 67 API calls 95607->95608 95608->95606 95609->95610 95610->95438 95611->95591 95613 6aea0c ___std_exception_copy 21 API calls 95612->95613 95614 6f217f 95613->95614 95615 6aea0c ___std_exception_copy 21 API calls 95614->95615 95616 6f2190 95615->95616 95617 6aea0c ___std_exception_copy 21 API calls 95616->95617 95618 6f219c 95617->95618 95618->95598 95620 6ae684 BuildCatchObjectHelperInternal 95619->95620 95621 6ae6aa 95620->95621 95622 6ae695 95620->95622 95631 6ae6a5 __wsopen_s 95621->95631 95633 6a918d EnterCriticalSection 95621->95633 95650 6af2d9 20 API calls _free 95622->95650 95624 6ae69a 95651 6b27ec 26 API calls pre_c_initialization 95624->95651 95627 6ae6c6 95634 6ae602 95627->95634 95629 6ae6d1 95652 6ae6ee LeaveCriticalSection __fread_nolock 95629->95652 95631->95610 95632->95607 95633->95627 95635 6ae60f 95634->95635 95636 6ae624 95634->95636 95685 6af2d9 20 API calls _free 95635->95685 95642 6ae61f 95636->95642 95653 6adc0b 95636->95653 95638 6ae614 95686 6b27ec 26 API calls pre_c_initialization 95638->95686 95642->95629 95646 6ae646 95670 6b862f 95646->95670 95650->95624 95651->95631 95652->95631 95654 6adc23 95653->95654 95655 6adc1f 95653->95655 95654->95655 95656 6ad955 __fread_nolock 26 API calls 95654->95656 95659 6b4d7a 95655->95659 95657 6adc43 95656->95657 95688 6b59be 62 API calls 5 library calls 95657->95688 95660 6b4d90 95659->95660 95661 6ae640 95659->95661 95660->95661 95689 6b29c8 20 API calls _free 95660->95689 95663 6ad955 95661->95663 95664 6ad961 95663->95664 95665 6ad976 95663->95665 95690 6af2d9 20 API calls _free 95664->95690 95665->95646 95667 6ad966 95691 6b27ec 26 API calls pre_c_initialization 95667->95691 95669 6ad971 95669->95646 95671 6b863e 95670->95671 95672 6b8653 95670->95672 95695 6af2c6 20 API calls _free 95671->95695 95674 6b868e 95672->95674 95677 6b867a 95672->95677 95697 6af2c6 20 API calls _free 95674->95697 95676 6b8643 95696 6af2d9 20 API calls _free 95676->95696 95692 6b8607 95677->95692 95678 6b8693 95698 6af2d9 20 API calls _free 95678->95698 95682 6b869b 95699 6b27ec 26 API calls pre_c_initialization 95682->95699 95683 6ae64c 95683->95642 95687 6b29c8 20 API calls _free 95683->95687 95685->95638 95686->95642 95687->95642 95688->95655 95689->95661 95690->95667 95691->95669 95700 6b8585 95692->95700 95694 6b862b 95694->95683 95695->95676 95696->95683 95697->95678 95698->95682 95699->95683 95701 6b8591 BuildCatchObjectHelperInternal 95700->95701 95711 6b5147 EnterCriticalSection 95701->95711 95703 6b859f 95704 6b85d1 95703->95704 95705 6b85c6 95703->95705 95712 6af2d9 20 API calls _free 95704->95712 95706 6b86ae __wsopen_s 29 API calls 95705->95706 95708 6b85cc 95706->95708 95713 6b85fb LeaveCriticalSection __wsopen_s 95708->95713 95710 6b85ee __wsopen_s 95710->95694 95711->95703 95712->95708 95713->95710 95714 681044 95719 6810f3 95714->95719 95716 68104a 95755 6a00a3 29 API calls __onexit 95716->95755 95718 681054 95756 681398 95719->95756 95723 68116a 95724 68a961 22 API calls 95723->95724 95725 681174 95724->95725 95726 68a961 22 API calls 95725->95726 95727 68117e 95726->95727 95728 68a961 22 API calls 95727->95728 95729 681188 95728->95729 95730 68a961 22 API calls 95729->95730 95731 6811c6 95730->95731 95732 68a961 22 API calls 95731->95732 95733 681292 95732->95733 95766 68171c 95733->95766 95737 6812c4 95738 68a961 22 API calls 95737->95738 95739 6812ce 95738->95739 95787 691940 95739->95787 95741 6812f9 95797 681aab 95741->95797 95743 681315 95744 681325 GetStdHandle 95743->95744 95745 6c2485 95744->95745 95747 68137a 95744->95747 95746 6c248e 95745->95746 95745->95747 95748 69fddb 22 API calls 95746->95748 95749 681387 OleInitialize 95747->95749 95750 6c2495 95748->95750 95749->95716 95804 6f011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 95750->95804 95752 6c249e 95805 6f0944 CreateThread 95752->95805 95754 6c24aa CloseHandle 95754->95747 95755->95718 95806 6813f1 95756->95806 95759 6813f1 22 API calls 95760 6813d0 95759->95760 95761 68a961 22 API calls 95760->95761 95762 6813dc 95761->95762 95763 686b57 22 API calls 95762->95763 95764 681129 95763->95764 95765 681bc3 6 API calls 95764->95765 95765->95723 95767 68a961 22 API calls 95766->95767 95768 68172c 95767->95768 95769 68a961 22 API calls 95768->95769 95770 681734 95769->95770 95771 68a961 22 API calls 95770->95771 95772 68174f 95771->95772 95773 69fddb 22 API calls 95772->95773 95774 68129c 95773->95774 95775 681b4a 95774->95775 95776 681b58 95775->95776 95777 68a961 22 API calls 95776->95777 95778 681b63 95777->95778 95779 68a961 22 API calls 95778->95779 95780 681b6e 95779->95780 95781 68a961 22 API calls 95780->95781 95782 681b79 95781->95782 95783 68a961 22 API calls 95782->95783 95784 681b84 95783->95784 95785 69fddb 22 API calls 95784->95785 95786 681b96 RegisterWindowMessageW 95785->95786 95786->95737 95788 691981 95787->95788 95794 69195d 95787->95794 95813 6a0242 5 API calls __Init_thread_wait 95788->95813 95790 69198b 95790->95794 95814 6a01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95790->95814 95792 698727 95796 69196e 95792->95796 95816 6a01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95792->95816 95794->95796 95815 6a0242 5 API calls __Init_thread_wait 95794->95815 95796->95741 95798 6c272d 95797->95798 95799 681abb 95797->95799 95817 6f3209 23 API calls 95798->95817 95800 69fddb 22 API calls 95799->95800 95802 681ac3 95800->95802 95802->95743 95803 6c2738 95804->95752 95805->95754 95818 6f092a 28 API calls 95805->95818 95807 68a961 22 API calls 95806->95807 95808 6813fc 95807->95808 95809 68a961 22 API calls 95808->95809 95810 681404 95809->95810 95811 68a961 22 API calls 95810->95811 95812 6813c6 95811->95812 95812->95759 95813->95790 95814->95794 95815->95792 95816->95796 95817->95803 95819 6d2a00 95834 68d7b0 messages 95819->95834 95820 68db11 PeekMessageW 95820->95834 95821 68d807 GetInputState 95821->95820 95821->95834 95823 6d1cbe TranslateAcceleratorW 95823->95834 95824 68db8f PeekMessageW 95824->95834 95825 68da04 timeGetTime 95825->95834 95826 68db73 TranslateMessage DispatchMessageW 95826->95824 95827 68dbaf Sleep 95845 68dbc0 95827->95845 95828 6d2b74 Sleep 95828->95845 95829 69e551 timeGetTime 95829->95845 95830 6d1dda timeGetTime 95972 69e300 23 API calls 95830->95972 95833 6d2c0b GetExitCodeProcess 95837 6d2c37 CloseHandle 95833->95837 95838 6d2c21 WaitForSingleObject 95833->95838 95834->95820 95834->95821 95834->95823 95834->95824 95834->95825 95834->95826 95834->95827 95834->95828 95834->95830 95840 68d9d5 95834->95840 95851 68dd50 95834->95851 95858 691310 95834->95858 95912 68bf40 95834->95912 95970 68dfd0 346 API calls 3 library calls 95834->95970 95971 69edf6 IsDialogMessageW GetClassLongW 95834->95971 95973 6f3a2a 23 API calls 95834->95973 95974 68ec40 95834->95974 95998 6f359c 82 API calls __wsopen_s 95834->95998 95835 7129bf GetForegroundWindow 95835->95845 95837->95845 95838->95834 95838->95837 95839 6d2a31 95839->95840 95841 6d2ca9 Sleep 95841->95834 95845->95829 95845->95833 95845->95834 95845->95835 95845->95839 95845->95840 95845->95841 95999 705658 23 API calls 95845->95999 96000 6ee97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 95845->96000 96001 6ed4dc CreateToolhelp32Snapshot Process32FirstW 95845->96001 95852 68dd6f 95851->95852 95853 68dd83 95851->95853 96011 68d260 95852->96011 96043 6f359c 82 API calls __wsopen_s 95853->96043 95855 68dd7a 95855->95834 95857 6d2f75 95857->95857 95859 6917b0 95858->95859 95860 691376 95858->95860 96065 6a0242 5 API calls __Init_thread_wait 95859->96065 95861 691390 95860->95861 95862 6d6331 95860->95862 95864 691940 9 API calls 95861->95864 96070 70709c 346 API calls 95862->96070 95867 6913a0 95864->95867 95866 6917ba 95869 6917fb 95866->95869 95871 689cb3 22 API calls 95866->95871 95870 691940 9 API calls 95867->95870 95868 6d633d 95868->95834 95873 6d6346 95869->95873 95875 69182c 95869->95875 95872 6913b6 95870->95872 95878 6917d4 95871->95878 95872->95869 95874 6913ec 95872->95874 96071 6f359c 82 API calls __wsopen_s 95873->96071 95874->95873 95898 691408 __fread_nolock 95874->95898 96067 68aceb 23 API calls messages 95875->96067 96066 6a01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95878->96066 95879 691839 96068 69d217 346 API calls 95879->96068 95882 6d636e 96072 6f359c 82 API calls __wsopen_s 95882->96072 95883 69152f 95885 69153c 95883->95885 95886 6d63d1 95883->95886 95888 691940 9 API calls 95885->95888 96074 705745 54 API calls _wcslen 95886->96074 95889 691549 95888->95889 95893 6d64fa 95889->95893 95895 691940 9 API calls 95889->95895 95890 69fddb 22 API calls 95890->95898 95891 691872 96069 69faeb 23 API calls 95891->96069 95892 69fe0b 22 API calls 95892->95898 95902 6d6369 95893->95902 96076 6f359c 82 API calls __wsopen_s 95893->96076 95900 691563 95895->95900 95897 68ec40 346 API calls 95897->95898 95898->95879 95898->95882 95898->95883 95898->95890 95898->95892 95898->95897 95899 6d63b2 95898->95899 95898->95902 96073 6f359c 82 API calls __wsopen_s 95899->96073 95900->95893 95905 6915c7 messages 95900->95905 96075 68a8c7 22 API calls __fread_nolock 95900->96075 95902->95834 95904 691940 9 API calls 95904->95905 95905->95891 95905->95893 95905->95902 95905->95904 95907 69167b messages 95905->95907 96051 70a2ea 95905->96051 96056 6f5c5a 95905->96056 96061 70ab67 95905->96061 95906 69171d 95906->95834 95907->95906 96064 69ce17 22 API calls messages 95907->96064 96222 68adf0 95912->96222 95914 68bf9d 95915 68bfa9 95914->95915 95916 6d04b6 95914->95916 95918 6d04c6 95915->95918 95919 68c01e 95915->95919 96241 6f359c 82 API calls __wsopen_s 95916->96241 96242 6f359c 82 API calls __wsopen_s 95918->96242 96227 68ac91 95919->96227 95922 6d04f5 95938 6d055a 95922->95938 96243 69d217 346 API calls 95922->96243 95924 68c7da 95928 69fe0b 22 API calls 95924->95928 95925 6e7120 22 API calls 95931 68c039 __fread_nolock messages 95925->95931 95935 68c808 __fread_nolock 95928->95935 95931->95922 95931->95924 95931->95925 95933 69fddb 22 API calls 95931->95933 95934 68ec40 346 API calls 95931->95934 95931->95935 95937 68af8a 22 API calls 95931->95937 95931->95938 95939 6d091a 95931->95939 95942 6d08a5 95931->95942 95946 6d0591 95931->95946 95947 6d08f6 95931->95947 95952 68bbe0 40 API calls 95931->95952 95954 68c237 95931->95954 95956 68c603 95931->95956 95957 69fe0b 22 API calls 95931->95957 95965 6d09bf 95931->95965 96231 68ad81 95931->96231 96246 6e7099 22 API calls __fread_nolock 95931->96246 96247 705745 54 API calls _wcslen 95931->96247 96248 69aa42 22 API calls messages 95931->96248 96249 6ef05c 40 API calls 95931->96249 96250 68a993 41 API calls 95931->96250 96251 68aceb 23 API calls messages 95931->96251 95933->95931 95934->95931 95936 69fe0b 22 API calls 95935->95936 95968 68c350 __fread_nolock messages 95936->95968 95937->95931 95938->95956 96244 6f359c 82 API calls __wsopen_s 95938->96244 96254 6f3209 23 API calls 95939->96254 95943 68ec40 346 API calls 95942->95943 95945 6d08cf 95943->95945 95945->95956 96252 68a81b 41 API calls 95945->96252 96245 6f359c 82 API calls __wsopen_s 95946->96245 96253 6f359c 82 API calls __wsopen_s 95947->96253 95952->95931 95955 68c253 95954->95955 96255 68a8c7 22 API calls __fread_nolock 95954->96255 95959 6d0976 95955->95959 95963 68c297 messages 95955->95963 95956->95834 95957->95931 96256 68aceb 23 API calls messages 95959->96256 95963->95965 96238 68aceb 23 API calls messages 95963->96238 95964 68c335 95964->95965 95966 68c342 95964->95966 95965->95956 96257 6f359c 82 API calls __wsopen_s 95965->96257 96239 68a704 22 API calls messages 95966->96239 95969 68c3ac 95968->95969 96240 69ce17 22 API calls messages 95968->96240 95969->95834 95970->95834 95971->95834 95972->95834 95973->95834 95976 68ec76 messages 95974->95976 95975 69fddb 22 API calls 95975->95976 95976->95975 95977 6a01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95976->95977 95978 6d4beb 95976->95978 95980 68fef7 95976->95980 95982 6d4b0b 95976->95982 95983 68a8c7 22 API calls 95976->95983 95984 6d4600 95976->95984 95990 6a0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95976->95990 95991 68fbe3 95976->95991 95992 68ed9d messages 95976->95992 95993 68a961 22 API calls 95976->95993 95996 6a00a3 29 API calls pre_c_initialization 95976->95996 95997 68f3ae messages 95976->95997 96267 6901e0 346 API calls 2 library calls 95976->96267 96268 6906a0 41 API calls messages 95976->96268 95977->95976 96274 6f359c 82 API calls __wsopen_s 95978->96274 95980->95992 96270 68a8c7 22 API calls __fread_nolock 95980->96270 96272 6f359c 82 API calls __wsopen_s 95982->96272 95983->95976 95984->95992 96269 68a8c7 22 API calls __fread_nolock 95984->96269 95990->95976 95991->95992 95994 6d4bdc 95991->95994 95991->95997 95992->95834 95993->95976 96273 6f359c 82 API calls __wsopen_s 95994->96273 95996->95976 95997->95992 96271 6f359c 82 API calls __wsopen_s 95997->96271 95998->95834 95999->95845 96000->95845 96275 6edef7 96001->96275 96003 6ed5db CloseHandle 96003->95845 96004 6ed529 Process32NextW 96004->96003 96010 6ed522 96004->96010 96005 68a961 22 API calls 96005->96010 96006 689cb3 22 API calls 96006->96010 96010->96003 96010->96004 96010->96005 96010->96006 96281 68525f 22 API calls 96010->96281 96282 686350 22 API calls 96010->96282 96283 69ce60 41 API calls 96010->96283 96012 68ec40 346 API calls 96011->96012 96032 68d29d 96012->96032 96013 6d1bc4 96050 6f359c 82 API calls __wsopen_s 96013->96050 96015 68d30b messages 96015->95855 96016 68d6d5 96016->96015 96026 69fe0b 22 API calls 96016->96026 96017 68d3c3 96017->96016 96019 68d3ce 96017->96019 96018 68d5ff 96020 6d1bb5 96018->96020 96021 68d614 96018->96021 96023 69fddb 22 API calls 96019->96023 96049 705705 23 API calls 96020->96049 96025 69fddb 22 API calls 96021->96025 96022 68d4b8 96027 69fe0b 22 API calls 96022->96027 96033 68d3d5 __fread_nolock 96023->96033 96037 68d46a 96025->96037 96026->96033 96028 68d429 __fread_nolock messages 96027->96028 96028->96018 96035 6d1ba4 96028->96035 96028->96037 96039 6d1b7f 96028->96039 96041 6d1b5d 96028->96041 96045 681f6f 346 API calls 96028->96045 96029 69fddb 22 API calls 96031 68d3f6 96029->96031 96030 69fddb 22 API calls 96030->96032 96031->96028 96044 68bec0 346 API calls 96031->96044 96032->96013 96032->96015 96032->96016 96032->96017 96032->96022 96032->96028 96032->96030 96033->96029 96033->96031 96048 6f359c 82 API calls __wsopen_s 96035->96048 96037->95855 96047 6f359c 82 API calls __wsopen_s 96039->96047 96046 6f359c 82 API calls __wsopen_s 96041->96046 96043->95857 96044->96028 96045->96028 96046->96037 96047->96037 96048->96037 96049->96013 96050->96015 96077 687510 96051->96077 96054 6ed4dc 47 API calls 96055 70a315 96054->96055 96055->95905 96057 687510 53 API calls 96056->96057 96058 6f5c6d 96057->96058 96104 6edbbe lstrlenW 96058->96104 96060 6f5c77 96060->95905 96109 70aff9 96061->96109 96064->95907 96065->95866 96066->95869 96067->95879 96068->95891 96069->95891 96070->95868 96071->95902 96072->95902 96073->95902 96074->95900 96075->95905 96076->95902 96078 687522 96077->96078 96079 687525 96077->96079 96078->96054 96080 68755b 96079->96080 96081 68752d 96079->96081 96082 6c50f6 96080->96082 96085 68756d 96080->96085 96093 6c500f 96080->96093 96100 6a51c6 26 API calls 96081->96100 96103 6a5183 26 API calls 96082->96103 96101 69fb21 51 API calls 96085->96101 96086 68753d 96091 69fddb 22 API calls 96086->96091 96087 6c510e 96087->96087 96089 6c5088 96102 69fb21 51 API calls 96089->96102 96092 687547 96091->96092 96094 689cb3 22 API calls 96092->96094 96093->96089 96095 69fe0b 22 API calls 96093->96095 96094->96078 96096 6c5058 96095->96096 96097 69fddb 22 API calls 96096->96097 96098 6c507f 96097->96098 96099 689cb3 22 API calls 96098->96099 96099->96089 96100->96086 96101->96086 96102->96082 96103->96087 96105 6edbdc GetFileAttributesW 96104->96105 96106 6edc06 96104->96106 96105->96106 96107 6edbe8 FindFirstFileW 96105->96107 96106->96060 96107->96106 96108 6edbf9 FindClose 96107->96108 96108->96106 96110 70b01d ___scrt_fastfail 96109->96110 96111 70b094 96110->96111 96112 70b058 96110->96112 96117 70b08b 96111->96117 96207 68b567 39 API calls 96111->96207 96204 68b567 39 API calls 96112->96204 96114 70b063 96114->96117 96205 68b567 39 API calls 96114->96205 96115 70b0ed 96118 687510 53 API calls 96115->96118 96117->96115 96209 68b567 39 API calls 96117->96209 96122 70b10b 96118->96122 96119 70b0a5 96208 68b567 39 API calls 96119->96208 96200 687620 96122->96200 96124 70b078 96206 68b567 39 API calls 96124->96206 96127 70b115 96128 70b1d8 96127->96128 96129 70b11f 96127->96129 96131 70b20a GetCurrentDirectoryW 96128->96131 96134 687510 53 API calls 96128->96134 96130 687510 53 API calls 96129->96130 96132 70b130 96130->96132 96133 69fe0b 22 API calls 96131->96133 96135 687620 22 API calls 96132->96135 96136 70b22f GetCurrentDirectoryW 96133->96136 96137 70b1ef 96134->96137 96138 70b13a 96135->96138 96139 70b23c 96136->96139 96140 687620 22 API calls 96137->96140 96141 687510 53 API calls 96138->96141 96144 70b275 96139->96144 96210 689c6e 22 API calls 96139->96210 96142 70b1f9 _wcslen 96140->96142 96143 70b14b 96141->96143 96142->96131 96142->96144 96145 687620 22 API calls 96143->96145 96151 70b287 96144->96151 96152 70b28b 96144->96152 96147 70b155 96145->96147 96149 687510 53 API calls 96147->96149 96148 70b255 96211 689c6e 22 API calls 96148->96211 96154 70b166 96149->96154 96157 70b2f8 96151->96157 96158 70b39a CreateProcessW 96151->96158 96213 6f07c0 10 API calls 96152->96213 96159 687620 22 API calls 96154->96159 96155 70b265 96212 689c6e 22 API calls 96155->96212 96156 70b294 96214 6f06e6 10 API calls 96156->96214 96216 6e11c8 39 API calls 96157->96216 96199 70b32f _wcslen 96158->96199 96163 70b170 96159->96163 96166 70b1a6 GetSystemDirectoryW 96163->96166 96171 687510 53 API calls 96163->96171 96164 70b2aa 96215 6f05a7 8 API calls 96164->96215 96165 70b2fd 96169 70b323 96165->96169 96170 70b32a 96165->96170 96168 69fe0b 22 API calls 96166->96168 96173 70b1cb GetSystemDirectoryW 96168->96173 96217 6e1201 128 API calls 2 library calls 96169->96217 96218 6e14ce 6 API calls 96170->96218 96175 70b187 96171->96175 96172 70b2d0 96172->96151 96173->96139 96178 687620 22 API calls 96175->96178 96177 70b328 96177->96199 96179 70b191 _wcslen 96178->96179 96179->96139 96179->96166 96180 70b3d6 GetLastError 96189 70b41a 96180->96189 96181 70b42f CloseHandle 96182 70b43f 96181->96182 96190 70b49a 96181->96190 96183 70b451 96182->96183 96184 70b446 CloseHandle 96182->96184 96187 70b463 96183->96187 96188 70b458 CloseHandle 96183->96188 96184->96183 96186 70b4a6 96186->96189 96191 70b475 96187->96191 96192 70b46a CloseHandle 96187->96192 96188->96187 96221 6f0175 6 API calls 96189->96221 96190->96186 96195 70b4d2 CloseHandle 96190->96195 96219 6f09d9 34 API calls 96191->96219 96192->96191 96195->96189 96196 70ab79 96196->95905 96197 70b486 96220 70b536 25 API calls 96197->96220 96199->96180 96199->96181 96201 68762a _wcslen 96200->96201 96202 69fe0b 22 API calls 96201->96202 96203 68763f 96202->96203 96203->96127 96204->96114 96205->96124 96206->96117 96207->96119 96208->96117 96209->96115 96210->96148 96211->96155 96212->96144 96213->96156 96214->96164 96215->96172 96216->96165 96217->96177 96218->96199 96219->96197 96220->96190 96221->96196 96223 68ae01 96222->96223 96226 68ae1c messages 96222->96226 96224 68aec9 22 API calls 96223->96224 96225 68ae09 CharUpperBuffW 96224->96225 96225->96226 96226->95914 96228 68acae 96227->96228 96229 68acd1 96228->96229 96258 6f359c 82 API calls __wsopen_s 96228->96258 96229->95931 96232 6cfadb 96231->96232 96233 68ad92 96231->96233 96234 69fddb 22 API calls 96233->96234 96235 68ad99 96234->96235 96259 68adcd 96235->96259 96238->95964 96239->95968 96240->95968 96241->95918 96242->95956 96243->95938 96244->95956 96245->95956 96246->95931 96247->95931 96248->95931 96249->95931 96250->95931 96251->95931 96252->95947 96253->95956 96254->95954 96255->95955 96256->95965 96257->95956 96258->96229 96265 68addd 96259->96265 96260 68adb6 96260->95931 96261 69fddb 22 API calls 96261->96265 96262 68a961 22 API calls 96262->96265 96264 68adcd 22 API calls 96264->96265 96265->96260 96265->96261 96265->96262 96265->96264 96266 68a8c7 22 API calls __fread_nolock 96265->96266 96266->96265 96267->95976 96268->95976 96269->95992 96270->95992 96271->95992 96272->95992 96273->95978 96274->95992 96276 6edf02 96275->96276 96277 6edf19 96276->96277 96280 6edf1f 96276->96280 96284 6a63b2 GetStringTypeW _strftime 96276->96284 96285 6a62fb 39 API calls _strftime 96277->96285 96280->96010 96281->96010 96282->96010 96283->96010 96284->96276 96285->96280 96286 6c2402 96289 681410 96286->96289 96290 6c24b8 DestroyWindow 96289->96290 96291 68144f mciSendStringW 96289->96291 96304 6c24c4 96290->96304 96292 68146b 96291->96292 96293 6816c6 96291->96293 96295 681479 96292->96295 96292->96304 96293->96292 96294 6816d5 UnregisterHotKey 96293->96294 96294->96293 96322 68182e 96295->96322 96298 6c2509 96303 6c252d 96298->96303 96305 6c251c FreeLibrary 96298->96305 96299 6c24d8 96299->96304 96328 686246 CloseHandle 96299->96328 96300 6c24e2 FindClose 96300->96304 96301 68148e 96301->96303 96310 68149c 96301->96310 96306 6c2541 VirtualFree 96303->96306 96313 681509 96303->96313 96304->96298 96304->96299 96304->96300 96305->96298 96306->96303 96307 6814f8 CoUninitialize 96307->96313 96308 6c2589 96315 6c2598 messages 96308->96315 96329 6f32eb 6 API calls messages 96308->96329 96309 681514 96312 681524 96309->96312 96310->96307 96326 681944 VirtualFreeEx CloseHandle 96312->96326 96313->96308 96313->96309 96318 6c2627 96315->96318 96330 6e64d4 22 API calls messages 96315->96330 96317 68153a 96317->96315 96319 68161f 96317->96319 96318->96318 96319->96318 96327 681876 CloseHandle InternetCloseHandle InternetCloseHandle WaitForSingleObject 96319->96327 96321 6816c1 96324 68183b 96322->96324 96323 681480 96323->96298 96323->96301 96324->96323 96331 6e702a 22 API calls 96324->96331 96326->96317 96327->96321 96328->96299 96329->96308 96330->96315 96331->96324 96332 681098 96337 6842de 96332->96337 96336 6810a7 96338 68a961 22 API calls 96337->96338 96339 6842f5 GetVersionExW 96338->96339 96340 686b57 22 API calls 96339->96340 96341 684342 96340->96341 96342 6893b2 22 API calls 96341->96342 96347 684378 96341->96347 96343 68436c 96342->96343 96345 6837a0 22 API calls 96343->96345 96344 68441b GetCurrentProcess IsWow64Process 96346 684437 96344->96346 96345->96347 96348 68444f LoadLibraryA 96346->96348 96349 6c3824 GetSystemInfo 96346->96349 96347->96344 96352 6c37df 96347->96352 96350 68449c GetSystemInfo 96348->96350 96351 684460 GetProcAddress 96348->96351 96354 684476 96350->96354 96351->96350 96353 684470 GetNativeSystemInfo 96351->96353 96353->96354 96355 68447a FreeLibrary 96354->96355 96356 68109d 96354->96356 96355->96356 96357 6a00a3 29 API calls __onexit 96356->96357 96357->96336 96358 6a03fb 96359 6a0407 BuildCatchObjectHelperInternal 96358->96359 96387 69feb1 96359->96387 96361 6a040e 96362 6a0561 96361->96362 96365 6a0438 96361->96365 96417 6a083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 96362->96417 96364 6a0568 96410 6a4e52 96364->96410 96376 6a0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 96365->96376 96398 6b247d 96365->96398 96372 6a0457 96374 6a04d8 96406 6a0959 96374->96406 96376->96374 96413 6a4e1a 38 API calls 3 library calls 96376->96413 96378 6a04de 96379 6a04f3 96378->96379 96414 6a0992 GetModuleHandleW 96379->96414 96381 6a04fa 96381->96364 96382 6a04fe 96381->96382 96383 6a0507 96382->96383 96415 6a4df5 28 API calls _abort 96382->96415 96416 6a0040 13 API calls 2 library calls 96383->96416 96386 6a050f 96386->96372 96388 69feba 96387->96388 96419 6a0698 IsProcessorFeaturePresent 96388->96419 96390 69fec6 96420 6a2c94 10 API calls 3 library calls 96390->96420 96392 69fecb 96397 69fecf 96392->96397 96421 6b2317 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96392->96421 96394 69fed8 96395 69fee6 96394->96395 96422 6a2cbd 8 API calls 3 library calls 96394->96422 96395->96361 96397->96361 96400 6b2494 96398->96400 96423 6a0a8c 96400->96423 96401 6a0451 96401->96372 96402 6b2421 96401->96402 96405 6b2450 96402->96405 96403 6a0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 96404 6b2479 96403->96404 96404->96376 96405->96403 96431 6a2340 96406->96431 96409 6a097f 96409->96378 96433 6a4bcf 96410->96433 96413->96374 96414->96381 96415->96383 96416->96386 96417->96364 96419->96390 96420->96392 96421->96394 96422->96397 96424 6a0a97 IsProcessorFeaturePresent 96423->96424 96425 6a0a95 96423->96425 96427 6a0c5d 96424->96427 96425->96401 96430 6a0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96427->96430 96429 6a0d40 96429->96401 96430->96429 96432 6a096c GetStartupInfoW 96431->96432 96432->96409 96434 6a4bdb BuildCatchObjectHelperInternal 96433->96434 96435 6a4be2 96434->96435 96436 6a4bf4 96434->96436 96472 6a4d29 GetModuleHandleW 96435->96472 96457 6b2f5e EnterCriticalSection 96436->96457 96439 6a4be7 96439->96436 96473 6a4d6d GetModuleHandleExW 96439->96473 96444 6a4ce2 96481 6c1d29 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 96444->96481 96445 6a4cb6 96464 6a4ce8 96445->96464 96446 6a4bfb 96448 6a4c70 96446->96448 96456 6a4c99 96446->96456 96458 6b21a8 96446->96458 96447 6a4c88 96453 6b2421 _abort 5 API calls 96447->96453 96448->96447 96452 6b2421 _abort 5 API calls 96448->96452 96452->96447 96453->96456 96461 6a4cd9 96456->96461 96457->96446 96482 6b1ee1 96458->96482 96502 6b2fa6 LeaveCriticalSection 96461->96502 96463 6a4cb2 96463->96444 96463->96445 96503 6b360c 96464->96503 96467 6a4d16 96470 6a4d6d _abort 8 API calls 96467->96470 96468 6a4cf6 GetPEB 96468->96467 96469 6a4d06 GetCurrentProcess TerminateProcess 96468->96469 96469->96467 96471 6a4d1e ExitProcess 96470->96471 96472->96439 96474 6a4dba 96473->96474 96475 6a4d97 GetProcAddress 96473->96475 96477 6a4dc9 96474->96477 96478 6a4dc0 FreeLibrary 96474->96478 96476 6a4dac 96475->96476 96476->96474 96479 6a0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 96477->96479 96478->96477 96480 6a4bf3 96479->96480 96480->96436 96485 6b1e90 96482->96485 96484 6b1f05 96484->96448 96486 6b1e9c BuildCatchObjectHelperInternal 96485->96486 96493 6b2f5e EnterCriticalSection 96486->96493 96488 6b1eaa 96494 6b1f31 96488->96494 96492 6b1ec8 __wsopen_s 96492->96484 96493->96488 96495 6b1f51 96494->96495 96498 6b1f59 96494->96498 96496 6a0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 96495->96496 96497 6b1eb7 96496->96497 96500 6b1ed5 LeaveCriticalSection _abort 96497->96500 96498->96495 96501 6b29c8 20 API calls _free 96498->96501 96500->96492 96501->96495 96502->96463 96504 6b3631 96503->96504 96505 6b3627 96503->96505 96510 6b2fd7 5 API calls 2 library calls 96504->96510 96507 6a0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 96505->96507 96508 6a4cf2 96507->96508 96508->96467 96508->96468 96509 6b3648 96509->96505 96510->96509 96511 68105b 96516 68344d 96511->96516 96513 68106a 96547 6a00a3 29 API calls __onexit 96513->96547 96515 681074 96517 68345d __wsopen_s 96516->96517 96518 68a961 22 API calls 96517->96518 96519 683513 96518->96519 96520 683a5a 24 API calls 96519->96520 96521 68351c 96520->96521 96548 683357 96521->96548 96524 6833c6 22 API calls 96525 683535 96524->96525 96526 68515f 22 API calls 96525->96526 96527 683544 96526->96527 96528 68a961 22 API calls 96527->96528 96529 68354d 96528->96529 96530 68a6c3 22 API calls 96529->96530 96531 683556 RegOpenKeyExW 96530->96531 96532 6c3176 RegQueryValueExW 96531->96532 96536 683578 96531->96536 96533 6c320c RegCloseKey 96532->96533 96534 6c3193 96532->96534 96533->96536 96546 6c321e _wcslen 96533->96546 96535 69fe0b 22 API calls 96534->96535 96537 6c31ac 96535->96537 96536->96513 96538 685722 22 API calls 96537->96538 96540 6c31b7 RegQueryValueExW 96538->96540 96539 684c6d 22 API calls 96539->96546 96541 6c31d4 96540->96541 96543 6c31ee messages 96540->96543 96542 686b57 22 API calls 96541->96542 96542->96543 96543->96533 96544 689cb3 22 API calls 96544->96546 96545 68515f 22 API calls 96545->96546 96546->96536 96546->96539 96546->96544 96546->96545 96547->96515 96549 6c1f50 __wsopen_s 96548->96549 96550 683364 GetFullPathNameW 96549->96550 96551 683386 96550->96551 96552 686b57 22 API calls 96551->96552 96553 6833a4 96552->96553 96553->96524 96554 68f7bf 96555 68f7d3 96554->96555 96556 68fcb6 96554->96556 96558 68fcc2 96555->96558 96559 69fddb 22 API calls 96555->96559 96591 68aceb 23 API calls messages 96556->96591 96592 68aceb 23 API calls messages 96558->96592 96561 68f7e5 96559->96561 96561->96558 96562 68f83e 96561->96562 96563 68fd3d 96561->96563 96565 691310 346 API calls 96562->96565 96587 68ed9d messages 96562->96587 96593 6f1155 22 API calls 96563->96593 96586 68ec76 messages 96565->96586 96566 69fddb 22 API calls 96566->96586 96568 68fef7 96568->96587 96595 68a8c7 22 API calls __fread_nolock 96568->96595 96570 6d4b0b 96597 6f359c 82 API calls __wsopen_s 96570->96597 96571 68a8c7 22 API calls 96571->96586 96572 6d4600 96572->96587 96594 68a8c7 22 API calls __fread_nolock 96572->96594 96578 68fbe3 96581 6d4bdc 96578->96581 96578->96587 96588 68f3ae messages 96578->96588 96579 68a961 22 API calls 96579->96586 96580 6a00a3 29 API calls pre_c_initialization 96580->96586 96598 6f359c 82 API calls __wsopen_s 96581->96598 96583 6a0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96583->96586 96584 6d4beb 96599 6f359c 82 API calls __wsopen_s 96584->96599 96585 6a01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96585->96586 96586->96566 96586->96568 96586->96570 96586->96571 96586->96572 96586->96578 96586->96579 96586->96580 96586->96583 96586->96584 96586->96585 96586->96587 96586->96588 96589 6901e0 346 API calls 2 library calls 96586->96589 96590 6906a0 41 API calls messages 96586->96590 96588->96587 96596 6f359c 82 API calls __wsopen_s 96588->96596 96589->96586 96590->96586 96591->96558 96592->96563 96593->96587 96594->96587 96595->96587 96596->96587 96597->96587 96598->96584 96599->96587 96600 681033 96605 684c91 96600->96605 96604 681042 96606 68a961 22 API calls 96605->96606 96607 684cff 96606->96607 96613 683af0 96607->96613 96610 684d9c 96611 681038 96610->96611 96616 6851f7 22 API calls __fread_nolock 96610->96616 96612 6a00a3 29 API calls __onexit 96611->96612 96612->96604 96617 683b1c 96613->96617 96616->96610 96618 683b0f 96617->96618 96619 683b29 96617->96619 96618->96610 96619->96618 96620 683b30 RegOpenKeyExW 96619->96620 96620->96618 96621 683b4a RegQueryValueExW 96620->96621 96622 683b80 RegCloseKey 96621->96622 96623 683b6b 96621->96623 96622->96618 96623->96622 96624 683156 96627 683170 96624->96627 96628 683187 96627->96628 96629 6831eb 96628->96629 96630 68318c 96628->96630 96667 6831e9 96628->96667 96632 6c2dfb 96629->96632 96633 6831f1 96629->96633 96634 683199 96630->96634 96635 683265 PostQuitMessage 96630->96635 96631 6831d0 DefWindowProcW 96669 68316a 96631->96669 96675 6818e2 10 API calls 96632->96675 96636 6831f8 96633->96636 96637 68321d SetTimer RegisterWindowMessageW 96633->96637 96639 6c2e7c 96634->96639 96640 6831a4 96634->96640 96635->96669 96641 6c2d9c 96636->96641 96642 683201 KillTimer 96636->96642 96644 683246 CreatePopupMenu 96637->96644 96637->96669 96679 6ebf30 34 API calls ___scrt_fastfail 96639->96679 96645 6c2e68 96640->96645 96646 6831ae 96640->96646 96648 6c2dd7 MoveWindow 96641->96648 96649 6c2da1 96641->96649 96650 6830f2 Shell_NotifyIconW 96642->96650 96643 6c2e1c 96676 69e499 42 API calls 96643->96676 96644->96669 96678 6ec161 27 API calls ___scrt_fastfail 96645->96678 96653 6c2e4d 96646->96653 96654 6831b9 96646->96654 96648->96669 96658 6c2dc6 SetFocus 96649->96658 96659 6c2da7 96649->96659 96660 683214 96650->96660 96653->96631 96677 6e0ad7 22 API calls 96653->96677 96655 683253 96654->96655 96656 6831c4 96654->96656 96673 68326f 44 API calls ___scrt_fastfail 96655->96673 96656->96631 96668 6830f2 Shell_NotifyIconW 96656->96668 96657 6c2e8e 96657->96631 96657->96669 96658->96669 96659->96656 96663 6c2db0 96659->96663 96672 683c50 DeleteObject DestroyWindow 96660->96672 96661 683263 96661->96669 96674 6818e2 10 API calls 96663->96674 96667->96631 96670 6c2e41 96668->96670 96671 683837 49 API calls 96670->96671 96671->96667 96672->96669 96673->96661 96674->96669 96675->96643 96676->96656 96677->96667 96678->96661 96679->96657 96680 682e37 96681 68a961 22 API calls 96680->96681 96682 682e4d 96681->96682 96759 684ae3 96682->96759 96684 682e6b 96685 683a5a 24 API calls 96684->96685 96686 682e7f 96685->96686 96687 689cb3 22 API calls 96686->96687 96688 682e8c 96687->96688 96689 684ecb 94 API calls 96688->96689 96690 682ea5 96689->96690 96691 682ead 96690->96691 96692 6c2cb0 96690->96692 96773 68a8c7 22 API calls __fread_nolock 96691->96773 96693 6f2cf9 80 API calls 96692->96693 96694 6c2cc3 96693->96694 96696 6c2ccf 96694->96696 96698 684f39 68 API calls 96694->96698 96701 684f39 68 API calls 96696->96701 96697 682ec3 96774 686f88 22 API calls 96697->96774 96698->96696 96700 682ecf 96702 689cb3 22 API calls 96700->96702 96703 6c2ce5 96701->96703 96704 682edc 96702->96704 96791 683084 22 API calls 96703->96791 96775 68a81b 41 API calls 96704->96775 96707 682eec 96709 689cb3 22 API calls 96707->96709 96708 6c2d02 96792 683084 22 API calls 96708->96792 96711 682f12 96709->96711 96776 68a81b 41 API calls 96711->96776 96712 6c2d1e 96714 683a5a 24 API calls 96712->96714 96716 6c2d44 96714->96716 96715 682f21 96718 68a961 22 API calls 96715->96718 96793 683084 22 API calls 96716->96793 96720 682f3f 96718->96720 96719 6c2d50 96794 68a8c7 22 API calls __fread_nolock 96719->96794 96777 683084 22 API calls 96720->96777 96723 6c2d5e 96795 683084 22 API calls 96723->96795 96725 682f4b 96778 6a4a28 40 API calls 3 library calls 96725->96778 96726 6c2d6d 96796 68a8c7 22 API calls __fread_nolock 96726->96796 96728 682f59 96728->96703 96729 682f63 96728->96729 96779 6a4a28 40 API calls 3 library calls 96729->96779 96732 6c2d83 96797 683084 22 API calls 96732->96797 96733 682f6e 96733->96708 96735 682f78 96733->96735 96780 6a4a28 40 API calls 3 library calls 96735->96780 96736 6c2d90 96738 682f83 96738->96712 96739 682f8d 96738->96739 96781 6a4a28 40 API calls 3 library calls 96739->96781 96741 682f98 96742 682fdc 96741->96742 96782 683084 22 API calls 96741->96782 96742->96726 96743 682fe8 96742->96743 96743->96736 96785 6863eb 22 API calls 96743->96785 96745 682fbf 96783 68a8c7 22 API calls __fread_nolock 96745->96783 96748 682ff8 96786 686a50 22 API calls 96748->96786 96749 682fcd 96784 683084 22 API calls 96749->96784 96752 683006 96787 6870b0 23 API calls 96752->96787 96754 683021 96755 683065 96754->96755 96788 686f88 22 API calls 96754->96788 96789 6870b0 23 API calls 96754->96789 96790 683084 22 API calls 96754->96790 96760 684af0 __wsopen_s 96759->96760 96761 686b57 22 API calls 96760->96761 96762 684b22 96760->96762 96761->96762 96772 684b58 96762->96772 96798 684c6d 96762->96798 96764 689cb3 22 API calls 96766 684c52 96764->96766 96765 689cb3 22 API calls 96765->96772 96768 68515f 22 API calls 96766->96768 96767 684c6d 22 API calls 96767->96772 96770 684c5e 96768->96770 96769 68515f 22 API calls 96769->96772 96770->96684 96771 684c29 96771->96764 96771->96770 96772->96765 96772->96767 96772->96769 96772->96771 96773->96697 96774->96700 96775->96707 96776->96715 96777->96725 96778->96728 96779->96733 96780->96738 96781->96741 96782->96745 96783->96749 96784->96742 96785->96748 96786->96752 96787->96754 96788->96754 96789->96754 96790->96754 96791->96708 96792->96712 96793->96719 96794->96723 96795->96726 96796->96732 96797->96736 96799 68aec9 22 API calls 96798->96799 96800 684c78 96799->96800 96800->96762

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 389 6842de-68434d call 68a961 GetVersionExW call 686b57 394 6c3617-6c362a 389->394 395 684353 389->395 396 6c362b-6c362f 394->396 397 684355-684357 395->397 398 6c3631 396->398 399 6c3632-6c363e 396->399 400 68435d-6843bc call 6893b2 call 6837a0 397->400 401 6c3656 397->401 398->399 399->396 402 6c3640-6c3642 399->402 418 6c37df-6c37e6 400->418 419 6843c2-6843c4 400->419 405 6c365d-6c3660 401->405 402->397 404 6c3648-6c364f 402->404 404->394 407 6c3651 404->407 408 68441b-684435 GetCurrentProcess IsWow64Process 405->408 409 6c3666-6c36a8 405->409 407->401 411 684494-68449a 408->411 412 684437 408->412 409->408 413 6c36ae-6c36b1 409->413 415 68443d-684449 411->415 412->415 416 6c36db-6c36e5 413->416 417 6c36b3-6c36bd 413->417 424 68444f-68445e LoadLibraryA 415->424 425 6c3824-6c3828 GetSystemInfo 415->425 420 6c36f8-6c3702 416->420 421 6c36e7-6c36f3 416->421 426 6c36bf-6c36c5 417->426 427 6c36ca-6c36d6 417->427 422 6c37e8 418->422 423 6c3806-6c3809 418->423 419->405 428 6843ca-6843dd 419->428 432 6c3704-6c3710 420->432 433 6c3715-6c3721 420->433 421->408 431 6c37ee 422->431 434 6c380b-6c381a 423->434 435 6c37f4-6c37fc 423->435 436 68449c-6844a6 GetSystemInfo 424->436 437 684460-68446e GetProcAddress 424->437 426->408 427->408 429 6c3726-6c372f 428->429 430 6843e3-6843e5 428->430 440 6c373c-6c3748 429->440 441 6c3731-6c3737 429->441 438 6c374d-6c3762 430->438 439 6843eb-6843ee 430->439 431->435 432->408 433->408 434->431 442 6c381c-6c3822 434->442 435->423 444 684476-684478 436->444 437->436 443 684470-684474 GetNativeSystemInfo 437->443 447 6c376f-6c377b 438->447 448 6c3764-6c376a 438->448 445 6843f4-68440f 439->445 446 6c3791-6c3794 439->446 440->408 441->408 442->435 443->444 449 68447a-68447b FreeLibrary 444->449 450 684481-684493 444->450 451 6c3780-6c378c 445->451 452 684415 445->452 446->408 453 6c379a-6c37c1 446->453 447->408 448->408 449->450 451->408 452->408 454 6c37ce-6c37da 453->454 455 6c37c3-6c37c9 453->455 454->408 455->408
                        APIs
                        • GetVersionExW.KERNEL32(?), ref: 0068430D
                          • Part of subcall function 00686B57: _wcslen.LIBCMT ref: 00686B6A
                        • GetCurrentProcess.KERNEL32(?,0071CB64,00000000,?,?), ref: 00684422
                        • IsWow64Process.KERNEL32(00000000,?,?), ref: 00684429
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00684454
                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00684466
                        • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00684474
                        • FreeLibrary.KERNEL32(00000000,?,?), ref: 0068447B
                        • GetSystemInfo.KERNEL32(?,?,?), ref: 006844A0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                        • String ID: GetNativeSystemInfo$kernel32.dll$|O
                        • API String ID: 3290436268-3101561225
                        • Opcode ID: c91dd854e035c234d456bd22eab27ba5686f11e2fef1d240ed1c65172f5139a4
                        • Instruction ID: 03007709734ee9a610d2abbdb395f7f20a39ebb12bd08b347d80978a36b9fbb2
                        • Opcode Fuzzy Hash: c91dd854e035c234d456bd22eab27ba5686f11e2fef1d240ed1c65172f5139a4
                        • Instruction Fuzzy Hash: 5AA1E26190A3D0DFC712D769B8607E43FE6AF26347B88C99CD04193B22D6AC4909CB2D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 793 6842a2-6842ba CreateStreamOnHGlobal 794 6842da-6842dd 793->794 795 6842bc-6842d3 FindResourceExW 793->795 796 6842d9 795->796 797 6c35ba-6c35c9 LoadResource 795->797 796->794 797->796 798 6c35cf-6c35dd SizeofResource 797->798 798->796 799 6c35e3-6c35ee LockResource 798->799 799->796 800 6c35f4-6c3612 799->800 800->796
                        APIs
                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,006850AA,?,?,00000000,00000000), ref: 006842B2
                        • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,006850AA,?,?,00000000,00000000), ref: 006842C9
                        • LoadResource.KERNEL32(?,00000000,?,?,006850AA,?,?,00000000,00000000,?,?,?,?,?,?,00684F20), ref: 006C35BE
                        • SizeofResource.KERNEL32(?,00000000,?,?,006850AA,?,?,00000000,00000000,?,?,?,?,?,?,00684F20), ref: 006C35D3
                        • LockResource.KERNEL32(006850AA,?,?,006850AA,?,?,00000000,00000000,?,?,?,?,?,?,00684F20,?), ref: 006C35E6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                        • String ID: SCRIPT
                        • API String ID: 3051347437-3967369404
                        • Opcode ID: 0102e3df0fb72a0d17e21b59f7f930ce7ba8dc4a7469cd44bf65f32a9586d866
                        • Instruction ID: ccdff9ff1a1ab8212e5a08288cb3a93d0591f86c1c4641460288be6173a025fa
                        • Opcode Fuzzy Hash: 0102e3df0fb72a0d17e21b59f7f930ce7ba8dc4a7469cd44bf65f32a9586d866
                        • Instruction Fuzzy Hash: 57117C74244705BFD7229BA9DC49FA77BBAFFC9B55F108269F402D6290DB71D9008620

                        Control-flow Graph

                        APIs
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00682B6B
                          • Part of subcall function 00683A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00751418,?,00682E7F,?,?,?,00000000), ref: 00683A78
                          • Part of subcall function 00689CB3: _wcslen.LIBCMT ref: 00689CBD
                        • GetForegroundWindow.USER32(runas,?,?,?,?,?,00742224), ref: 006C2C10
                        • ShellExecuteW.SHELL32(00000000,?,?,00742224), ref: 006C2C17
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                        • String ID: runas
                        • API String ID: 448630720-4000483414
                        • Opcode ID: 1dc5e1f2b66db72880297035fbe2f44228b456dc8c80658a100f0859ce34a3ce
                        • Instruction ID: a8439e180628baded3c8f5cc600c548a4c09ef6ab6a2142d82b403d9c9518caf
                        • Opcode Fuzzy Hash: 1dc5e1f2b66db72880297035fbe2f44228b456dc8c80658a100f0859ce34a3ce
                        • Instruction Fuzzy Hash: 921106711083826BC745FF60D861EFE77A69F90745F44562CF442121E3CF688A0A871A

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1239 6ed4dc-6ed524 CreateToolhelp32Snapshot Process32FirstW call 6edef7 1242 6ed5d2-6ed5d5 1239->1242 1243 6ed5db-6ed5ea CloseHandle 1242->1243 1244 6ed529-6ed538 Process32NextW 1242->1244 1244->1243 1245 6ed53e-6ed5ad call 68a961 * 2 call 689cb3 call 68525f call 68988f call 686350 call 69ce60 1244->1245 1260 6ed5af-6ed5b1 1245->1260 1261 6ed5b7-6ed5be 1245->1261 1262 6ed5b3-6ed5b5 1260->1262 1263 6ed5c0-6ed5cd call 68988f * 2 1260->1263 1261->1263 1262->1261 1262->1263 1263->1242
                        APIs
                        • CreateToolhelp32Snapshot.KERNEL32 ref: 006ED501
                        • Process32FirstW.KERNEL32(00000000,?), ref: 006ED50F
                        • Process32NextW.KERNEL32(00000000,?), ref: 006ED52F
                        • CloseHandle.KERNELBASE(00000000), ref: 006ED5DC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                        • String ID:
                        • API String ID: 420147892-0
                        • Opcode ID: 9ed1387e257f9aeddf95dfc347adb56bfa1fc7be70a57f7d40aec61e15a73ca7
                        • Instruction ID: fb71c7647dcf16acebb56400883eefa49c4e5946e8ac8b345e8c878e755fec1c
                        • Opcode Fuzzy Hash: 9ed1387e257f9aeddf95dfc347adb56bfa1fc7be70a57f7d40aec61e15a73ca7
                        • Instruction Fuzzy Hash: C731C2710083409FD305EF94C885ABFBBF9EF99354F14492DF581872A1EB719A48CBA2

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1267 6edbbe-6edbda lstrlenW 1268 6edbdc-6edbe6 GetFileAttributesW 1267->1268 1269 6edc06 1267->1269 1270 6edbe8-6edbf7 FindFirstFileW 1268->1270 1271 6edc09-6edc0d 1268->1271 1269->1271 1270->1269 1272 6edbf9-6edc04 FindClose 1270->1272 1272->1271
                        APIs
                        • lstrlenW.KERNEL32(?,006C5222), ref: 006EDBCE
                        • GetFileAttributesW.KERNELBASE(?), ref: 006EDBDD
                        • FindFirstFileW.KERNEL32(?,?), ref: 006EDBEE
                        • FindClose.KERNEL32(00000000), ref: 006EDBFA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: FileFind$AttributesCloseFirstlstrlen
                        • String ID:
                        • API String ID: 2695905019-0
                        • Opcode ID: 74d9ea3209eb2d3ab18e531f7747aa9c9070bec710cbf5d056959b65c16aed6b
                        • Instruction ID: e7de7eaa15886040c6c3a23e9a8cd28199c7d4366476fab866590d193a45648b
                        • Opcode Fuzzy Hash: 74d9ea3209eb2d3ab18e531f7747aa9c9070bec710cbf5d056959b65c16aed6b
                        • Instruction Fuzzy Hash: 90F0EC704516145792216BBC9C0D4EA376DAE013B4B20C702F435C11F0FBB45D55C5DA
                        APIs
                        • GetCurrentProcess.KERNEL32(006B28E9,?,006A4CBE,006B28E9,007488B8,0000000C,006A4E15,006B28E9,00000002,00000000,?,006B28E9), ref: 006A4D09
                        • TerminateProcess.KERNEL32(00000000,?,006A4CBE,006B28E9,007488B8,0000000C,006A4E15,006B28E9,00000002,00000000,?,006B28E9), ref: 006A4D10
                        • ExitProcess.KERNEL32 ref: 006A4D22
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Process$CurrentExitTerminate
                        • String ID:
                        • API String ID: 1703294689-0
                        • Opcode ID: c22e8b9a9000b8ba71152632b535d1fd8559fa834f3884c53b15784df386b360
                        • Instruction ID: b406e248f3bb425735b701ba3e575254f86e84845290b986b0becceb081ff4e3
                        • Opcode Fuzzy Hash: c22e8b9a9000b8ba71152632b535d1fd8559fa834f3884c53b15784df386b360
                        • Instruction Fuzzy Hash: 1BE0B671040148ABCF12BF98DD09A987B6AEF82785B10C018FD159A262DB79DE42DF98
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: BuffCharUpper
                        • String ID: p#u
                        • API String ID: 3964851224-896942992
                        • Opcode ID: 4bbafd0da7a6db8f8f57b92d7bc427c438ba1a9f2ffbe8371c5a69b6aeaa9b0c
                        • Instruction ID: 82d3c156409c47033414f303127b3ec7fb8a22e76e59e25c137012101be7d7f5
                        • Opcode Fuzzy Hash: 4bbafd0da7a6db8f8f57b92d7bc427c438ba1a9f2ffbe8371c5a69b6aeaa9b0c
                        • Instruction Fuzzy Hash: 1EA27E70A08301DFDB50DF14C490B6ABBE2BF89314F14896EE9999B352D771EC45CBA2

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 70aff9-70b056 call 6a2340 3 70b094-70b098 0->3 4 70b058-70b06b call 68b567 0->4 6 70b09a-70b0bb call 68b567 * 2 3->6 7 70b0dd-70b0e0 3->7 12 70b0c8 4->12 13 70b06d-70b092 call 68b567 * 2 4->13 30 70b0bf-70b0c4 6->30 9 70b0e2-70b0e5 7->9 10 70b0f5-70b119 call 687510 call 687620 7->10 14 70b0e8-70b0ed call 68b567 9->14 33 70b1d8-70b1e0 10->33 34 70b11f-70b178 call 687510 call 687620 call 687510 call 687620 call 687510 call 687620 10->34 17 70b0cb-70b0cf 12->17 13->30 14->10 22 70b0d1-70b0d7 17->22 23 70b0d9-70b0db 17->23 22->14 23->7 23->10 30->7 31 70b0c6 30->31 31->17 36 70b1e2-70b1fd call 687510 call 687620 33->36 37 70b20a-70b238 GetCurrentDirectoryW call 69fe0b GetCurrentDirectoryW 33->37 82 70b1a6-70b1d6 GetSystemDirectoryW call 69fe0b GetSystemDirectoryW 34->82 83 70b17a-70b195 call 687510 call 687620 34->83 36->37 53 70b1ff-70b208 call 6a4963 36->53 45 70b23c 37->45 48 70b240-70b244 45->48 51 70b275-70b285 call 6f00d9 48->51 52 70b246-70b270 call 689c6e * 3 48->52 64 70b287-70b289 51->64 65 70b28b-70b2e1 call 6f07c0 call 6f06e6 call 6f05a7 51->65 52->51 53->37 53->51 69 70b2ee-70b2f2 64->69 65->69 97 70b2e3 65->97 71 70b2f8-70b321 call 6e11c8 69->71 72 70b39a-70b3be CreateProcessW 69->72 87 70b323-70b328 call 6e1201 71->87 88 70b32a call 6e14ce 71->88 76 70b3c1-70b3d4 call 69fe14 * 2 72->76 103 70b3d6-70b3e8 76->103 104 70b42f-70b43d CloseHandle 76->104 82->45 83->82 105 70b197-70b1a0 call 6a4963 83->105 96 70b32f-70b33c call 6a4963 87->96 88->96 112 70b347-70b357 call 6a4963 96->112 113 70b33e-70b345 96->113 97->69 109 70b3ea 103->109 110 70b3ed-70b3fc 103->110 107 70b49c 104->107 108 70b43f-70b444 104->108 105->48 105->82 118 70b4a0-70b4a4 107->118 114 70b451-70b456 108->114 115 70b446-70b44c CloseHandle 108->115 109->110 116 70b401-70b42a GetLastError call 68630c call 68cfa0 110->116 117 70b3fe 110->117 136 70b362-70b372 call 6a4963 112->136 137 70b359-70b360 112->137 113->112 113->113 123 70b463-70b468 114->123 124 70b458-70b45e CloseHandle 114->124 115->114 126 70b4e5-70b4f6 call 6f0175 116->126 117->116 119 70b4b2-70b4bc 118->119 120 70b4a6-70b4b0 118->120 127 70b4c4-70b4e3 call 68cfa0 CloseHandle 119->127 128 70b4be 119->128 120->126 130 70b475-70b49a call 6f09d9 call 70b536 123->130 131 70b46a-70b470 CloseHandle 123->131 124->123 127->126 128->127 130->118 131->130 146 70b374-70b37b 136->146 147 70b37d-70b398 call 69fe14 * 3 136->147 137->136 137->137 146->146 146->147 147->76
                        APIs
                        • _wcslen.LIBCMT ref: 0070B198
                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0070B1B0
                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0070B1D4
                        • _wcslen.LIBCMT ref: 0070B200
                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0070B214
                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0070B236
                        • _wcslen.LIBCMT ref: 0070B332
                          • Part of subcall function 006F05A7: GetStdHandle.KERNEL32(000000F6), ref: 006F05C6
                        • _wcslen.LIBCMT ref: 0070B34B
                        • _wcslen.LIBCMT ref: 0070B366
                        • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0070B3B6
                        • GetLastError.KERNEL32(00000000), ref: 0070B407
                        • CloseHandle.KERNEL32(?), ref: 0070B439
                        • CloseHandle.KERNEL32(00000000), ref: 0070B44A
                        • CloseHandle.KERNEL32(00000000), ref: 0070B45C
                        • CloseHandle.KERNEL32(00000000), ref: 0070B46E
                        • CloseHandle.KERNEL32(?), ref: 0070B4E3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                        • String ID:
                        • API String ID: 2178637699-0
                        • Opcode ID: b0e2ce32e31d2fa9022dcf8d2591b1364bbcc508a07cc373720fdae603562568
                        • Instruction ID: c23c2f26682a4d8d4ae458152030af4bd3925adae1b14bd0a3cc290025daf15e
                        • Opcode Fuzzy Hash: b0e2ce32e31d2fa9022dcf8d2591b1364bbcc508a07cc373720fdae603562568
                        • Instruction Fuzzy Hash: 96F1AA31608340DFCB54EF24C881B6ABBE6AF85314F18865DF8959B2E2DB35ED40CB56
                        APIs
                        • GetInputState.USER32 ref: 0068D807
                        • timeGetTime.WINMM ref: 0068DA07
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0068DB28
                        • TranslateMessage.USER32(?), ref: 0068DB7B
                        • DispatchMessageW.USER32(?), ref: 0068DB89
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0068DB9F
                        • Sleep.KERNEL32(0000000A), ref: 0068DBB1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                        • String ID:
                        • API String ID: 2189390790-0
                        • Opcode ID: 58b35b64ac33ee8fe339ab01121ee493fce5e34d05afb3ac1c773f6b4e376361
                        • Instruction ID: 09339ec761c5e60ea284f1c41392520b28c3709695ae065ff4da5354ef67de94
                        • Opcode Fuzzy Hash: 58b35b64ac33ee8fe339ab01121ee493fce5e34d05afb3ac1c773f6b4e376361
                        • Instruction Fuzzy Hash: 91421270A04342EFDB28DF24C854BAAB7E2BF85314F14861EE455873D1D7B4E845CBA6

                        Control-flow Graph

                        APIs
                        • GetSysColorBrush.USER32(0000000F), ref: 00682D07
                        • RegisterClassExW.USER32(00000030), ref: 00682D31
                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00682D42
                        • InitCommonControlsEx.COMCTL32(?), ref: 00682D5F
                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00682D6F
                        • LoadIconW.USER32(000000A9), ref: 00682D85
                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00682D94
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                        • API String ID: 2914291525-1005189915
                        • Opcode ID: 404704ec6e62e094d3b83298098f0a2448ff4ea1b84758e92bbaf4b452f986ee
                        • Instruction ID: 0455614db46a02fd7d0524005c0c4b0e3a32c314638c4e48cae1cbe0c69bfa6e
                        • Opcode Fuzzy Hash: 404704ec6e62e094d3b83298098f0a2448ff4ea1b84758e92bbaf4b452f986ee
                        • Instruction Fuzzy Hash: A721E2B5941348AFDB01DFE8EC59BDDBBB4FB08702F00C11AE511A62A0D7B955408F98

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 457 6c065b-6c068b call 6c042f 460 6c068d-6c0698 call 6af2c6 457->460 461 6c06a6-6c06b2 call 6b5221 457->461 468 6c069a-6c06a1 call 6af2d9 460->468 466 6c06cb-6c0714 call 6c039a 461->466 467 6c06b4-6c06c9 call 6af2c6 call 6af2d9 461->467 476 6c0716-6c071f 466->476 477 6c0781-6c078a GetFileType 466->477 467->468 478 6c097d-6c0983 468->478 482 6c0756-6c077c GetLastError call 6af2a3 476->482 483 6c0721-6c0725 476->483 479 6c078c-6c07bd GetLastError call 6af2a3 CloseHandle 477->479 480 6c07d3-6c07d6 477->480 479->468 494 6c07c3-6c07ce call 6af2d9 479->494 486 6c07df-6c07e5 480->486 487 6c07d8-6c07dd 480->487 482->468 483->482 488 6c0727-6c0754 call 6c039a 483->488 491 6c07e9-6c0837 call 6b516a 486->491 492 6c07e7 486->492 487->491 488->477 488->482 499 6c0839-6c0845 call 6c05ab 491->499 500 6c0847-6c086b call 6c014d 491->500 492->491 494->468 499->500 506 6c086f-6c0879 call 6b86ae 499->506 507 6c086d 500->507 508 6c087e-6c08c1 500->508 506->478 507->506 510 6c08e2-6c08f0 508->510 511 6c08c3-6c08c7 508->511 514 6c097b 510->514 515 6c08f6-6c08fa 510->515 511->510 513 6c08c9-6c08dd 511->513 513->510 514->478 515->514 516 6c08fc-6c092f CloseHandle call 6c039a 515->516 519 6c0931-6c095d GetLastError call 6af2a3 call 6b5333 516->519 520 6c0963-6c0977 516->520 519->520 520->514
                        APIs
                          • Part of subcall function 006C039A: CreateFileW.KERNELBASE(00000000,00000000,?,006C0704,?,?,00000000,?,006C0704,00000000,0000000C), ref: 006C03B7
                        • GetLastError.KERNEL32 ref: 006C076F
                        • __dosmaperr.LIBCMT ref: 006C0776
                        • GetFileType.KERNELBASE(00000000), ref: 006C0782
                        • GetLastError.KERNEL32 ref: 006C078C
                        • __dosmaperr.LIBCMT ref: 006C0795
                        • CloseHandle.KERNEL32(00000000), ref: 006C07B5
                        • CloseHandle.KERNEL32(?), ref: 006C08FF
                        • GetLastError.KERNEL32 ref: 006C0931
                        • __dosmaperr.LIBCMT ref: 006C0938
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                        • String ID: H
                        • API String ID: 4237864984-2852464175
                        • Opcode ID: 6392303719a2a502249abab792254a8bf3f6ca2fce85956f1c025b1737d663be
                        • Instruction ID: 4dbbc3dd5e9b3ff4bc1ebf8d374a68f153fbe8297af5046b599b793f935279a9
                        • Opcode Fuzzy Hash: 6392303719a2a502249abab792254a8bf3f6ca2fce85956f1c025b1737d663be
                        • Instruction Fuzzy Hash: C8A10332A042148FEF19AFA8D851BFE7BA2EB06320F14415DF8159B3D1DB359D12CB96

                        Control-flow Graph

                        APIs
                          • Part of subcall function 00683A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00751418,?,00682E7F,?,?,?,00000000), ref: 00683A78
                          • Part of subcall function 00683357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00683379
                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 0068356A
                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 006C318D
                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 006C31CE
                        • RegCloseKey.ADVAPI32(?), ref: 006C3210
                        • _wcslen.LIBCMT ref: 006C3277
                        • _wcslen.LIBCMT ref: 006C3286
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                        • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                        • API String ID: 98802146-2727554177
                        • Opcode ID: 6acc55e3e4944b583649fa4b4c3c435dbcadf2bda96f920a09bf8796930c1bc2
                        • Instruction ID: 5b270269ea124f57cfb9b874b0add0cc5367983e896ced56b0aa2a3f3ea2e2c7
                        • Opcode Fuzzy Hash: 6acc55e3e4944b583649fa4b4c3c435dbcadf2bda96f920a09bf8796930c1bc2
                        • Instruction Fuzzy Hash: DA71C1714043019EC744EF69DC81DEBBBE9FF86340F40852EF545932A1EBB89A49CB69

                        Control-flow Graph

                        APIs
                        • GetSysColorBrush.USER32(0000000F), ref: 00682B8E
                        • LoadCursorW.USER32(00000000,00007F00), ref: 00682B9D
                        • LoadIconW.USER32(00000063), ref: 00682BB3
                        • LoadIconW.USER32(000000A4), ref: 00682BC5
                        • LoadIconW.USER32(000000A2), ref: 00682BD7
                        • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00682BEF
                        • RegisterClassExW.USER32(?), ref: 00682C40
                          • Part of subcall function 00682CD4: GetSysColorBrush.USER32(0000000F), ref: 00682D07
                          • Part of subcall function 00682CD4: RegisterClassExW.USER32(00000030), ref: 00682D31
                          • Part of subcall function 00682CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00682D42
                          • Part of subcall function 00682CD4: InitCommonControlsEx.COMCTL32(?), ref: 00682D5F
                          • Part of subcall function 00682CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00682D6F
                          • Part of subcall function 00682CD4: LoadIconW.USER32(000000A9), ref: 00682D85
                          • Part of subcall function 00682CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00682D94
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                        • String ID: #$0$AutoIt v3
                        • API String ID: 423443420-4155596026
                        • Opcode ID: 1893e7a651f1eb87fe5f9533d0816182c54d0cdeb21afc98aaa9b74ae726f736
                        • Instruction ID: 00ec3528a74c410600b2a09a7380e4366caa4b4fe976b2095e341994b1c4a08d
                        • Opcode Fuzzy Hash: 1893e7a651f1eb87fe5f9533d0816182c54d0cdeb21afc98aaa9b74ae726f736
                        • Instruction Fuzzy Hash: 01214C70E40314ABDB119FE9EC65BE97FB5FB08B52F40C15AE500A66A0D3F90940CF98

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 598 683170-683185 599 6831e5-6831e7 598->599 600 683187-68318a 598->600 599->600 601 6831e9 599->601 602 6831eb 600->602 603 68318c-683193 600->603 604 6831d0-6831d8 DefWindowProcW 601->604 605 6c2dfb-6c2e23 call 6818e2 call 69e499 602->605 606 6831f1-6831f6 602->606 607 683199-68319e 603->607 608 683265-68326d PostQuitMessage 603->608 609 6831de-6831e4 604->609 641 6c2e28-6c2e2f 605->641 611 6831f8-6831fb 606->611 612 68321d-683244 SetTimer RegisterWindowMessageW 606->612 614 6c2e7c-6c2e90 call 6ebf30 607->614 615 6831a4-6831a8 607->615 610 683219-68321b 608->610 610->609 616 6c2d9c-6c2d9f 611->616 617 683201-68320f KillTimer call 6830f2 611->617 612->610 619 683246-683251 CreatePopupMenu 612->619 614->610 633 6c2e96 614->633 620 6c2e68-6c2e77 call 6ec161 615->620 621 6831ae-6831b3 615->621 624 6c2dd7-6c2df6 MoveWindow 616->624 625 6c2da1-6c2da5 616->625 637 683214 call 683c50 617->637 619->610 620->610 629 6c2e4d-6c2e54 621->629 630 6831b9-6831be 621->630 624->610 634 6c2dc6-6c2dd2 SetFocus 625->634 635 6c2da7-6c2daa 625->635 629->604 636 6c2e5a-6c2e63 call 6e0ad7 629->636 631 683253-683263 call 68326f 630->631 632 6831c4-6831ca 630->632 631->610 632->604 632->641 633->604 634->610 635->632 642 6c2db0-6c2dc1 call 6818e2 635->642 636->604 637->610 641->604 646 6c2e35-6c2e48 call 6830f2 call 683837 641->646 642->610 646->604
                        APIs
                        • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,0068316A,?,?), ref: 006831D8
                        • KillTimer.USER32(?,00000001,?,?,?,?,?,0068316A,?,?), ref: 00683204
                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00683227
                        • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,0068316A,?,?), ref: 00683232
                        • CreatePopupMenu.USER32 ref: 00683246
                        • PostQuitMessage.USER32(00000000), ref: 00683267
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                        • String ID: TaskbarCreated
                        • API String ID: 129472671-2362178303
                        • Opcode ID: bc1c187e05be960bb16740785128d4c91dcfce31ea07f78540d593ec8280ea81
                        • Instruction ID: a40f94fd151cc07d7db4c7640d12b4db22ab0e00cba066a172afd933302a0ef7
                        • Opcode Fuzzy Hash: bc1c187e05be960bb16740785128d4c91dcfce31ea07f78540d593ec8280ea81
                        • Instruction Fuzzy Hash: 69413831240364A7DB153B789C2DBFD3A1BEB05F42F448329F942863E1C7E9AB418769

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 654 681410-681449 655 6c24b8-6c24b9 DestroyWindow 654->655 656 68144f-681465 mciSendStringW 654->656 661 6c24c4-6c24d1 655->661 657 68146b-681473 656->657 658 6816c6-6816d3 656->658 657->661 662 681479-681488 call 68182e 657->662 659 6816f8-6816ff 658->659 660 6816d5-6816f0 UnregisterHotKey 658->660 659->657 664 681705 659->664 660->659 663 6816f2-6816f3 call 6810d0 660->663 665 6c2500-6c2507 661->665 666 6c24d3-6c24d6 661->666 673 6c250e-6c251a 662->673 674 68148e-681496 662->674 663->659 664->658 665->661 670 6c2509 665->670 671 6c24d8-6c24e0 call 686246 666->671 672 6c24e2-6c24e5 FindClose 666->672 670->673 675 6c24eb-6c24f8 671->675 672->675 680 6c251c-6c251e FreeLibrary 673->680 681 6c2524-6c252b 673->681 677 68149c-6814c1 call 68cfa0 674->677 678 6c2532-6c253f 674->678 675->665 679 6c24fa-6c24fb call 6f32b1 675->679 691 6814f8-681503 CoUninitialize 677->691 692 6814c3 677->692 686 6c2566-6c256d 678->686 687 6c2541-6c255e VirtualFree 678->687 679->665 680->681 681->673 685 6c252d 681->685 685->678 686->678 688 6c256f 686->688 687->686 690 6c2560-6c2561 call 6f3317 687->690 694 6c2574-6c2578 688->694 690->686 691->694 696 681509-68150e 691->696 695 6814c6-6814f6 call 681a05 call 6819ae 692->695 694->696 697 6c257e-6c2584 694->697 695->691 699 6c2589-6c2596 call 6f32eb 696->699 700 681514-68151e 696->700 697->696 713 6c2598 699->713 703 681524-6815a5 call 68988f call 681944 call 6817d5 call 69fe14 call 68177c call 68988f call 68cfa0 call 6817fe call 69fe14 700->703 704 681707-681714 call 69f80e 700->704 717 6c259d-6c25bf call 69fdcd 703->717 743 6815ab-6815cf call 69fe14 703->743 704->703 715 68171a 704->715 713->717 715->704 723 6c25c1 717->723 725 6c25c6-6c25e8 call 69fdcd 723->725 731 6c25ea 725->731 734 6c25ef-6c2611 call 69fdcd 731->734 740 6c2613 734->740 744 6c2618-6c2625 call 6e64d4 740->744 743->725 749 6815d5-6815f9 call 69fe14 743->749 750 6c2627 744->750 749->734 755 6815ff-681619 call 69fe14 749->755 752 6c262c-6c2639 call 69ac64 750->752 758 6c263b 752->758 755->744 760 68161f-681643 call 6817d5 call 69fe14 755->760 761 6c2640-6c264d call 6f3245 758->761 760->752 769 681649-681651 760->769 767 6c264f 761->767 771 6c2654-6c2661 call 6f32cc 767->771 769->761 770 681657-681675 call 68988f call 68190a 769->770 770->771 779 68167b-681689 770->779 777 6c2663 771->777 780 6c2668-6c2675 call 6f32cc 777->780 779->780 782 68168f-6816c5 call 68988f * 3 call 681876 779->782 785 6c2677 780->785 785->785
                        APIs
                        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00681459
                        • CoUninitialize.COMBASE ref: 006814F8
                        • UnregisterHotKey.USER32(?), ref: 006816DD
                        • DestroyWindow.USER32(?), ref: 006C24B9
                        • FreeLibrary.KERNEL32(?), ref: 006C251E
                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 006C254B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                        • String ID: close all
                        • API String ID: 469580280-3243417748
                        • Opcode ID: ce4c8b00a8c0fe14c4648b6f688c072857f8d2131fa8d56b81976b0b8962cea4
                        • Instruction ID: 3cb73a4e159b3208e569a821b3f26afdec0a37dd8a5356f2cede13885dfa0eda
                        • Opcode Fuzzy Hash: ce4c8b00a8c0fe14c4648b6f688c072857f8d2131fa8d56b81976b0b8962cea4
                        • Instruction Fuzzy Hash: CCD168717012128FCB29EF15C4A5F69F7AABF06700F1482ADE84AAB251DB30AD53CF54

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 803 682c63-682cd3 CreateWindowExW * 2 ShowWindow * 2
                        APIs
                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00682C91
                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00682CB2
                        • ShowWindow.USER32(00000000,?,?,?,?,?,?,00681CAD,?), ref: 00682CC6
                        • ShowWindow.USER32(00000000,?,?,?,?,?,?,00681CAD,?), ref: 00682CCF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Window$CreateShow
                        • String ID: AutoIt v3$edit
                        • API String ID: 1584632944-3779509399
                        • Opcode ID: 12c8a15061a3f6f0c31873d53f7f2bf6de98c298f405d574e1617146f43ef064
                        • Instruction ID: b0d1abf1c315df023011bb5be8fde395be666c819bd7634f2afc3c129e76acf7
                        • Opcode Fuzzy Hash: 12c8a15061a3f6f0c31873d53f7f2bf6de98c298f405d574e1617146f43ef064
                        • Instruction Fuzzy Hash: 51F03A755803907AEB310757AC28FF72EBDD7C6F62F41801AF900A25B0C2A91840DAB8

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1228 683b1c-683b27 1229 683b99-683b9b 1228->1229 1230 683b29-683b2e 1228->1230 1231 683b8c-683b8f 1229->1231 1230->1229 1232 683b30-683b48 RegOpenKeyExW 1230->1232 1232->1229 1233 683b4a-683b69 RegQueryValueExW 1232->1233 1234 683b6b-683b76 1233->1234 1235 683b80-683b8b RegCloseKey 1233->1235 1236 683b78-683b7a 1234->1236 1237 683b90-683b97 1234->1237 1235->1231 1238 683b7e 1236->1238 1237->1238 1238->1235
                        APIs
                        • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00683B0F,SwapMouseButtons,00000004,?), ref: 00683B40
                        • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00683B0F,SwapMouseButtons,00000004,?), ref: 00683B61
                        • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00683B0F,SwapMouseButtons,00000004,?), ref: 00683B83
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CloseOpenQueryValue
                        • String ID: Control Panel\Mouse
                        • API String ID: 3677997916-824357125
                        • Opcode ID: dc6fa97ccd0aa397b0a09ae92208407972b137899b0fec1bd83ff00c1a5af8ee
                        • Instruction ID: 7fc0e6970e72ea67262ef8a6b687360939489244675a79f74c57dc3c92d6502b
                        • Opcode Fuzzy Hash: dc6fa97ccd0aa397b0a09ae92208407972b137899b0fec1bd83ff00c1a5af8ee
                        • Instruction Fuzzy Hash: 68112AB5510218FFDB21DFA9DC44AEEB7B9EF24B84B108559A805D7210E2319F409764
                        APIs
                        • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 006C33A2
                          • Part of subcall function 00686B57: _wcslen.LIBCMT ref: 00686B6A
                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00683A04
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: IconLoadNotifyShell_String_wcslen
                        • String ID: Line:
                        • API String ID: 2289894680-1585850449
                        • Opcode ID: 4429140ab6d28aa22025af398f38ccc6131c45a8a23bfaf578571d838860d26f
                        • Instruction ID: 700451bf4fcd6cdbfdcd614b86ebd6319f4caa4f4551030cd0a8c36d8fdbadae
                        • Opcode Fuzzy Hash: 4429140ab6d28aa22025af398f38ccc6131c45a8a23bfaf578571d838860d26f
                        • Instruction Fuzzy Hash: 6431E571408360AFC765FB10DC55BEB77D9AB40711F008A1EF59982291EBB49A49C7CA
                        APIs
                        • GetOpenFileNameW.COMDLG32(?), ref: 006C2C8C
                          • Part of subcall function 00683AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00683A97,?,?,00682E7F,?,?,?,00000000), ref: 00683AC2
                          • Part of subcall function 00682DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00682DC4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Name$Path$FileFullLongOpen
                        • String ID: X$`et
                        • API String ID: 779396738-3861162649
                        • Opcode ID: d00ec17c91cd80fd247b4b7b3607f113ac76f335f604c083815bcf1386d5150b
                        • Instruction ID: 5a585316b719435a48a1b82d78126e051bae23ef10c5536e9564edd82dc1430a
                        • Opcode Fuzzy Hash: d00ec17c91cd80fd247b4b7b3607f113ac76f335f604c083815bcf1386d5150b
                        • Instruction Fuzzy Hash: 7721D570A002989FCF41EF98C819BEE7BFAAF49715F00805DE405B7341DBB85A498F65
                        APIs
                        • __CxxThrowException@8.LIBVCRUNTIME ref: 006A0668
                          • Part of subcall function 006A32A4: RaiseException.KERNEL32(?,?,?,006A068A,?,00751444,?,?,?,?,?,?,006A068A,00681129,00748738,00681129), ref: 006A3304
                        • __CxxThrowException@8.LIBVCRUNTIME ref: 006A0685
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Exception@8Throw$ExceptionRaise
                        • String ID: Unknown exception
                        • API String ID: 3476068407-410509341
                        • Opcode ID: 46c5e3e71f373917879fafb90194f0885e53806ca24165f91540893179898e83
                        • Instruction ID: fbf286206d50bce1ea8a6168bb88f19ab08a9082e13122331d5915444cf655ae
                        • Opcode Fuzzy Hash: 46c5e3e71f373917879fafb90194f0885e53806ca24165f91540893179898e83
                        • Instruction Fuzzy Hash: 31F0FF2490020C638F40B6A4D846CAE776E5E02344B604039B814C2A92EF71EE2ACD85
                        APIs
                          • Part of subcall function 00681BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00681BF4
                          • Part of subcall function 00681BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00681BFC
                          • Part of subcall function 00681BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00681C07
                          • Part of subcall function 00681BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00681C12
                          • Part of subcall function 00681BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00681C1A
                          • Part of subcall function 00681BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00681C22
                          • Part of subcall function 00681B4A: RegisterWindowMessageW.USER32(00000004,?,006812C4), ref: 00681BA2
                        • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0068136A
                        • OleInitialize.OLE32 ref: 00681388
                        • CloseHandle.KERNEL32(00000000,00000000), ref: 006C24AB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                        • String ID:
                        • API String ID: 1986988660-0
                        • Opcode ID: 7c9015d1890d87a7ba49fc51ba19634737338ab5e670df19e226973942298e58
                        • Instruction ID: be6e43ac798b6de16ed2d14b18aac24540b2b9ec5316046d6a13fa84fdc07657
                        • Opcode Fuzzy Hash: 7c9015d1890d87a7ba49fc51ba19634737338ab5e670df19e226973942298e58
                        • Instruction Fuzzy Hash: 9271B9B49013408EC785EFB9A8457E53AE5AB88357394C62ED40ACB361FBB85865CF4C
                        APIs
                        • CloseHandle.KERNELBASE(00000000,00000000,?,?,006B85CC,?,00748CC8,0000000C), ref: 006B8704
                        • GetLastError.KERNEL32(?,006B85CC,?,00748CC8,0000000C), ref: 006B870E
                        • __dosmaperr.LIBCMT ref: 006B8739
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CloseErrorHandleLast__dosmaperr
                        • String ID:
                        • API String ID: 2583163307-0
                        • Opcode ID: 287a73a1cd3eee8b16844aa7451954e0bcc94e74c74d72334128a2881dc88396
                        • Instruction ID: f30fd18cc831fe3244617fcc198c4e22e9d3d058593280e8453e762c535ab93b
                        • Opcode Fuzzy Hash: 287a73a1cd3eee8b16844aa7451954e0bcc94e74c74d72334128a2881dc88396
                        • Instruction Fuzzy Hash: 910148B26042302EC6A07274A8457EE278F4B92778F39011DE8158B3D2FEA48CC1C398
                        APIs
                        • __Init_thread_footer.LIBCMT ref: 006917F6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Init_thread_footer
                        • String ID: CALL
                        • API String ID: 1385522511-4196123274
                        • Opcode ID: efc98a73580add69454d8651a527769386f105d88b750b806060165a5bc2e7e9
                        • Instruction ID: 13e96f984b6014a2f35beaac65bdb42f55060bd0b1cd48037526a262c75b402d
                        • Opcode Fuzzy Hash: efc98a73580add69454d8651a527769386f105d88b750b806060165a5bc2e7e9
                        • Instruction Fuzzy Hash: 9C22AEB0608302DFCB14DF14C480A6ABBFABF8A314F25895EF4968B761D771E845CB52
                        APIs
                        • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00683908
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: IconNotifyShell_
                        • String ID:
                        • API String ID: 1144537725-0
                        • Opcode ID: 90a38de7d459779ffc1066004f83c38ccef96fe3d5dc6b549365ad30ecee7d8e
                        • Instruction ID: 5c5a0fab43825b98f08d75d0ff3b0819a3fb4882d7363d33c97921f70b054e78
                        • Opcode Fuzzy Hash: 90a38de7d459779ffc1066004f83c38ccef96fe3d5dc6b549365ad30ecee7d8e
                        • Instruction Fuzzy Hash: 7631F5B06043118FD760EF24C8947D7BBE8FB49709F004A2EF99983380E7B5AA04CB56
                        APIs
                          • Part of subcall function 00684E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00684EDD,?,00751418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00684E9C
                          • Part of subcall function 00684E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00684EAE
                          • Part of subcall function 00684E90: FreeLibrary.KERNEL32(00000000,?,?,00684EDD,?,00751418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00684EC0
                        • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00751418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00684EFD
                          • Part of subcall function 00684E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,006C3CDE,?,00751418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00684E62
                          • Part of subcall function 00684E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00684E74
                          • Part of subcall function 00684E59: FreeLibrary.KERNEL32(00000000,?,?,006C3CDE,?,00751418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00684E87
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Library$Load$AddressFreeProc
                        • String ID:
                        • API String ID: 2632591731-0
                        • Opcode ID: b94b5860ef8bd8c6d2aa62501d9b958f4936467cb94d5946a0460d456d8c68bc
                        • Instruction ID: c2d020f0c37eb8dd0c6545dc9ad0c1026f2a57e7f2788d3dcb27901edfd600e2
                        • Opcode Fuzzy Hash: b94b5860ef8bd8c6d2aa62501d9b958f4936467cb94d5946a0460d456d8c68bc
                        • Instruction Fuzzy Hash: 41112731600306AACB20BF64DC06FED77A7AF80714F10852DF142A61C1EE719E059B58
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: __wsopen_s
                        • String ID:
                        • API String ID: 3347428461-0
                        • Opcode ID: e85a8f764a19cd7d7e64a392af8df33984e428e40bce8f687b431b3414ee141b
                        • Instruction ID: b0bda766227cc30ddc104f59cdd4807105de4a012e1fd2fc8686b5c13372b552
                        • Opcode Fuzzy Hash: e85a8f764a19cd7d7e64a392af8df33984e428e40bce8f687b431b3414ee141b
                        • Instruction Fuzzy Hash: 031118B590420AAFCF05DF58E941ADA7BF9EF48314F104059FC08AB312DA31DA11CBA5
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                        • Instruction ID: a412a6f2f7552fc93f74f2d7a4b5ffff51442dce1b9358edcfae4d16d15b1661
                        • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                        • Instruction Fuzzy Hash: 74F0D172510A10AAD6313A698C05BDA339F9F63371F100B29F425932D2DA759C428EAD
                        APIs
                        • RtlAllocateHeap.NTDLL(00000000,?,00751444,?,0069FDF5,?,?,0068A976,00000010,00751440,006813FC,?,006813C6,?,00681129), ref: 006B3852
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: e0f6d5dc7f14c15b1966ea3ad3e6e8be0d114cef73a0a8f95f2a7a4a2a072d4a
                        • Instruction ID: 5b4ae1e1a8e2cf9529019fe2ce4f2d2cbc3cc45f17d30a690d3bd7051b0f319a
                        • Opcode Fuzzy Hash: e0f6d5dc7f14c15b1966ea3ad3e6e8be0d114cef73a0a8f95f2a7a4a2a072d4a
                        • Instruction Fuzzy Hash: 07E0E57134023466D73136AA9C01BDA374BBF827B1F060034BD0592790DF50DE8187E7
                        APIs
                        • FreeLibrary.KERNEL32(?,?,00751418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00684F6D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: FreeLibrary
                        • String ID:
                        • API String ID: 3664257935-0
                        • Opcode ID: 6debd210114b25ff05e39237640043a061755c1e2d5dc8e1a7e192374903c6c5
                        • Instruction ID: 657c97b089a1aa781ba052fbb935c561d9c1ee1802189eb5ba80adad7a80342d
                        • Opcode Fuzzy Hash: 6debd210114b25ff05e39237640043a061755c1e2d5dc8e1a7e192374903c6c5
                        • Instruction Fuzzy Hash: 68F03971105752CFDB34AF64D490862BBE6BF54329325CABEE2EA82621CB329844DF10
                        APIs
                        • Shell_NotifyIconW.SHELL32(00000002,?), ref: 0068314E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: IconNotifyShell_
                        • String ID:
                        • API String ID: 1144537725-0
                        • Opcode ID: 193bb9daa29e31cb6747718ea81a8a054276af2ac73d7f68059ffa4acabd1a57
                        • Instruction ID: a1a7b373c873fe7a00693fe4196a3c9160614e39b532396411ad06b9c590e656
                        • Opcode Fuzzy Hash: 193bb9daa29e31cb6747718ea81a8a054276af2ac73d7f68059ffa4acabd1a57
                        • Instruction Fuzzy Hash: 43F0A7709043549FEB529B24DC497D57BBCA701709F0040E9A58896291D7B44B88CF45
                        APIs
                        • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00682DC4
                          • Part of subcall function 00686B57: _wcslen.LIBCMT ref: 00686B6A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: LongNamePath_wcslen
                        • String ID:
                        • API String ID: 541455249-0
                        • Opcode ID: b2b3b47a3bfe651ee96f4e7073ce0af5100030e2ab5e3c74f8a48a87dfdc3e7a
                        • Instruction ID: 202e67dbfe78a49639da02c2fafcdf743c1ff5cdbfa59d75795795680163c41f
                        • Opcode Fuzzy Hash: b2b3b47a3bfe651ee96f4e7073ce0af5100030e2ab5e3c74f8a48a87dfdc3e7a
                        • Instruction Fuzzy Hash: B6E0CD726002245BC711A298DC05FEA77DDDFC9790F044179FD09D7248D974ED808654
                        APIs
                          • Part of subcall function 00683837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00683908
                          • Part of subcall function 0068D730: GetInputState.USER32 ref: 0068D807
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00682B6B
                          • Part of subcall function 006830F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 0068314E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: IconNotifyShell_$CurrentDirectoryInputState
                        • String ID:
                        • API String ID: 3667716007-0
                        • Opcode ID: 9d4e2e41c749bb70d89cf299762eeda7086f2fdfb9a5c027213712d6bf1e9504
                        • Instruction ID: f0dcc9376197c4b127d1310c613238588600bba1ae23cb74e30a0a84f5a22928
                        • Opcode Fuzzy Hash: 9d4e2e41c749bb70d89cf299762eeda7086f2fdfb9a5c027213712d6bf1e9504
                        • Instruction Fuzzy Hash: 3EE0263130025402CA48BB74A8125FDA34B8BD1756F40573EF142432E2CE684949432A
                        APIs
                        • CreateFileW.KERNELBASE(00000000,00000000,?,006C0704,?,?,00000000,?,006C0704,00000000,0000000C), ref: 006C03B7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CreateFile
                        • String ID:
                        • API String ID: 823142352-0
                        • Opcode ID: 730a4fa0e8bb5edd60a9a73984fcd8a6d07451c377e51847b712797358c2a543
                        • Instruction ID: fff97c8948527b237504153f30b099448a575bc924084ded6a94f3f4c6d6e4d9
                        • Opcode Fuzzy Hash: 730a4fa0e8bb5edd60a9a73984fcd8a6d07451c377e51847b712797358c2a543
                        • Instruction Fuzzy Hash: 2AD06C3208010DBBDF028F84DD06EDA3BAAFB48714F018000BE1856060C736E821AB94
                        APIs
                        • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00681CBC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: InfoParametersSystem
                        • String ID:
                        • API String ID: 3098949447-0
                        • Opcode ID: fe2a9ac1bab54e171fe8e1be8190f86ae8b5e14498fd5bdbb2ec1fc9154dc104
                        • Instruction ID: 7d851acf2c5eeebe6ec842ff3c9dd88e4d292314408b905fd831b7bb5bc8617b
                        • Opcode Fuzzy Hash: fe2a9ac1bab54e171fe8e1be8190f86ae8b5e14498fd5bdbb2ec1fc9154dc104
                        • Instruction Fuzzy Hash: ADC09B352C03049FF21547C4BC5AF907755A348B02F54C401F609555F3D3E51430D658
                        APIs
                          • Part of subcall function 00699BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00699BB2
                        • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0071961A
                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0071965B
                        • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0071969F
                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 007196C9
                        • SendMessageW.USER32 ref: 007196F2
                        • GetKeyState.USER32(00000011), ref: 0071978B
                        • GetKeyState.USER32(00000009), ref: 00719798
                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 007197AE
                        • GetKeyState.USER32(00000010), ref: 007197B8
                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 007197E9
                        • SendMessageW.USER32 ref: 00719810
                        • SendMessageW.USER32(?,00001030,?,00717E95), ref: 00719918
                        • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0071992E
                        • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00719941
                        • SetCapture.USER32(?), ref: 0071994A
                        • ClientToScreen.USER32(?,?), ref: 007199AF
                        • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 007199BC
                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 007199D6
                        • ReleaseCapture.USER32 ref: 007199E1
                        • GetCursorPos.USER32(?), ref: 00719A19
                        • ScreenToClient.USER32(?,?), ref: 00719A26
                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00719A80
                        • SendMessageW.USER32 ref: 00719AAE
                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00719AEB
                        • SendMessageW.USER32 ref: 00719B1A
                        • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00719B3B
                        • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00719B4A
                        • GetCursorPos.USER32(?), ref: 00719B68
                        • ScreenToClient.USER32(?,?), ref: 00719B75
                        • GetParent.USER32(?), ref: 00719B93
                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00719BFA
                        • SendMessageW.USER32 ref: 00719C2B
                        • ClientToScreen.USER32(?,?), ref: 00719C84
                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00719CB4
                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00719CDE
                        • SendMessageW.USER32 ref: 00719D01
                        • ClientToScreen.USER32(?,?), ref: 00719D4E
                        • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00719D82
                          • Part of subcall function 00699944: GetWindowLongW.USER32(?,000000EB), ref: 00699952
                        • GetWindowLongW.USER32(?,000000F0), ref: 00719E05
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                        • String ID: @GUI_DRAGID$F$p#u
                        • API String ID: 3429851547-3412459582
                        • Opcode ID: 513f69d02fde08236b13077898db281eeb735f5975b478b3a02bf999ca2a5d34
                        • Instruction ID: 5453cb1be751f384d73e5aeac657b3f1149da63cf48d2439c407c06abb7ff89e
                        • Opcode Fuzzy Hash: 513f69d02fde08236b13077898db281eeb735f5975b478b3a02bf999ca2a5d34
                        • Instruction Fuzzy Hash: 9D429C30204240EFD725CF68CC54AEABBE5FF88310F148659F699872E1D779E892CB65
                        APIs
                        • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 007148F3
                        • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00714908
                        • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00714927
                        • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 0071494B
                        • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 0071495C
                        • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 0071497B
                        • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 007149AE
                        • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 007149D4
                        • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00714A0F
                        • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00714A56
                        • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00714A7E
                        • IsMenu.USER32(?), ref: 00714A97
                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00714AF2
                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00714B20
                        • GetWindowLongW.USER32(?,000000F0), ref: 00714B94
                        • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00714BE3
                        • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00714C82
                        • wsprintfW.USER32 ref: 00714CAE
                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00714CC9
                        • GetWindowTextW.USER32(?,00000000,00000001), ref: 00714CF1
                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00714D13
                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00714D33
                        • GetWindowTextW.USER32(?,00000000,00000001), ref: 00714D5A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                        • String ID: %d/%02d/%02d
                        • API String ID: 4054740463-328681919
                        • Opcode ID: d2a453abd571322316bb3b54fdd92ce59dc5d5f1865726d7bfc418451c91fab0
                        • Instruction ID: bc22f0db0d4ea8f4b6ce38ebae9331a133f80153887e5ed58d7736afae030595
                        • Opcode Fuzzy Hash: d2a453abd571322316bb3b54fdd92ce59dc5d5f1865726d7bfc418451c91fab0
                        • Instruction Fuzzy Hash: C812FB71600214ABEB258F68CC49FEE7BF8BF45310F148269F516EA2E1DB789981CB50
                        APIs
                        • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 0069F998
                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 006DF474
                        • IsIconic.USER32(00000000), ref: 006DF47D
                        • ShowWindow.USER32(00000000,00000009), ref: 006DF48A
                        • SetForegroundWindow.USER32(00000000), ref: 006DF494
                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 006DF4AA
                        • GetCurrentThreadId.KERNEL32 ref: 006DF4B1
                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 006DF4BD
                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 006DF4CE
                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 006DF4D6
                        • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 006DF4DE
                        • SetForegroundWindow.USER32(00000000), ref: 006DF4E1
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 006DF4F6
                        • keybd_event.USER32(00000012,00000000), ref: 006DF501
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 006DF50B
                        • keybd_event.USER32(00000012,00000000), ref: 006DF510
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 006DF519
                        • keybd_event.USER32(00000012,00000000), ref: 006DF51E
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 006DF528
                        • keybd_event.USER32(00000012,00000000), ref: 006DF52D
                        • SetForegroundWindow.USER32(00000000), ref: 006DF530
                        • AttachThreadInput.USER32(?,000000FF,00000000), ref: 006DF557
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                        • String ID: Shell_TrayWnd
                        • API String ID: 4125248594-2988720461
                        • Opcode ID: 776e55514771509bc1a20d2baeb88ef497068553f4935a54160423b7a40940b3
                        • Instruction ID: 5fb8e58edb3663eee544262ef28c1ef07da275e7cb7e09d7fec5600d5514e630
                        • Opcode Fuzzy Hash: 776e55514771509bc1a20d2baeb88ef497068553f4935a54160423b7a40940b3
                        • Instruction Fuzzy Hash: F0315371E80218BBEB216BF55C4AFFF7E6DEB44B50F108066F601E62D1C6B45D10AAA4
                        APIs
                          • Part of subcall function 006E16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 006E170D
                          • Part of subcall function 006E16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 006E173A
                          • Part of subcall function 006E16C3: GetLastError.KERNEL32 ref: 006E174A
                        • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 006E1286
                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 006E12A8
                        • CloseHandle.KERNEL32(?), ref: 006E12B9
                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 006E12D1
                        • GetProcessWindowStation.USER32 ref: 006E12EA
                        • SetProcessWindowStation.USER32(00000000), ref: 006E12F4
                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 006E1310
                          • Part of subcall function 006E10BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,006E11FC), ref: 006E10D4
                          • Part of subcall function 006E10BF: CloseHandle.KERNEL32(?,?,006E11FC), ref: 006E10E9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                        • String ID: $default$winsta0$Zt
                        • API String ID: 22674027-2762121913
                        • Opcode ID: 0d7968e01653ae8d094ffd767a4ccb9d1e2698f7c66a54dd1895f761e6752011
                        • Instruction ID: 4a38a4a5903ed8e11c7da53d3cf6fc06652bca6102f09b34e509eecfbb54aa84
                        • Opcode Fuzzy Hash: 0d7968e01653ae8d094ffd767a4ccb9d1e2698f7c66a54dd1895f761e6752011
                        • Instruction Fuzzy Hash: B781AE71901389AFDF219FA9DC49FEE7BBAEF05700F148129F910AA2E0C7748945DB24
                        APIs
                          • Part of subcall function 006E10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 006E1114
                          • Part of subcall function 006E10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,006E0B9B,?,?,?), ref: 006E1120
                          • Part of subcall function 006E10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,006E0B9B,?,?,?), ref: 006E112F
                          • Part of subcall function 006E10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,006E0B9B,?,?,?), ref: 006E1136
                          • Part of subcall function 006E10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 006E114D
                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 006E0BCC
                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 006E0C00
                        • GetLengthSid.ADVAPI32(?), ref: 006E0C17
                        • GetAce.ADVAPI32(?,00000000,?), ref: 006E0C51
                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 006E0C6D
                        • GetLengthSid.ADVAPI32(?), ref: 006E0C84
                        • GetProcessHeap.KERNEL32(00000008,00000008), ref: 006E0C8C
                        • HeapAlloc.KERNEL32(00000000), ref: 006E0C93
                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 006E0CB4
                        • CopySid.ADVAPI32(00000000), ref: 006E0CBB
                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 006E0CEA
                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 006E0D0C
                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 006E0D1E
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 006E0D45
                        • HeapFree.KERNEL32(00000000), ref: 006E0D4C
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 006E0D55
                        • HeapFree.KERNEL32(00000000), ref: 006E0D5C
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 006E0D65
                        • HeapFree.KERNEL32(00000000), ref: 006E0D6C
                        • GetProcessHeap.KERNEL32(00000000,?), ref: 006E0D78
                        • HeapFree.KERNEL32(00000000), ref: 006E0D7F
                          • Part of subcall function 006E1193: GetProcessHeap.KERNEL32(00000008,006E0BB1,?,00000000,?,006E0BB1,?), ref: 006E11A1
                          • Part of subcall function 006E1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,006E0BB1,?), ref: 006E11A8
                          • Part of subcall function 006E1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,006E0BB1,?), ref: 006E11B7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                        • String ID:
                        • API String ID: 4175595110-0
                        • Opcode ID: b47fb3de4a7166ccbc6702fe9c20a1fc610d02d31d2575e133e2d07a1a64b910
                        • Instruction ID: a60f46c00fb552bc5043e4edfb96d5b54cba5c55bd445e0e2bcac6bab1a04b4f
                        • Opcode Fuzzy Hash: b47fb3de4a7166ccbc6702fe9c20a1fc610d02d31d2575e133e2d07a1a64b910
                        • Instruction Fuzzy Hash: D671AC7194134AEBEF11DFE5DC49BEEBBBAFF08300F148115E914A6290D7B8A941CB60
                        APIs
                        • OpenClipboard.USER32(0071CC08), ref: 006FEB29
                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 006FEB37
                        • GetClipboardData.USER32(0000000D), ref: 006FEB43
                        • CloseClipboard.USER32 ref: 006FEB4F
                        • GlobalLock.KERNEL32(00000000), ref: 006FEB87
                        • CloseClipboard.USER32 ref: 006FEB91
                        • GlobalUnlock.KERNEL32(00000000), ref: 006FEBBC
                        • IsClipboardFormatAvailable.USER32(00000001), ref: 006FEBC9
                        • GetClipboardData.USER32(00000001), ref: 006FEBD1
                        • GlobalLock.KERNEL32(00000000), ref: 006FEBE2
                        • GlobalUnlock.KERNEL32(00000000), ref: 006FEC22
                        • IsClipboardFormatAvailable.USER32(0000000F), ref: 006FEC38
                        • GetClipboardData.USER32(0000000F), ref: 006FEC44
                        • GlobalLock.KERNEL32(00000000), ref: 006FEC55
                        • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 006FEC77
                        • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 006FEC94
                        • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 006FECD2
                        • GlobalUnlock.KERNEL32(00000000), ref: 006FECF3
                        • CountClipboardFormats.USER32 ref: 006FED14
                        • CloseClipboard.USER32 ref: 006FED59
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                        • String ID:
                        • API String ID: 420908878-0
                        • Opcode ID: 09107ef8b8288d51f7cb2180a1ae4ea2339f18d2ea6a108b21c4a223adff1b5b
                        • Instruction ID: 181054a7f8f89288c948444646c324e6ba5df405c5c87f91f41b6325b7cff39b
                        • Opcode Fuzzy Hash: 09107ef8b8288d51f7cb2180a1ae4ea2339f18d2ea6a108b21c4a223adff1b5b
                        • Instruction Fuzzy Hash: D361EF342443059FD301EF68C884FBA7BA6AF84704F08851DF556972E2CB36D906CB66
                        APIs
                        • FindFirstFileW.KERNEL32(?,?), ref: 006F69BE
                        • FindClose.KERNEL32(00000000), ref: 006F6A12
                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 006F6A4E
                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 006F6A75
                          • Part of subcall function 00689CB3: _wcslen.LIBCMT ref: 00689CBD
                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 006F6AB2
                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 006F6ADF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                        • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                        • API String ID: 3830820486-3289030164
                        • Opcode ID: 22dacc361c12060250e5665174494fdb29e985299bbbf3f950145710a3f557c6
                        • Instruction ID: 1141ea13aa39efdeacf12598595454c3d025a5d25629ad4ebbe3ebc0cd8f178f
                        • Opcode Fuzzy Hash: 22dacc361c12060250e5665174494fdb29e985299bbbf3f950145710a3f557c6
                        • Instruction Fuzzy Hash: 60D16FB2508300AFC754EFA4C881EBBB7EDAF98704F04491DF685D6291EB75DA04CB62
                        APIs
                        • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 006F9663
                        • GetFileAttributesW.KERNEL32(?), ref: 006F96A1
                        • SetFileAttributesW.KERNEL32(?,?), ref: 006F96BB
                        • FindNextFileW.KERNEL32(00000000,?), ref: 006F96D3
                        • FindClose.KERNEL32(00000000), ref: 006F96DE
                        • FindFirstFileW.KERNEL32(*.*,?), ref: 006F96FA
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 006F974A
                        • SetCurrentDirectoryW.KERNEL32(00746B7C), ref: 006F9768
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 006F9772
                        • FindClose.KERNEL32(00000000), ref: 006F977F
                        • FindClose.KERNEL32(00000000), ref: 006F978F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                        • String ID: *.*
                        • API String ID: 1409584000-438819550
                        • Opcode ID: a8e9e7e98c026d332d18c9e2443ace786fdda2289470387e4354c1f7668ca5bc
                        • Instruction ID: f1bfec04fcb070c14a971820f83957968b5e925934f050de5babd57dab39a94b
                        • Opcode Fuzzy Hash: a8e9e7e98c026d332d18c9e2443ace786fdda2289470387e4354c1f7668ca5bc
                        • Instruction Fuzzy Hash: FC31AE7254021D6ADB15AFF8DC08BEE77ADAF0A321F108155FA15E21A0DB38DE44CA68
                        APIs
                        • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 006F97BE
                        • FindNextFileW.KERNEL32(00000000,?), ref: 006F9819
                        • FindClose.KERNEL32(00000000), ref: 006F9824
                        • FindFirstFileW.KERNEL32(*.*,?), ref: 006F9840
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 006F9890
                        • SetCurrentDirectoryW.KERNEL32(00746B7C), ref: 006F98AE
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 006F98B8
                        • FindClose.KERNEL32(00000000), ref: 006F98C5
                        • FindClose.KERNEL32(00000000), ref: 006F98D5
                          • Part of subcall function 006EDAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 006EDB00
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                        • String ID: *.*
                        • API String ID: 2640511053-438819550
                        • Opcode ID: 25cea9cabb0e35897e224d09d5b5e7f4f9280fb4ea669a7bc87e64a967e456c4
                        • Instruction ID: f3e72ffb7724033a952e21f3cb38a1af9da34bda570ec4141e76841fe2939025
                        • Opcode Fuzzy Hash: 25cea9cabb0e35897e224d09d5b5e7f4f9280fb4ea669a7bc87e64a967e456c4
                        • Instruction Fuzzy Hash: 9531B27154021D6ADF11EFA8DC48BEE77AEAF06360F108556E920A22D0DB74DE85CE74
                        APIs
                          • Part of subcall function 0070C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0070B6AE,?,?), ref: 0070C9B5
                          • Part of subcall function 0070C998: _wcslen.LIBCMT ref: 0070C9F1
                          • Part of subcall function 0070C998: _wcslen.LIBCMT ref: 0070CA68
                          • Part of subcall function 0070C998: _wcslen.LIBCMT ref: 0070CA9E
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0070BF3E
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 0070BFA9
                        • RegCloseKey.ADVAPI32(00000000), ref: 0070BFCD
                        • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0070C02C
                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 0070C0E7
                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0070C154
                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0070C1E9
                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 0070C23A
                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0070C2E3
                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0070C382
                        • RegCloseKey.ADVAPI32(00000000), ref: 0070C38F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                        • String ID:
                        • API String ID: 3102970594-0
                        • Opcode ID: 59398a30c1e8958223376a2a7da0fa562adc0bdddf3f7133d18f65ecc205a998
                        • Instruction ID: c1380f4b18675ebdca461a3fa5ff85cdd29bdadb057616a6fa707058b9b05807
                        • Opcode Fuzzy Hash: 59398a30c1e8958223376a2a7da0fa562adc0bdddf3f7133d18f65ecc205a998
                        • Instruction Fuzzy Hash: AE024B70604200DFD715DF28C895A2ABBE5AF89304F18C69DF84ADB2A2DB35ED45CB52
                        APIs
                        • GetLocalTime.KERNEL32(?), ref: 006F8257
                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 006F8267
                        • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 006F8273
                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 006F8310
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 006F8324
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 006F8356
                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 006F838C
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 006F8395
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CurrentDirectoryTime$File$Local$System
                        • String ID: *.*
                        • API String ID: 1464919966-438819550
                        • Opcode ID: f93197ddcb3e73c3ebf40f44cdf2d4b24fe246e12699fc9cda71be6bb003ac90
                        • Instruction ID: c15c390635baa1fbaf3875334fd2abd219b8d265d9678a866a1a5e5094edec42
                        • Opcode Fuzzy Hash: f93197ddcb3e73c3ebf40f44cdf2d4b24fe246e12699fc9cda71be6bb003ac90
                        • Instruction Fuzzy Hash: 8C618BB25083099FCB10EF64C8409AEB3EAFF89310F04895DFA9997251DB35E945CB96
                        APIs
                          • Part of subcall function 00683AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00683A97,?,?,00682E7F,?,?,?,00000000), ref: 00683AC2
                          • Part of subcall function 006EE199: GetFileAttributesW.KERNEL32(?,006ECF95), ref: 006EE19A
                        • FindFirstFileW.KERNEL32(?,?), ref: 006ED122
                        • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 006ED1DD
                        • MoveFileW.KERNEL32(?,?), ref: 006ED1F0
                        • DeleteFileW.KERNEL32(?,?,?,?), ref: 006ED20D
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 006ED237
                          • Part of subcall function 006ED29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,006ED21C,?,?), ref: 006ED2B2
                        • FindClose.KERNEL32(00000000,?,?,?), ref: 006ED253
                        • FindClose.KERNEL32(00000000), ref: 006ED264
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                        • String ID: \*.*
                        • API String ID: 1946585618-1173974218
                        • Opcode ID: 0902585264464ed23add295559abe0ca59a0e62b6e64571d3ef5524a3df17f41
                        • Instruction ID: b2cd0ce01d8d18847a43902222861d4e4dde914a4faf9f7ce1e58250966a27c5
                        • Opcode Fuzzy Hash: 0902585264464ed23add295559abe0ca59a0e62b6e64571d3ef5524a3df17f41
                        • Instruction Fuzzy Hash: 1A618D3180624D9FCF05EBE1CA529FDB776AF15300F248169E50277291EB315F09CB65
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                        • String ID:
                        • API String ID: 1737998785-0
                        • Opcode ID: a0b1104781a6869ed1a5fef97623961cbad1264619c9eec7b6bd3d77de8e66ad
                        • Instruction ID: 1057ade2d24fa5b5aefec3a72d0bafe5b78393035c3d4ef9a7598ec52381d5de
                        • Opcode Fuzzy Hash: a0b1104781a6869ed1a5fef97623961cbad1264619c9eec7b6bd3d77de8e66ad
                        • Instruction Fuzzy Hash: 0C41C035204611AFE311DF59E848BA9BBE2FF44328F14C099E5158BBB2C77AEC41CB94
                        APIs
                          • Part of subcall function 006E16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 006E170D
                          • Part of subcall function 006E16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 006E173A
                          • Part of subcall function 006E16C3: GetLastError.KERNEL32 ref: 006E174A
                        • ExitWindowsEx.USER32(?,00000000), ref: 006EE932
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                        • String ID: $ $@$SeShutdownPrivilege
                        • API String ID: 2234035333-3163812486
                        • Opcode ID: 4d4673074a3f769ee4e996315c053c8abd028115f461b7df998edee084dfcd5e
                        • Instruction ID: 1ef9ff2afb7198551e7f53c432e7eb979727993499e655ba7bae9b7b7dadfb49
                        • Opcode Fuzzy Hash: 4d4673074a3f769ee4e996315c053c8abd028115f461b7df998edee084dfcd5e
                        • Instruction Fuzzy Hash: 20019E72622311ABEB5022BA9C86FFF32DE9704740F144421FC03E71D3E6B65C4081E4
                        APIs
                        • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00701276
                        • WSAGetLastError.WSOCK32 ref: 00701283
                        • bind.WSOCK32(00000000,?,00000010), ref: 007012BA
                        • WSAGetLastError.WSOCK32 ref: 007012C5
                        • closesocket.WSOCK32(00000000), ref: 007012F4
                        • listen.WSOCK32(00000000,00000005), ref: 00701303
                        • WSAGetLastError.WSOCK32 ref: 0070130D
                        • closesocket.WSOCK32(00000000), ref: 0070133C
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ErrorLast$closesocket$bindlistensocket
                        • String ID:
                        • API String ID: 540024437-0
                        • Opcode ID: 66049467962ce6e84922a4269644501887bb68f99c844d7eb468dcfce7aa0c51
                        • Instruction ID: 1d364d261db0270b241872d0ed1b2639083cede9eea6eb06fc202ab8a5420348
                        • Opcode Fuzzy Hash: 66049467962ce6e84922a4269644501887bb68f99c844d7eb468dcfce7aa0c51
                        • Instruction Fuzzy Hash: 43417F71600100DFD710DF68C488B69BBE6BF86318F58C298E9569F2D2C779ED81CBA1
                        APIs
                        • _free.LIBCMT ref: 006BB9D4
                        • _free.LIBCMT ref: 006BB9F8
                        • _free.LIBCMT ref: 006BBB7F
                        • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00723700), ref: 006BBB91
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,0075121C,000000FF,00000000,0000003F,00000000,?,?), ref: 006BBC09
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00751270,000000FF,?,0000003F,00000000,?), ref: 006BBC36
                        • _free.LIBCMT ref: 006BBD4B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _free$ByteCharMultiWide$InformationTimeZone
                        • String ID:
                        • API String ID: 314583886-0
                        • Opcode ID: edc19a2ffadbd0881c8388c3b07724711ebb99126be0f441cef3e0d374317a0b
                        • Instruction ID: a46f259a95fe0ce60131dde7e0c697f3dc18d13af6e5f63a8afefdad3e02a0f9
                        • Opcode Fuzzy Hash: edc19a2ffadbd0881c8388c3b07724711ebb99126be0f441cef3e0d374317a0b
                        • Instruction Fuzzy Hash: 2DC127F1A04205AFCB20EF69CC51BEE7BAAEF41310F18519EE594D7251EBB08E81C754
                        APIs
                          • Part of subcall function 00683AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00683A97,?,?,00682E7F,?,?,?,00000000), ref: 00683AC2
                          • Part of subcall function 006EE199: GetFileAttributesW.KERNEL32(?,006ECF95), ref: 006EE19A
                        • FindFirstFileW.KERNEL32(?,?), ref: 006ED420
                        • DeleteFileW.KERNEL32(?,?,?,?), ref: 006ED470
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 006ED481
                        • FindClose.KERNEL32(00000000), ref: 006ED498
                        • FindClose.KERNEL32(00000000), ref: 006ED4A1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                        • String ID: \*.*
                        • API String ID: 2649000838-1173974218
                        • Opcode ID: 94ded5dc69b45be65b5cee2f060db0e75f15fd61b133710afcbffde00f69507e
                        • Instruction ID: 1c01e33d87e1cad05e428493d7f1580bc876e2e344ed3567d53e7b060af4df62
                        • Opcode Fuzzy Hash: 94ded5dc69b45be65b5cee2f060db0e75f15fd61b133710afcbffde00f69507e
                        • Instruction Fuzzy Hash: 103170710093859BC345FFA4C8558EF77E9BEA1300F448A1DF4D1522D1EB34AA09C767
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: __floor_pentium4
                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                        • API String ID: 4168288129-2761157908
                        • Opcode ID: eec4db8bf6bbbffa88099e9ae0967f5f1efabfd28ff177b537b0e29410374fe5
                        • Instruction ID: b74b25b552090f3bfc70c5f5362caae4a9283bfadeb96907728ec62b9bfe0cf3
                        • Opcode Fuzzy Hash: eec4db8bf6bbbffa88099e9ae0967f5f1efabfd28ff177b537b0e29410374fe5
                        • Instruction Fuzzy Hash: 6EC249B2E046288FDB65DF28DD407EAB7B6EB45304F1441EAD80DE7251E779AE818F40
                        APIs
                        • _wcslen.LIBCMT ref: 006F64DC
                        • CoInitialize.OLE32(00000000), ref: 006F6639
                        • CoCreateInstance.OLE32(0071FCF8,00000000,00000001,0071FB68,?), ref: 006F6650
                        • CoUninitialize.OLE32 ref: 006F68D4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                        • String ID: .lnk
                        • API String ID: 886957087-24824748
                        • Opcode ID: d77d0580bc5b13da63ecb63f786bc68516d4fa3bdbae3f4aa3085c9f4bf04355
                        • Instruction ID: 47caa30bca34ba9e3ce1dd5efaf4119dcd75d5f60ec045de10a6ad4ea708a748
                        • Opcode Fuzzy Hash: d77d0580bc5b13da63ecb63f786bc68516d4fa3bdbae3f4aa3085c9f4bf04355
                        • Instruction Fuzzy Hash: 6AD16AB1508305AFC344EF24C8819ABB7EAFF94304F144A6DF5959B2A1DB70ED05CBA2
                        APIs
                        • GetForegroundWindow.USER32(?,?,00000000), ref: 007022E8
                          • Part of subcall function 006FE4EC: GetWindowRect.USER32(?,?), ref: 006FE504
                        • GetDesktopWindow.USER32 ref: 00702312
                        • GetWindowRect.USER32(00000000), ref: 00702319
                        • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00702355
                        • GetCursorPos.USER32(?), ref: 00702381
                        • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 007023DF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Window$Rectmouse_event$CursorDesktopForeground
                        • String ID:
                        • API String ID: 2387181109-0
                        • Opcode ID: 8ec9eeae3053f732ee554073ab70c5259559da25fc601975418baf71b4b742a6
                        • Instruction ID: 2574c3b31e534acb6caff09819ccd4dd38437765c84c7f43fed560df62264598
                        • Opcode Fuzzy Hash: 8ec9eeae3053f732ee554073ab70c5259559da25fc601975418baf71b4b742a6
                        • Instruction Fuzzy Hash: 2831ED72105305ABC721DF58C808B9BBBEAFF84710F004A1DF984971C2DB38EA09CB96
                        APIs
                          • Part of subcall function 00689CB3: _wcslen.LIBCMT ref: 00689CBD
                        • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 006F9B78
                        • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 006F9C8B
                          • Part of subcall function 006F3874: GetInputState.USER32 ref: 006F38CB
                          • Part of subcall function 006F3874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006F3966
                        • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 006F9BA8
                        • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 006F9C75
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                        • String ID: *.*
                        • API String ID: 1972594611-438819550
                        • Opcode ID: 169bc67662dd2276bb35ae91779c3d0f5c4e4819e1003054ee5fa2b8b63db6b7
                        • Instruction ID: f06b386d95abac3919d1325f98404b6d1cbb540c9fb8362068193c433a36b8ff
                        • Opcode Fuzzy Hash: 169bc67662dd2276bb35ae91779c3d0f5c4e4819e1003054ee5fa2b8b63db6b7
                        • Instruction Fuzzy Hash: AC41A27194420E9FCF55EFA4C845BFEBBB6EF05310F244159E505A2291DB309E84CF64
                        APIs
                          • Part of subcall function 00699BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00699BB2
                        • DefDlgProcW.USER32(?,?,?,?,?), ref: 00699A4E
                        • GetSysColor.USER32(0000000F), ref: 00699B23
                        • SetBkColor.GDI32(?,00000000), ref: 00699B36
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Color$LongProcWindow
                        • String ID:
                        • API String ID: 3131106179-0
                        • Opcode ID: 5e52149435567cee2c030f2338348cbef7c06d66b2c4c6c0d38df3b959f0b302
                        • Instruction ID: ce7b39b6d1bd11c6775d380317874bc07b6d5a85efbf01c4703b6255acdd98bc
                        • Opcode Fuzzy Hash: 5e52149435567cee2c030f2338348cbef7c06d66b2c4c6c0d38df3b959f0b302
                        • Instruction Fuzzy Hash: F3A10570608544BFEB289A2C8C99EFB269FDB46311B14420EF502C6FD5EA29DD42D277
                        APIs
                          • Part of subcall function 0070304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0070307A
                          • Part of subcall function 0070304E: _wcslen.LIBCMT ref: 0070309B
                        • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0070185D
                        • WSAGetLastError.WSOCK32 ref: 00701884
                        • bind.WSOCK32(00000000,?,00000010), ref: 007018DB
                        • WSAGetLastError.WSOCK32 ref: 007018E6
                        • closesocket.WSOCK32(00000000), ref: 00701915
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                        • String ID:
                        • API String ID: 1601658205-0
                        • Opcode ID: ab43b0b57fb8fc3da5cc99e627e035392cd51e834078659497a4df1c19deb119
                        • Instruction ID: 7c1a4035075ff2b6cd031db0f667952ab310834fe75d1e709446180ca9c2b7ee
                        • Opcode Fuzzy Hash: ab43b0b57fb8fc3da5cc99e627e035392cd51e834078659497a4df1c19deb119
                        • Instruction Fuzzy Hash: 9D519271A00200AFEB10AF64C886F6A77E6AF44718F54C19CFA156F3D3C775AD418BA5
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                        • String ID:
                        • API String ID: 292994002-0
                        • Opcode ID: 75cfdaae6a55adf66cc04093c4ee214f6b7107004b6a535f33ba6e6e3eb7316e
                        • Instruction ID: 7b453b429aa48f2cc30d5994f76c5447d375b1008f6203709a7955e8f995d81d
                        • Opcode Fuzzy Hash: 75cfdaae6a55adf66cc04093c4ee214f6b7107004b6a535f33ba6e6e3eb7316e
                        • Instruction Fuzzy Hash: E021B1317802009FD7218F2ED844BAA7BA5AF85324B59C058E9468F2D1CB79DC82CBE4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                        • API String ID: 0-1546025612
                        • Opcode ID: d04706d65fd887956fc9acc9b1c0767a0785920cda437e644ca157809c307f08
                        • Instruction ID: 31563a1b3c8333eb1b87fcccd82ef9cc4a03334086685869d4c4d1cb96c874c4
                        • Opcode Fuzzy Hash: d04706d65fd887956fc9acc9b1c0767a0785920cda437e644ca157809c307f08
                        • Instruction Fuzzy Hash: 5FA25C71A0021ACFDF24DF58C950BFDB7B2EB54310F6482A9E816A7345EB749D81CB94
                        APIs
                        • lstrlenW.KERNEL32(?,?,?,00000000), ref: 006E82AA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: lstrlen
                        • String ID: ($tbt$|
                        • API String ID: 1659193697-2614987295
                        • Opcode ID: c4a49c55238c6bf63b2f58bc2c7cc96e1cfc8ef174cada2d71096c157d2df9fe
                        • Instruction ID: a6de3f00f366d97bb2a3103efc57ebc90c9f8738e273421251764e57491bf8cf
                        • Opcode Fuzzy Hash: c4a49c55238c6bf63b2f58bc2c7cc96e1cfc8ef174cada2d71096c157d2df9fe
                        • Instruction Fuzzy Hash: F2323474A017459FCB28CF5AC080AAAB7F1FF48710B15C46EE49ADB3A1EB70E941CB44
                        APIs
                        • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 006EAAAC
                        • SetKeyboardState.USER32(00000080), ref: 006EAAC8
                        • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 006EAB36
                        • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 006EAB88
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: KeyboardState$InputMessagePostSend
                        • String ID:
                        • API String ID: 432972143-0
                        • Opcode ID: 3263adb5a7866667ddfd8eb5ac6f486dea09f12d3fa7b88180031cd04579774c
                        • Instruction ID: bf28b463960df8a20cab7388b62599d8a8d092359a93849cfe02ea1bc9a551ad
                        • Opcode Fuzzy Hash: 3263adb5a7866667ddfd8eb5ac6f486dea09f12d3fa7b88180031cd04579774c
                        • Instruction Fuzzy Hash: EB311E30A41384AFFB358AE6CC057FA77A7AF54310F14421AF1C1962D1D374A945C766
                        APIs
                        • InternetReadFile.WININET(?,?,00000400,?), ref: 006FCE89
                        • GetLastError.KERNEL32(?,00000000), ref: 006FCEEA
                        • SetEvent.KERNEL32(?,?,00000000), ref: 006FCEFE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ErrorEventFileInternetLastRead
                        • String ID:
                        • API String ID: 234945975-0
                        • Opcode ID: bfd23291c3c5ec0abb825ae1f89a5020a5f1e9a90086b8c4a322b20052aa5adc
                        • Instruction ID: e2c4c6e7b4593bdfaa33208553f7d1fd15aa5f1017669dbb09d6b79e9d07b500
                        • Opcode Fuzzy Hash: bfd23291c3c5ec0abb825ae1f89a5020a5f1e9a90086b8c4a322b20052aa5adc
                        • Instruction Fuzzy Hash: BF21EDB154030D9BDB20DFA5CA48BF6B7FAEF00324F10841EE642D2291E774EE048B64
                        APIs
                        • FindFirstFileW.KERNEL32(?,?), ref: 006F5CC1
                        • FindNextFileW.KERNEL32(00000000,?), ref: 006F5D17
                        • FindClose.KERNEL32(?), ref: 006F5D5F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Find$File$CloseFirstNext
                        • String ID:
                        • API String ID: 3541575487-0
                        • Opcode ID: e6ed1793ebcd86924e66991337aaf1ac7917b813ff1edb9f6b2f39fb024ebfd6
                        • Instruction ID: 9905656bede2fc7c9708ebae4d7fb0937ff304e0858a0e6f219c9fc6497a18ad
                        • Opcode Fuzzy Hash: e6ed1793ebcd86924e66991337aaf1ac7917b813ff1edb9f6b2f39fb024ebfd6
                        • Instruction Fuzzy Hash: 6A51CB74604A059FC704DF28C494EA6B7E6FF4A324F14855EEA5A8B3A1CB30ED04CF95
                        APIs
                        • IsDebuggerPresent.KERNEL32 ref: 006B271A
                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 006B2724
                        • UnhandledExceptionFilter.KERNEL32(?), ref: 006B2731
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                        • String ID:
                        • API String ID: 3906539128-0
                        • Opcode ID: 27ded19e735edf34dd00c1a1de8a853203706ee7526dd5d8cce13fdee9acbad8
                        • Instruction ID: 08131cbeb8a24c5b2c5c061c7ab82f96a57aa71913240321e76aae4bc602c969
                        • Opcode Fuzzy Hash: 27ded19e735edf34dd00c1a1de8a853203706ee7526dd5d8cce13fdee9acbad8
                        • Instruction Fuzzy Hash: 6531D5749412199BCB61DF68DC887DCBBB9AF08310F5081EAE41CA7261EB349F818F49
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 006F51DA
                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 006F5238
                        • SetErrorMode.KERNEL32(00000000), ref: 006F52A1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ErrorMode$DiskFreeSpace
                        • String ID:
                        • API String ID: 1682464887-0
                        • Opcode ID: 0d80954131606a0287432943afb1c0025d9915cdebd7cc1e4e045d3dfa6a582a
                        • Instruction ID: 1dd3b7abe1c883dcc600843ee63b7c31c2f6ec98cddae19aa0f4efa74d6d355c
                        • Opcode Fuzzy Hash: 0d80954131606a0287432943afb1c0025d9915cdebd7cc1e4e045d3dfa6a582a
                        • Instruction Fuzzy Hash: BE316D75A005089FDB00DF94D884EADBBB5FF49314F088199E905AB392CB35ED45CBA4
                        APIs
                          • Part of subcall function 0069FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 006A0668
                          • Part of subcall function 0069FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 006A0685
                        • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 006E170D
                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 006E173A
                        • GetLastError.KERNEL32 ref: 006E174A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                        • String ID:
                        • API String ID: 577356006-0
                        • Opcode ID: 0192e7d3701275669cca01080d4e3f3ce913c1e821bb8cc1ebe803436453dded
                        • Instruction ID: cece8c157e91babf57dd77ac01687b9e696330ee1c6c9f3e1a3390a25377024e
                        • Opcode Fuzzy Hash: 0192e7d3701275669cca01080d4e3f3ce913c1e821bb8cc1ebe803436453dded
                        • Instruction Fuzzy Hash: 441191B2414304AFDB189F54DC86DAAB7BEEF45714B20C52EE05697681EB70BC45CB24
                        APIs
                        • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 006ED608
                        • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 006ED645
                        • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 006ED650
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CloseControlCreateDeviceFileHandle
                        • String ID:
                        • API String ID: 33631002-0
                        • Opcode ID: 493e3fd462752430a3a02eaa956727a524725a47c154f57b85c2b8d969d51e1f
                        • Instruction ID: d54a9ad5d7164c4d92514bbdeec86f4092472539e43f105e3a1ffea54e30d1a3
                        • Opcode Fuzzy Hash: 493e3fd462752430a3a02eaa956727a524725a47c154f57b85c2b8d969d51e1f
                        • Instruction Fuzzy Hash: 15117C71E41228BBDB108F999C44FEFBBBCEB45B50F108111F914E7290C2704A018BA1
                        APIs
                        • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 006E168C
                        • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 006E16A1
                        • FreeSid.ADVAPI32(?), ref: 006E16B1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: AllocateCheckFreeInitializeMembershipToken
                        • String ID:
                        • API String ID: 3429775523-0
                        • Opcode ID: ad833ba05d422cfb5ad1cd709215043d8dd38d57e2e8f31a070dc75b73f00225
                        • Instruction ID: ba1010ff92f4015aa8e28dcea0d770fac961b32a42b6b8d0d1e11b1e7ee9d831
                        • Opcode Fuzzy Hash: ad833ba05d422cfb5ad1cd709215043d8dd38d57e2e8f31a070dc75b73f00225
                        • Instruction Fuzzy Hash: 66F0F471990309FBDB00DFE49C89EEEBBBDEB08604F508565E601E2181E774AA449A54
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID: /
                        • API String ID: 0-2043925204
                        • Opcode ID: dd9f4222cb538a6e93bff620f040bb304a843984f80251a74441208ee563eebb
                        • Instruction ID: 1a2536ef72c3611952a8e7c53d21c9c442c25a5b1c6a4cab597508cd64eb954b
                        • Opcode Fuzzy Hash: dd9f4222cb538a6e93bff620f040bb304a843984f80251a74441208ee563eebb
                        • Instruction Fuzzy Hash: 964126B2500219ABCB209FB9CC48DEB77BAEB84324F50826DF905C7281E6719E818B54
                        APIs
                        • GetUserNameW.ADVAPI32(?,?), ref: 006DD28C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: NameUser
                        • String ID: X64
                        • API String ID: 2645101109-893830106
                        • Opcode ID: f2b734c1f4391b33fdb1dfcf7d22acf7a71550a2940f75cd56207936e0c6d95e
                        • Instruction ID: 910ea7803333517f933bf419b748608a0c7d89b70290a32b6d5594b0c45d8f9f
                        • Opcode Fuzzy Hash: f2b734c1f4391b33fdb1dfcf7d22acf7a71550a2940f75cd56207936e0c6d95e
                        • Instruction Fuzzy Hash: 14D0C9B480111DEACF94DB90DC88DD9B37CBB04345F104152F146A2140D73496498F10
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                        • Instruction ID: c6379d496d6635dcf8f1e7bcd5163602c529eaabf57df8207af445e07df355bc
                        • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                        • Instruction Fuzzy Hash: 3F020B71E002199FDF14DFA9C8806ADBBF2FF49324F254169D819AB380D731AD418F94
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID: Variable is not of type 'Object'.$p#u
                        • API String ID: 0-1908159134
                        • Opcode ID: 94f85143c2cf0c73a413b5df4de827ae10208bdb320d5ef67fc89ad578cfb196
                        • Instruction ID: 906aa40a179b11a002edaed4811203bd5d95f0a89c5911ca20ae11d3070c33d3
                        • Opcode Fuzzy Hash: 94f85143c2cf0c73a413b5df4de827ae10208bdb320d5ef67fc89ad578cfb196
                        • Instruction Fuzzy Hash: 7332AB70900208DBEF14EF90D885BEDB7B7BF05314F14825AE906AB382D775AE46CB60
                        APIs
                        • FindFirstFileW.KERNEL32(?,?), ref: 006F6918
                        • FindClose.KERNEL32(00000000), ref: 006F6961
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Find$CloseFileFirst
                        • String ID:
                        • API String ID: 2295610775-0
                        • Opcode ID: e4bc000aeaa5d570531a10804dac0d9a934ac3cac8410946f9ecf73bc17c7bd9
                        • Instruction ID: fa2591d43c9b9399c325fb9e5b0bddab86e0faf043a7890c8adfbc8ce572f016
                        • Opcode Fuzzy Hash: e4bc000aeaa5d570531a10804dac0d9a934ac3cac8410946f9ecf73bc17c7bd9
                        • Instruction Fuzzy Hash: F011AC316042019FD710DF69D484A26BBE2FF85328F14C699F5698B3A2CB70EC05CB91
                        APIs
                        • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00704891,?,?,00000035,?), ref: 006F37E4
                        • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00704891,?,?,00000035,?), ref: 006F37F4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ErrorFormatLastMessage
                        • String ID:
                        • API String ID: 3479602957-0
                        • Opcode ID: 056e23ce913db73df2b28faaa4034c7b63ad9ea66695b3d426cf42ae51849721
                        • Instruction ID: 1e880d9fb5a06d539438e50f313f8d6e1d2ed29126939b57cebe1339374f069e
                        • Opcode Fuzzy Hash: 056e23ce913db73df2b28faaa4034c7b63ad9ea66695b3d426cf42ae51849721
                        • Instruction Fuzzy Hash: 2DF0EC706043282AD75027A55C4DFFB36AFEFC5761F004169F505D23C1D5609944C7B4
                        APIs
                        • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 006EB25D
                        • keybd_event.USER32(?,75A8C0D0,?,00000000), ref: 006EB270
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: InputSendkeybd_event
                        • String ID:
                        • API String ID: 3536248340-0
                        • Opcode ID: 5e34dd84cb043ad80d57a9cd8840ff08f3a39b4ab026b3a08629cec7e72c265e
                        • Instruction ID: 24e944fa6ff02bfc061820ea39583468773e2dd9d2248acae30abda64ed0f92a
                        • Opcode Fuzzy Hash: 5e34dd84cb043ad80d57a9cd8840ff08f3a39b4ab026b3a08629cec7e72c265e
                        • Instruction Fuzzy Hash: CFF01D7184428DAFDB069FA5C805BFE7BB5FF04305F10D009FA55A5191C37986119F94
                        APIs
                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,006E11FC), ref: 006E10D4
                        • CloseHandle.KERNEL32(?,?,006E11FC), ref: 006E10E9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: AdjustCloseHandlePrivilegesToken
                        • String ID:
                        • API String ID: 81990902-0
                        • Opcode ID: 560515ce6d3cc36c7348831d823e155aaf739f70a8b1df430d88d7454694990b
                        • Instruction ID: 14ec9b65dfe8d402dd717f3341f1e446720fe0faa92b828eee8aa7d9209cf42f
                        • Opcode Fuzzy Hash: 560515ce6d3cc36c7348831d823e155aaf739f70a8b1df430d88d7454694990b
                        • Instruction Fuzzy Hash: 0DE04F32004610AFEB262B55FC05EB377AEEF04310B21C82DF4A5804B1DB626C90DB14
                        APIs
                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,006B6766,?,?,00000008,?,?,006BFEFE,00000000), ref: 006B6998
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ExceptionRaise
                        • String ID:
                        • API String ID: 3997070919-0
                        • Opcode ID: f10db6786813815253d657b0b16edd88259761d0de003e68f727217c403afb21
                        • Instruction ID: 5517cd16e5e8dd0eb7956a21b964cf5f5f133a35a7ac152e8387953be3a7dad9
                        • Opcode Fuzzy Hash: f10db6786813815253d657b0b16edd88259761d0de003e68f727217c403afb21
                        • Instruction Fuzzy Hash: 62B15DB16106099FDB15CF28C486BE57BE1FF05364F258658F89ACF2A2C739D982CB40
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID: 0-3916222277
                        • Opcode ID: 69f975fb44c80f86a78ae2e9011ae216a73fea078866c1daaa1961ccf5883159
                        • Instruction ID: e5553aafe0e307159fa7c7d588bd0a017dde12b8d05b8a26abe20d9f07eb20df
                        • Opcode Fuzzy Hash: 69f975fb44c80f86a78ae2e9011ae216a73fea078866c1daaa1961ccf5883159
                        • Instruction Fuzzy Hash: 02125D71D002299FCF14CF58D981AEEB7FAEF48710F14819AE849EB355DB349A81DB90
                        APIs
                        • BlockInput.USER32(00000001), ref: 006FEABD
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: BlockInput
                        • String ID:
                        • API String ID: 3456056419-0
                        • Opcode ID: ad8610ebe439ed3a0344c54dee699a8dda58d462854f9cc5c51d09208fb7799a
                        • Instruction ID: 17f509553fc1e24f9888b62124fdca35240a41f585d4f93ad1f0eadc68d16a61
                        • Opcode Fuzzy Hash: ad8610ebe439ed3a0344c54dee699a8dda58d462854f9cc5c51d09208fb7799a
                        • Instruction Fuzzy Hash: ECE01A312002089FD710EF59D804E9ABBEAAF98760F00841AFE49D73A1DA71A8418BA5
                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,006A03EE), ref: 006A09DA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: 056c1aa7f4f962bef27f49a1921a1bfbe35cf9f07a1cf8d14ddb94382b0cf06e
                        • Instruction ID: d21b8b5a7ecb0a357c99678092eeb74256e05d4ede43849815a62556df4d1544
                        • Opcode Fuzzy Hash: 056c1aa7f4f962bef27f49a1921a1bfbe35cf9f07a1cf8d14ddb94382b0cf06e
                        • Instruction Fuzzy Hash:
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0
                        • API String ID: 0-4108050209
                        • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                        • Instruction ID: 319de7535ea9b1b9d014e0e953b442b34c8249ac482c3687fe628954c8446f1c
                        • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                        • Instruction Fuzzy Hash: 3551686170C6056BDB38B5688C597FF63CB9B13300F18052AD886D7382CA19EE06DF5A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0&u
                        • API String ID: 0-949697045
                        • Opcode ID: 1c0313ef160919f1f009b2944e74b13f8f5a34acfef0753551b6d06e78c125d2
                        • Instruction ID: 6bb98dda8978f44b3ba1c159c32bfc917bd8fe01f8eb0fce7206f74b28f38306
                        • Opcode Fuzzy Hash: 1c0313ef160919f1f009b2944e74b13f8f5a34acfef0753551b6d06e78c125d2
                        • Instruction Fuzzy Hash: EC21EB322206158BDB28CF79C8236BE73E5E755310F14862EE4A7C37D1DE79A905CB84
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2fc1533333640bd2ea2e172486cb21171fc2d3a9dd747a407257e7acc841adbe
                        • Instruction ID: 79a7b04dbf93032ea7c751ab0e8cd26b9755d7d3222600363d68d4886982c6f2
                        • Opcode Fuzzy Hash: 2fc1533333640bd2ea2e172486cb21171fc2d3a9dd747a407257e7acc841adbe
                        • Instruction Fuzzy Hash: D1321462D29F414DD7339634CC22375628AAFB73C5F15D737E81AB5AA6EB29C4C35200
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b809758497dbeb0736ca6ae10075e2347b3c0f75f16f32697a1bee932aebba44
                        • Instruction ID: 1ded6a60b99dd2a064dd3b6013cd3dc9c022fc8b713b92bb4c033ef1f20ca3cb
                        • Opcode Fuzzy Hash: b809758497dbeb0736ca6ae10075e2347b3c0f75f16f32697a1bee932aebba44
                        • Instruction Fuzzy Hash: 6F32E031E4015E8BCF28CA69C490ABD7BA7EF45330F28856BD45ACB791D634DD82DB40
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e34d8553a0fb459be7d257ee62b0306bdf666dc283a3c633f4fb6abb25591576
                        • Instruction ID: 5de7c3265d1d1f56564d7327ab91e37e86a130df48e78380d9a1dd53a9eb8655
                        • Opcode Fuzzy Hash: e34d8553a0fb459be7d257ee62b0306bdf666dc283a3c633f4fb6abb25591576
                        • Instruction Fuzzy Hash: 63228DB0A0460A9FDF14DFA4C881AAEB7F7FF44300F24466DE816A7291EB35E951CB54
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 982d7afb7369f19971088d393071643ad23e7fbbf69b78f8295207ddc4c4ef01
                        • Instruction ID: 3826b1fc9b914ce1f58e33b1756d47ffb7aab72726c289dcc1cbc9cfb52236c3
                        • Opcode Fuzzy Hash: 982d7afb7369f19971088d393071643ad23e7fbbf69b78f8295207ddc4c4ef01
                        • Instruction Fuzzy Hash: A30281B0A0020AEBDF04DF54D981BBEB7B6FF54300F158169E8169B391EB35AE11CB95
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 97c225b3eadc577d0c34c80feb66eb3183fd95056f348ddbf1aa6e60ed558321
                        • Instruction ID: 36940bcb4ddec2e97c0963e82d0e8a7974387888ce6e3101b89659bc4f9addd9
                        • Opcode Fuzzy Hash: 97c225b3eadc577d0c34c80feb66eb3183fd95056f348ddbf1aa6e60ed558321
                        • Instruction Fuzzy Hash: 65B1F230D2AF414DD72396398831336B65CAFBB6D5F91D71BFC2674D22EB2A86834244
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                        • Instruction ID: 71a64946b584e7e72a2c85cf360ae887c0c9701ca98846ef5f090ad9537ef74f
                        • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                        • Instruction Fuzzy Hash: 149166725080A34ADB29663A85740BEFFE25E933B1B1A079DD4F2CE2C1FE149D55DE20
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                        • Instruction ID: bae00c3cac5ef08a28fa94b47dac8ce2c2595d898dbbd42796c3adee5d69e03d
                        • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                        • Instruction Fuzzy Hash: 7A9163726490E30EDB29523E843407EFEE35A933A171A079DD5F2CE2C5EE248D55DE20
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                        • Instruction ID: 3fe10c94844bdc7764861f5df8404da71c5cd90681d58ba7726b671c4ffcd3e4
                        • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                        • Instruction Fuzzy Hash: 939164722090A34ADB2D527A857407EFFE35A933A1B1A079DD4F2CE2C1FD249D55DE20
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 02f16b90319b67970fc51ec9101149d2604cda4cabff776eb801b186a4f3c388
                        • Instruction ID: f769737ce7db779017596d745a7bd1b3b8841470c609c0c6e27c6e2db6c17f63
                        • Opcode Fuzzy Hash: 02f16b90319b67970fc51ec9101149d2604cda4cabff776eb801b186a4f3c388
                        • Instruction Fuzzy Hash: A06169B12087096ADA74BE288D95BFF239BDF53700F14095DE943DB382D611AE428F79
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0a2651bcaa31dc81191a1a02c6ecf23d5d78077e01cd685ce81a51adf1d85b21
                        • Instruction ID: 5a19c0f5ce2885a6016e85153f1d1bc3d6b8bfd42835c0c2ef3516ec8a2135ee
                        • Opcode Fuzzy Hash: 0a2651bcaa31dc81191a1a02c6ecf23d5d78077e01cd685ce81a51adf1d85b21
                        • Instruction Fuzzy Hash: EA618A3160870956DE387A288C65BFF6387EF43700F14095DE943CB381EA12AD438F59
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                        • Instruction ID: 4df9e512d0764a99aa45866ec9cdfd8a0adb3ab1b293118a0f4cb9afa2868b8b
                        • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                        • Instruction Fuzzy Hash: C48166725090A30EDB6D523985344BEFFE35A933A1B1A079DD4F2CE2C1EE14DE55DA20
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8919cf2e94ecef277e0125293894a2238b9d8734c93b7cc3f5f00cdc084f2b9b
                        • Instruction ID: 1867b408c98bc5019cf303f4d2b3e2ab5dfa34fa8ac7edd60169aed855d4e91b
                        • Opcode Fuzzy Hash: 8919cf2e94ecef277e0125293894a2238b9d8734c93b7cc3f5f00cdc084f2b9b
                        • Instruction Fuzzy Hash: 9851916154FADDAFDB0A9F30CC56088FF74AE52A10708C7CFDC858A986C7709A0AC755
                        APIs
                        • DeleteObject.GDI32(00000000), ref: 00702B30
                        • DeleteObject.GDI32(00000000), ref: 00702B43
                        • DestroyWindow.USER32 ref: 00702B52
                        • GetDesktopWindow.USER32 ref: 00702B6D
                        • GetWindowRect.USER32(00000000), ref: 00702B74
                        • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00702CA3
                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00702CB1
                        • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00702CF8
                        • GetClientRect.USER32(00000000,?), ref: 00702D04
                        • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00702D40
                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00702D62
                        • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00702D75
                        • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00702D80
                        • GlobalLock.KERNEL32(00000000), ref: 00702D89
                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00702D98
                        • GlobalUnlock.KERNEL32(00000000), ref: 00702DA1
                        • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00702DA8
                        • GlobalFree.KERNEL32(00000000), ref: 00702DB3
                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00702DC5
                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,0071FC38,00000000), ref: 00702DDB
                        • GlobalFree.KERNEL32(00000000), ref: 00702DEB
                        • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00702E11
                        • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00702E30
                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00702E52
                        • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0070303F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                        • String ID: $AutoIt v3$DISPLAY$static
                        • API String ID: 2211948467-2373415609
                        • Opcode ID: 693a99060e7d631bf9e129646e03174dd802c475d7157a3a91e162cc836ac9dd
                        • Instruction ID: d700bb582f98ec297b7f17134c7c28424d9500ab8f59f789ef3feeae9b01cbdf
                        • Opcode Fuzzy Hash: 693a99060e7d631bf9e129646e03174dd802c475d7157a3a91e162cc836ac9dd
                        • Instruction Fuzzy Hash: 42028071500205EFDB15DFA8CC89EAE7BB9FB49711F008258F915AB2E1D778AD01CB64
                        APIs
                        • SetTextColor.GDI32(?,00000000), ref: 0071712F
                        • GetSysColorBrush.USER32(0000000F), ref: 00717160
                        • GetSysColor.USER32(0000000F), ref: 0071716C
                        • SetBkColor.GDI32(?,000000FF), ref: 00717186
                        • SelectObject.GDI32(?,?), ref: 00717195
                        • InflateRect.USER32(?,000000FF,000000FF), ref: 007171C0
                        • GetSysColor.USER32(00000010), ref: 007171C8
                        • CreateSolidBrush.GDI32(00000000), ref: 007171CF
                        • FrameRect.USER32(?,?,00000000), ref: 007171DE
                        • DeleteObject.GDI32(00000000), ref: 007171E5
                        • InflateRect.USER32(?,000000FE,000000FE), ref: 00717230
                        • FillRect.USER32(?,?,?), ref: 00717262
                        • GetWindowLongW.USER32(?,000000F0), ref: 00717284
                          • Part of subcall function 007173E8: GetSysColor.USER32(00000012), ref: 00717421
                          • Part of subcall function 007173E8: SetTextColor.GDI32(?,?), ref: 00717425
                          • Part of subcall function 007173E8: GetSysColorBrush.USER32(0000000F), ref: 0071743B
                          • Part of subcall function 007173E8: GetSysColor.USER32(0000000F), ref: 00717446
                          • Part of subcall function 007173E8: GetSysColor.USER32(00000011), ref: 00717463
                          • Part of subcall function 007173E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00717471
                          • Part of subcall function 007173E8: SelectObject.GDI32(?,00000000), ref: 00717482
                          • Part of subcall function 007173E8: SetBkColor.GDI32(?,00000000), ref: 0071748B
                          • Part of subcall function 007173E8: SelectObject.GDI32(?,?), ref: 00717498
                          • Part of subcall function 007173E8: InflateRect.USER32(?,000000FF,000000FF), ref: 007174B7
                          • Part of subcall function 007173E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 007174CE
                          • Part of subcall function 007173E8: GetWindowLongW.USER32(00000000,000000F0), ref: 007174DB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                        • String ID:
                        • API String ID: 4124339563-0
                        • Opcode ID: fa0472c9f798fe8edafa6b2c53cb2493ccaa9ffbc83662c1bc160c6647804fd8
                        • Instruction ID: 97059767a5f84548e1d3ca4a31c0fb4b6adaa56577735911a55050bc4bddcdf2
                        • Opcode Fuzzy Hash: fa0472c9f798fe8edafa6b2c53cb2493ccaa9ffbc83662c1bc160c6647804fd8
                        • Instruction Fuzzy Hash: 0BA1C372048301FFD7059FA8DC48A9B7BB9FB88320F208A19F962961E0D778E940DB55
                        APIs
                        • DestroyWindow.USER32(?,?), ref: 00698E14
                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 006D6AC5
                        • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 006D6AFE
                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 006D6F43
                          • Part of subcall function 00698F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00698BE8,?,00000000,?,?,?,?,00698BBA,00000000,?), ref: 00698FC5
                        • SendMessageW.USER32(?,00001053), ref: 006D6F7F
                        • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 006D6F96
                        • ImageList_Destroy.COMCTL32(00000000,?), ref: 006D6FAC
                        • ImageList_Destroy.COMCTL32(00000000,?), ref: 006D6FB7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                        • String ID: 0
                        • API String ID: 2760611726-4108050209
                        • Opcode ID: 47894fa9720124c7278c4a8b050d5afef0c663c1a12564bf12514cd641696eb2
                        • Instruction ID: 9b8946a622e81d63252cec71d4869dd993ec0e1b0f3c05016353ae422bfe2b9e
                        • Opcode Fuzzy Hash: 47894fa9720124c7278c4a8b050d5afef0c663c1a12564bf12514cd641696eb2
                        • Instruction Fuzzy Hash: 5E12AA30A04201DFDB25CF28C854BEAB7A7FB49301F54846AF4958B7A1CB76EC52CB95
                        APIs
                        • DestroyWindow.USER32(00000000), ref: 0070273E
                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0070286A
                        • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 007028A9
                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 007028B9
                        • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00702900
                        • GetClientRect.USER32(00000000,?), ref: 0070290C
                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00702955
                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00702964
                        • GetStockObject.GDI32(00000011), ref: 00702974
                        • SelectObject.GDI32(00000000,00000000), ref: 00702978
                        • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00702988
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00702991
                        • DeleteDC.GDI32(00000000), ref: 0070299A
                        • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 007029C6
                        • SendMessageW.USER32(00000030,00000000,00000001), ref: 007029DD
                        • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00702A1D
                        • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00702A31
                        • SendMessageW.USER32(00000404,00000001,00000000), ref: 00702A42
                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00702A77
                        • GetStockObject.GDI32(00000011), ref: 00702A82
                        • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00702A8D
                        • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00702A97
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                        • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                        • API String ID: 2910397461-517079104
                        • Opcode ID: d0e87ec5876af23a57047db59a231ee6e40d6db4193934da7fe2b0349af325ad
                        • Instruction ID: b35241f62702673df39f889cb6db79371675dab69fe9eb4d811047d5446a3cee
                        • Opcode Fuzzy Hash: d0e87ec5876af23a57047db59a231ee6e40d6db4193934da7fe2b0349af325ad
                        • Instruction Fuzzy Hash: 68B15FB1A40215AFEB14DFA8CC49FAE7BA9EB05711F108214FA15E72D1D778ED40CB68
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 006F4AED
                        • GetDriveTypeW.KERNEL32(?,0071CB68,?,\\.\,0071CC08), ref: 006F4BCA
                        • SetErrorMode.KERNEL32(00000000,0071CB68,?,\\.\,0071CC08), ref: 006F4D36
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ErrorMode$DriveType
                        • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                        • API String ID: 2907320926-4222207086
                        • Opcode ID: d395888698b3a919e1029782887522dc1802bc0fe484cc8a7826941e753bb2e8
                        • Instruction ID: 131e9f5384cd740ec611587189a76b13a0e2ac8115a5d1e1b7afaa9c9925595b
                        • Opcode Fuzzy Hash: d395888698b3a919e1029782887522dc1802bc0fe484cc8a7826941e753bb2e8
                        • Instruction Fuzzy Hash: 4461E5B074220DDBCF04DF24C9819BA77A3AF45710B249019F906ABB91DF39ED42DB66
                        APIs
                        • GetSysColor.USER32(00000012), ref: 00717421
                        • SetTextColor.GDI32(?,?), ref: 00717425
                        • GetSysColorBrush.USER32(0000000F), ref: 0071743B
                        • GetSysColor.USER32(0000000F), ref: 00717446
                        • CreateSolidBrush.GDI32(?), ref: 0071744B
                        • GetSysColor.USER32(00000011), ref: 00717463
                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00717471
                        • SelectObject.GDI32(?,00000000), ref: 00717482
                        • SetBkColor.GDI32(?,00000000), ref: 0071748B
                        • SelectObject.GDI32(?,?), ref: 00717498
                        • InflateRect.USER32(?,000000FF,000000FF), ref: 007174B7
                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 007174CE
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 007174DB
                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0071752A
                        • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00717554
                        • InflateRect.USER32(?,000000FD,000000FD), ref: 00717572
                        • DrawFocusRect.USER32(?,?), ref: 0071757D
                        • GetSysColor.USER32(00000011), ref: 0071758E
                        • SetTextColor.GDI32(?,00000000), ref: 00717596
                        • DrawTextW.USER32(?,007170F5,000000FF,?,00000000), ref: 007175A8
                        • SelectObject.GDI32(?,?), ref: 007175BF
                        • DeleteObject.GDI32(?), ref: 007175CA
                        • SelectObject.GDI32(?,?), ref: 007175D0
                        • DeleteObject.GDI32(?), ref: 007175D5
                        • SetTextColor.GDI32(?,?), ref: 007175DB
                        • SetBkColor.GDI32(?,?), ref: 007175E5
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                        • String ID:
                        • API String ID: 1996641542-0
                        • Opcode ID: 544c62b60f674d449736b64feace900796deadb2331bf8c35fe616c859def858
                        • Instruction ID: 1f4f26275498c1e74f10ad4b937a1e3719b82297e3a916dcc38842629cec90c7
                        • Opcode Fuzzy Hash: 544c62b60f674d449736b64feace900796deadb2331bf8c35fe616c859def858
                        • Instruction Fuzzy Hash: A5617D72940218BFDF059FA8DC49EEE7FB9EB08320F218115F911AB2E1D7789940DB94
                        APIs
                        • GetCursorPos.USER32(?), ref: 00711128
                        • GetDesktopWindow.USER32 ref: 0071113D
                        • GetWindowRect.USER32(00000000), ref: 00711144
                        • GetWindowLongW.USER32(?,000000F0), ref: 00711199
                        • DestroyWindow.USER32(?), ref: 007111B9
                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 007111ED
                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0071120B
                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0071121D
                        • SendMessageW.USER32(00000000,00000421,?,?), ref: 00711232
                        • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00711245
                        • IsWindowVisible.USER32(00000000), ref: 007112A1
                        • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 007112BC
                        • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 007112D0
                        • GetWindowRect.USER32(00000000,?), ref: 007112E8
                        • MonitorFromPoint.USER32(?,?,00000002), ref: 0071130E
                        • GetMonitorInfoW.USER32(00000000,?), ref: 00711328
                        • CopyRect.USER32(?,?), ref: 0071133F
                        • SendMessageW.USER32(00000000,00000412,00000000), ref: 007113AA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                        • String ID: ($0$tooltips_class32
                        • API String ID: 698492251-4156429822
                        • Opcode ID: 07d2a9e46fc901ec8bf249a8048957163f89487872a9e2415789171c2724bc7e
                        • Instruction ID: 32f3312c018ffc8f9025d073db5578b5e14d63215b4a656cea22fb83a1582578
                        • Opcode Fuzzy Hash: 07d2a9e46fc901ec8bf249a8048957163f89487872a9e2415789171c2724bc7e
                        • Instruction Fuzzy Hash: 6DB1AF71604340AFD750DF68C885BAABBE5FF88750F40891CFA999B2A1C735D844CB96
                        APIs
                        • CharUpperBuffW.USER32(?,?), ref: 007102E5
                        • _wcslen.LIBCMT ref: 0071031F
                        • _wcslen.LIBCMT ref: 00710389
                        • _wcslen.LIBCMT ref: 007103F1
                        • _wcslen.LIBCMT ref: 00710475
                        • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 007104C5
                        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00710504
                          • Part of subcall function 0069F9F2: _wcslen.LIBCMT ref: 0069F9FD
                          • Part of subcall function 006E223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 006E2258
                          • Part of subcall function 006E223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 006E228A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _wcslen$MessageSend$BuffCharUpper
                        • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                        • API String ID: 1103490817-719923060
                        • Opcode ID: d8331afb9ab3c66a918d6c90d84c3f5ea8db73b1d7cf7083f7e291f7ea5e06dd
                        • Instruction ID: 51e350d7941412a01448bb0465a6586961e642cca1703c5a6fd9bdd0991cb54f
                        • Opcode Fuzzy Hash: d8331afb9ab3c66a918d6c90d84c3f5ea8db73b1d7cf7083f7e291f7ea5e06dd
                        • Instruction Fuzzy Hash: BCE1D2312083418FC754EF28C49186AB7E6BFC8714B144A6CF8969B2E1DB78EDC5CB91
                        APIs
                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00698968
                        • GetSystemMetrics.USER32(00000007), ref: 00698970
                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0069899B
                        • GetSystemMetrics.USER32(00000008), ref: 006989A3
                        • GetSystemMetrics.USER32(00000004), ref: 006989C8
                        • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 006989E5
                        • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 006989F5
                        • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00698A28
                        • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00698A3C
                        • GetClientRect.USER32(00000000,000000FF), ref: 00698A5A
                        • GetStockObject.GDI32(00000011), ref: 00698A76
                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 00698A81
                          • Part of subcall function 0069912D: GetCursorPos.USER32(?), ref: 00699141
                          • Part of subcall function 0069912D: ScreenToClient.USER32(00000000,?), ref: 0069915E
                          • Part of subcall function 0069912D: GetAsyncKeyState.USER32(00000001), ref: 00699183
                          • Part of subcall function 0069912D: GetAsyncKeyState.USER32(00000002), ref: 0069919D
                        • SetTimer.USER32(00000000,00000000,00000028,006990FC), ref: 00698AA8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                        • String ID: AutoIt v3 GUI
                        • API String ID: 1458621304-248962490
                        • Opcode ID: 71032331969af86d81810c44729b7d48e27e4e9201750579bb22711d879f3a8c
                        • Instruction ID: 36e787a03934ebabeb495d26cc26a40c82d989a2d7caba89174854e8690450ca
                        • Opcode Fuzzy Hash: 71032331969af86d81810c44729b7d48e27e4e9201750579bb22711d879f3a8c
                        • Instruction Fuzzy Hash: 34B14C71A402099FDF14DFA8CC45BEE3BB6FB48315F11812AFA15AB290DB78A841CB55
                        APIs
                          • Part of subcall function 006E10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 006E1114
                          • Part of subcall function 006E10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,006E0B9B,?,?,?), ref: 006E1120
                          • Part of subcall function 006E10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,006E0B9B,?,?,?), ref: 006E112F
                          • Part of subcall function 006E10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,006E0B9B,?,?,?), ref: 006E1136
                          • Part of subcall function 006E10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 006E114D
                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 006E0DF5
                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 006E0E29
                        • GetLengthSid.ADVAPI32(?), ref: 006E0E40
                        • GetAce.ADVAPI32(?,00000000,?), ref: 006E0E7A
                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 006E0E96
                        • GetLengthSid.ADVAPI32(?), ref: 006E0EAD
                        • GetProcessHeap.KERNEL32(00000008,00000008), ref: 006E0EB5
                        • HeapAlloc.KERNEL32(00000000), ref: 006E0EBC
                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 006E0EDD
                        • CopySid.ADVAPI32(00000000), ref: 006E0EE4
                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 006E0F13
                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 006E0F35
                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 006E0F47
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 006E0F6E
                        • HeapFree.KERNEL32(00000000), ref: 006E0F75
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 006E0F7E
                        • HeapFree.KERNEL32(00000000), ref: 006E0F85
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 006E0F8E
                        • HeapFree.KERNEL32(00000000), ref: 006E0F95
                        • GetProcessHeap.KERNEL32(00000000,?), ref: 006E0FA1
                        • HeapFree.KERNEL32(00000000), ref: 006E0FA8
                          • Part of subcall function 006E1193: GetProcessHeap.KERNEL32(00000008,006E0BB1,?,00000000,?,006E0BB1,?), ref: 006E11A1
                          • Part of subcall function 006E1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,006E0BB1,?), ref: 006E11A8
                          • Part of subcall function 006E1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,006E0BB1,?), ref: 006E11B7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                        • String ID:
                        • API String ID: 4175595110-0
                        • Opcode ID: f098058f3a49036c35e8267ad4725c56b19633d7f9b3fac33724f0dba5fb259f
                        • Instruction ID: 77caf1a1c1496734aeeb0442717b76b7e86aec90b52478c0b20621441e8766d3
                        • Opcode Fuzzy Hash: f098058f3a49036c35e8267ad4725c56b19633d7f9b3fac33724f0dba5fb259f
                        • Instruction Fuzzy Hash: 7771AC7290134AABEF209FA5DC45BEEBBB9BF08300F048114F918A6290D7749E55CB60
                        APIs
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0070C4BD
                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,0071CC08,00000000,?,00000000,?,?), ref: 0070C544
                        • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0070C5A4
                        • _wcslen.LIBCMT ref: 0070C5F4
                        • _wcslen.LIBCMT ref: 0070C66F
                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0070C6B2
                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0070C7C1
                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0070C84D
                        • RegCloseKey.ADVAPI32(?), ref: 0070C881
                        • RegCloseKey.ADVAPI32(00000000), ref: 0070C88E
                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0070C960
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                        • API String ID: 9721498-966354055
                        • Opcode ID: f4500a8cf8b6486d0adb08330d28f63dbca3c87fcc570e9d91b3d054340e7842
                        • Instruction ID: 137e332650b452d70dc0b41025ba71b25f3de8291e20c21df2501994b8a5e1eb
                        • Opcode Fuzzy Hash: f4500a8cf8b6486d0adb08330d28f63dbca3c87fcc570e9d91b3d054340e7842
                        • Instruction Fuzzy Hash: B1127935204201DFD715EF14C881A2AB7E6FF88714F148A9CF95A9B3A2DB35EC41CB99
                        APIs
                        • CharUpperBuffW.USER32(?,?), ref: 007109C6
                        • _wcslen.LIBCMT ref: 00710A01
                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00710A54
                        • _wcslen.LIBCMT ref: 00710A8A
                        • _wcslen.LIBCMT ref: 00710B06
                        • _wcslen.LIBCMT ref: 00710B81
                          • Part of subcall function 0069F9F2: _wcslen.LIBCMT ref: 0069F9FD
                          • Part of subcall function 006E2BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 006E2BFA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _wcslen$MessageSend$BuffCharUpper
                        • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                        • API String ID: 1103490817-4258414348
                        • Opcode ID: 60427419f43ef3990ec631ccc6ff57ae8faec160f26c9028fd36cc9b402ee90b
                        • Instruction ID: f30e8d1dc077268841882c15ac424bbd3d6a4e27a922e8a3b5ae7718bcc0cd47
                        • Opcode Fuzzy Hash: 60427419f43ef3990ec631ccc6ff57ae8faec160f26c9028fd36cc9b402ee90b
                        • Instruction Fuzzy Hash: 78E1BE712083418FC754EF28C4509AAB7E2FF98314B14895CF8969B7A2DB74ED85CBD1
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _wcslen$BuffCharUpper
                        • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                        • API String ID: 1256254125-909552448
                        • Opcode ID: f5505c923eb68619e61b57e2aaebc1ed279743e8070613e75ab0bfc2fcf022af
                        • Instruction ID: 790f1fbf10657ec015640b3b8823480aa179e4666b12d8064a241ba8f9d73fe3
                        • Opcode Fuzzy Hash: f5505c923eb68619e61b57e2aaebc1ed279743e8070613e75ab0bfc2fcf022af
                        • Instruction Fuzzy Hash: DE71D0B260016ACBCB22DF68CD415BB33D6ABA1754B654728FC56A72C4EB3CCD44C3A0
                        APIs
                        • _wcslen.LIBCMT ref: 0071835A
                        • _wcslen.LIBCMT ref: 0071836E
                        • _wcslen.LIBCMT ref: 00718391
                        • _wcslen.LIBCMT ref: 007183B4
                        • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 007183F2
                        • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00715BF2), ref: 0071844E
                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00718487
                        • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 007184CA
                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00718501
                        • FreeLibrary.KERNEL32(?), ref: 0071850D
                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0071851D
                        • DestroyIcon.USER32(?,?,?,?,?,00715BF2), ref: 0071852C
                        • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00718549
                        • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00718555
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                        • String ID: .dll$.exe$.icl
                        • API String ID: 799131459-1154884017
                        • Opcode ID: f5a55aed07cd07849ea7ddab29d3383399405c1c6cac6bb54298466eea5da821
                        • Instruction ID: 3a875abc6d3e8f10ce8b9099b70bad7a8a4c06cda446fb67f7cf79efb2a40b88
                        • Opcode Fuzzy Hash: f5a55aed07cd07849ea7ddab29d3383399405c1c6cac6bb54298466eea5da821
                        • Instruction Fuzzy Hash: BD61EF71540215BAEB54DF68CC41BFE77A9FB04B20F108609F915D60D1DFB8AD90CBA4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                        • API String ID: 0-1645009161
                        • Opcode ID: 18213aba5be2cfcf3af92552b1b4b2bcabff4b5157576bc02f58f9e2ec31e772
                        • Instruction ID: 72fe6cdfb7c1bb2ff08b7c245d702dadaf0ebd7bed0144ca0c15a8af9f451475
                        • Opcode Fuzzy Hash: 18213aba5be2cfcf3af92552b1b4b2bcabff4b5157576bc02f58f9e2ec31e772
                        • Instruction Fuzzy Hash: ED81E2B1644605BBDB20BF64CC42FFE77AAEF15300F144128F805AB296EB74DA91C7A5
                        APIs
                        • CharLowerBuffW.USER32(?,?), ref: 006F3EF8
                        • _wcslen.LIBCMT ref: 006F3F03
                        • _wcslen.LIBCMT ref: 006F3F5A
                        • _wcslen.LIBCMT ref: 006F3F98
                        • GetDriveTypeW.KERNEL32(?), ref: 006F3FD6
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 006F401E
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 006F4059
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 006F4087
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: SendString_wcslen$BuffCharDriveLowerType
                        • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                        • API String ID: 1839972693-4113822522
                        • Opcode ID: 1a9980ccae5e2e6e6fb9b630e03a60ba11235f9f350999b5b8e0eff31eb405a8
                        • Instruction ID: f3fc4c91f8336afee4e066d48d952be1e750fe2650158764acf67a17a5fb3470
                        • Opcode Fuzzy Hash: 1a9980ccae5e2e6e6fb9b630e03a60ba11235f9f350999b5b8e0eff31eb405a8
                        • Instruction Fuzzy Hash: FE71BC716042169FC310EF24C8808BAB7E6EF95758F104A2DFA9597351EB30EE45CB92
                        APIs
                        • LoadIconW.USER32(00000063), ref: 006E5A2E
                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 006E5A40
                        • SetWindowTextW.USER32(?,?), ref: 006E5A57
                        • GetDlgItem.USER32(?,000003EA), ref: 006E5A6C
                        • SetWindowTextW.USER32(00000000,?), ref: 006E5A72
                        • GetDlgItem.USER32(?,000003E9), ref: 006E5A82
                        • SetWindowTextW.USER32(00000000,?), ref: 006E5A88
                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 006E5AA9
                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 006E5AC3
                        • GetWindowRect.USER32(?,?), ref: 006E5ACC
                        • _wcslen.LIBCMT ref: 006E5B33
                        • SetWindowTextW.USER32(?,?), ref: 006E5B6F
                        • GetDesktopWindow.USER32 ref: 006E5B75
                        • GetWindowRect.USER32(00000000), ref: 006E5B7C
                        • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 006E5BD3
                        • GetClientRect.USER32(?,?), ref: 006E5BE0
                        • PostMessageW.USER32(?,00000005,00000000,?), ref: 006E5C05
                        • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 006E5C2F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                        • String ID:
                        • API String ID: 895679908-0
                        • Opcode ID: c55d76bfb32eff34e1bb51b1b19d85f1c97964eedfb636af5516d65f75a2a076
                        • Instruction ID: aab34ffe29cd7a3874d4571f885b07490a64d4fdf5198fd8f254ac7451ac5160
                        • Opcode Fuzzy Hash: c55d76bfb32eff34e1bb51b1b19d85f1c97964eedfb636af5516d65f75a2a076
                        • Instruction Fuzzy Hash: E4718031900B45AFDB21DFA9CE95AAEBBF6FF48708F108518E143A36A0D774E944CB54
                        APIs
                        • LoadCursorW.USER32(00000000,00007F89), ref: 006FFE27
                        • LoadCursorW.USER32(00000000,00007F8A), ref: 006FFE32
                        • LoadCursorW.USER32(00000000,00007F00), ref: 006FFE3D
                        • LoadCursorW.USER32(00000000,00007F03), ref: 006FFE48
                        • LoadCursorW.USER32(00000000,00007F8B), ref: 006FFE53
                        • LoadCursorW.USER32(00000000,00007F01), ref: 006FFE5E
                        • LoadCursorW.USER32(00000000,00007F81), ref: 006FFE69
                        • LoadCursorW.USER32(00000000,00007F88), ref: 006FFE74
                        • LoadCursorW.USER32(00000000,00007F80), ref: 006FFE7F
                        • LoadCursorW.USER32(00000000,00007F86), ref: 006FFE8A
                        • LoadCursorW.USER32(00000000,00007F83), ref: 006FFE95
                        • LoadCursorW.USER32(00000000,00007F85), ref: 006FFEA0
                        • LoadCursorW.USER32(00000000,00007F82), ref: 006FFEAB
                        • LoadCursorW.USER32(00000000,00007F84), ref: 006FFEB6
                        • LoadCursorW.USER32(00000000,00007F04), ref: 006FFEC1
                        • LoadCursorW.USER32(00000000,00007F02), ref: 006FFECC
                        • GetCursorInfo.USER32(?), ref: 006FFEDC
                        • GetLastError.KERNEL32 ref: 006FFF1E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Cursor$Load$ErrorInfoLast
                        • String ID:
                        • API String ID: 3215588206-0
                        • Opcode ID: 4874af3380fc81a84bec6f027fdd1bd5e2f994cb1cbb08387fd4411a12ce7b75
                        • Instruction ID: 4cf09c0b3199aaee28c39bce7499f11f7f1e5676b254fde71297ebbf531cb832
                        • Opcode Fuzzy Hash: 4874af3380fc81a84bec6f027fdd1bd5e2f994cb1cbb08387fd4411a12ce7b75
                        • Instruction Fuzzy Hash: 4D4165B0D453196ADB10DFBA8C8586EBFE9FF04354B50852AF11DE7281DB789901CF91
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _wcslen
                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[t
                        • API String ID: 176396367-3075924571
                        • Opcode ID: 4593612f5c0c59734f1186023e73ac3027725f1944d9de265936edda3a64dfb5
                        • Instruction ID: 669684f992e5dc00cd616f59920e4a3d928337bb4612689e241507b80c9cc955
                        • Opcode Fuzzy Hash: 4593612f5c0c59734f1186023e73ac3027725f1944d9de265936edda3a64dfb5
                        • Instruction Fuzzy Hash: 0AE1D631A01766EBCB149FA5C449AEEB7B6BF44710F64812DE456E7380DB309F45CB90
                        APIs
                        • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 006A00C6
                          • Part of subcall function 006A00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0075070C,00000FA0,C8C83E87,?,?,?,?,006C23B3,000000FF), ref: 006A011C
                          • Part of subcall function 006A00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,006C23B3,000000FF), ref: 006A0127
                          • Part of subcall function 006A00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,006C23B3,000000FF), ref: 006A0138
                          • Part of subcall function 006A00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 006A014E
                          • Part of subcall function 006A00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 006A015C
                          • Part of subcall function 006A00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 006A016A
                          • Part of subcall function 006A00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 006A0195
                          • Part of subcall function 006A00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 006A01A0
                        • ___scrt_fastfail.LIBCMT ref: 006A00E7
                          • Part of subcall function 006A00A3: __onexit.LIBCMT ref: 006A00A9
                        Strings
                        • WakeAllConditionVariable, xrefs: 006A0162
                        • api-ms-win-core-synch-l1-2-0.dll, xrefs: 006A0122
                        • kernel32.dll, xrefs: 006A0133
                        • SleepConditionVariableCS, xrefs: 006A0154
                        • InitializeConditionVariable, xrefs: 006A0148
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                        • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                        • API String ID: 66158676-1714406822
                        • Opcode ID: 8a5079e24441ba78f5261c72e5249e47e15d12d1349769e5cc6131f5ff082492
                        • Instruction ID: b743c6217b015598bda7995d9795fa9af3e8a433fd5f6dcd04b1a9cd74782642
                        • Opcode Fuzzy Hash: 8a5079e24441ba78f5261c72e5249e47e15d12d1349769e5cc6131f5ff082492
                        • Instruction Fuzzy Hash: C921D7727847157BFB116BF8AC16BE933A6EB06F51F118529F801D22D1DBA89C008E98
                        APIs
                        • CharLowerBuffW.USER32(00000000,00000000,0071CC08), ref: 006F4527
                        • _wcslen.LIBCMT ref: 006F453B
                        • _wcslen.LIBCMT ref: 006F4599
                        • _wcslen.LIBCMT ref: 006F45F4
                        • _wcslen.LIBCMT ref: 006F463F
                        • _wcslen.LIBCMT ref: 006F46A7
                          • Part of subcall function 0069F9F2: _wcslen.LIBCMT ref: 0069F9FD
                        • GetDriveTypeW.KERNEL32(?,00746BF0,00000061), ref: 006F4743
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _wcslen$BuffCharDriveLowerType
                        • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                        • API String ID: 2055661098-1000479233
                        • Opcode ID: 4a867f0313f1b86d96c6e2d88714203b2341ffef8e6b6501274c58d92f08d8ae
                        • Instruction ID: bdc0cb96db72ec51144bd73a74c81357c277a540061a41603a0db6cbfdaa6719
                        • Opcode Fuzzy Hash: 4a867f0313f1b86d96c6e2d88714203b2341ffef8e6b6501274c58d92f08d8ae
                        • Instruction Fuzzy Hash: B0B103716083029FC710EF28C890ABBB7E6AF96760F504A1DF696C7791DB30D945CB52
                        APIs
                          • Part of subcall function 00699BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00699BB2
                        • DragQueryPoint.SHELL32(?,?), ref: 00719147
                          • Part of subcall function 00717674: ClientToScreen.USER32(?,?), ref: 0071769A
                          • Part of subcall function 00717674: GetWindowRect.USER32(?,?), ref: 00717710
                          • Part of subcall function 00717674: PtInRect.USER32(?,?,00718B89), ref: 00717720
                        • SendMessageW.USER32(?,000000B0,?,?), ref: 007191B0
                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 007191BB
                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 007191DE
                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00719225
                        • SendMessageW.USER32(?,000000B0,?,?), ref: 0071923E
                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00719255
                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00719277
                        • DragFinish.SHELL32(?), ref: 0071927E
                        • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00719371
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$p#u
                        • API String ID: 221274066-1344711150
                        • Opcode ID: 6b5877f415efda61c3c5adb78294a92ff23608c3eebe34376dd2b218eede23eb
                        • Instruction ID: 265857c5698d8855a6b89df7c5f697cd1ba71ba94ae3f9db373ab855520355da
                        • Opcode Fuzzy Hash: 6b5877f415efda61c3c5adb78294a92ff23608c3eebe34376dd2b218eede23eb
                        • Instruction Fuzzy Hash: CF61BE71108300AFD701EFA4DC85DAFBBF9EF88750F004A2DF591921A0DB749A49CB66
                        APIs
                        • GetMenuItemCount.USER32(00751990), ref: 006C2F8D
                        • GetMenuItemCount.USER32(00751990), ref: 006C303D
                        • GetCursorPos.USER32(?), ref: 006C3081
                        • SetForegroundWindow.USER32(00000000), ref: 006C308A
                        • TrackPopupMenuEx.USER32(00751990,00000000,?,00000000,00000000,00000000), ref: 006C309D
                        • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 006C30A9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                        • String ID: 0
                        • API String ID: 36266755-4108050209
                        • Opcode ID: bd89e168159e4cc0c2f43fc6014ed9a69a19820732db169a9dbb986fdf5a9cdb
                        • Instruction ID: 2b22a935e90d0a633d46fefaae122527fdad303b380f0e30f4b1dc8799383a1e
                        • Opcode Fuzzy Hash: bd89e168159e4cc0c2f43fc6014ed9a69a19820732db169a9dbb986fdf5a9cdb
                        • Instruction Fuzzy Hash: A6711D71644216BEEB219F68CC59FEABF66FF05724F204219F9246A3D0C7B19D10C754
                        APIs
                        • DestroyWindow.USER32(00000000,?), ref: 00716DEB
                          • Part of subcall function 00686B57: _wcslen.LIBCMT ref: 00686B6A
                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00716E5F
                        • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00716E81
                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00716E94
                        • DestroyWindow.USER32(?), ref: 00716EB5
                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00680000,00000000), ref: 00716EE4
                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00716EFD
                        • GetDesktopWindow.USER32 ref: 00716F16
                        • GetWindowRect.USER32(00000000), ref: 00716F1D
                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00716F35
                        • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00716F4D
                          • Part of subcall function 00699944: GetWindowLongW.USER32(?,000000EB), ref: 00699952
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                        • String ID: 0$tooltips_class32
                        • API String ID: 2429346358-3619404913
                        • Opcode ID: 9b7fcefec5ce3a56c598735e956c11a02f1d01386397191addb4ad35d71754e8
                        • Instruction ID: 3ab5f3a4bbbec7963892a7410bcf1f59145c4fe193d8ee6f759fea94069fcf3c
                        • Opcode Fuzzy Hash: 9b7fcefec5ce3a56c598735e956c11a02f1d01386397191addb4ad35d71754e8
                        • Instruction Fuzzy Hash: 06717870244340AFDB21CF1CD844BAABBF9FB88304F44855DF999872A0C778E94ACB15
                        APIs
                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 006FC4B0
                        • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 006FC4C3
                        • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 006FC4D7
                        • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 006FC4F0
                        • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 006FC533
                        • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 006FC549
                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 006FC554
                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 006FC584
                        • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 006FC5DC
                        • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 006FC5F0
                        • InternetCloseHandle.WININET(00000000), ref: 006FC5FB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                        • String ID:
                        • API String ID: 3800310941-3916222277
                        • Opcode ID: a8deb4798fe5888f3409a2e49eb2ea33819972a8b1c61ed001056493deb4fd22
                        • Instruction ID: 0222e787b0993d5f52a6a6ac80906516272d248426d46e851fcb0b603a64ce56
                        • Opcode Fuzzy Hash: a8deb4798fe5888f3409a2e49eb2ea33819972a8b1c61ed001056493deb4fd22
                        • Instruction Fuzzy Hash: DA515BB154020CBFDB228FA4CA48AFA7BFDFF08764F048419FA4596250DB74E9149B64
                        APIs
                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00718592
                        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 007185A2
                        • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 007185AD
                        • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 007185BA
                        • GlobalLock.KERNEL32(00000000), ref: 007185C8
                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 007185D7
                        • GlobalUnlock.KERNEL32(00000000), ref: 007185E0
                        • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 007185E7
                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 007185F8
                        • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,0071FC38,?), ref: 00718611
                        • GlobalFree.KERNEL32(00000000), ref: 00718621
                        • GetObjectW.GDI32(?,00000018,?), ref: 00718641
                        • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00718671
                        • DeleteObject.GDI32(?), ref: 00718699
                        • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 007186AF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                        • String ID:
                        • API String ID: 3840717409-0
                        • Opcode ID: d106a4906cccecd37dc4f9ed03503bd12737bbecb427a7ec16080a775ab77647
                        • Instruction ID: 43bbf1a1ebf3b71b1bfaae2cfd0ebb452a38858976c6a1e4c5a2d7ba93cfc94c
                        • Opcode Fuzzy Hash: d106a4906cccecd37dc4f9ed03503bd12737bbecb427a7ec16080a775ab77647
                        • Instruction Fuzzy Hash: DA412B75640208BFDB129FA9CC48EEA7BBDFF89711F108058F905E72A0DB389941DB65
                        APIs
                        • VariantInit.OLEAUT32(00000000), ref: 006F1502
                        • VariantCopy.OLEAUT32(?,?), ref: 006F150B
                        • VariantClear.OLEAUT32(?), ref: 006F1517
                        • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 006F15FB
                        • VarR8FromDec.OLEAUT32(?,?), ref: 006F1657
                        • VariantInit.OLEAUT32(?), ref: 006F1708
                        • SysFreeString.OLEAUT32(?), ref: 006F178C
                        • VariantClear.OLEAUT32(?), ref: 006F17D8
                        • VariantClear.OLEAUT32(?), ref: 006F17E7
                        • VariantInit.OLEAUT32(00000000), ref: 006F1823
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                        • String ID: %4d%02d%02d%02d%02d%02d$Default
                        • API String ID: 1234038744-3931177956
                        • Opcode ID: 3dcca60cb1a9b3e28c05f60577b5b3f94b93e2210a794c74f6714df69e908c8f
                        • Instruction ID: 1cd34c401724fbfba47f4a3ab316147b59b103f6923c473b65907c6c424ff6fd
                        • Opcode Fuzzy Hash: 3dcca60cb1a9b3e28c05f60577b5b3f94b93e2210a794c74f6714df69e908c8f
                        • Instruction Fuzzy Hash: 65D115B1A00119DBDF04AFA4D445BB9B7B7BF46740F10815AEA06AF680DB34DC46DBA1
                        APIs
                          • Part of subcall function 00689CB3: _wcslen.LIBCMT ref: 00689CBD
                          • Part of subcall function 0070C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0070B6AE,?,?), ref: 0070C9B5
                          • Part of subcall function 0070C998: _wcslen.LIBCMT ref: 0070C9F1
                          • Part of subcall function 0070C998: _wcslen.LIBCMT ref: 0070CA68
                          • Part of subcall function 0070C998: _wcslen.LIBCMT ref: 0070CA9E
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0070B6F4
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0070B772
                        • RegDeleteValueW.ADVAPI32(?,?), ref: 0070B80A
                        • RegCloseKey.ADVAPI32(?), ref: 0070B87E
                        • RegCloseKey.ADVAPI32(?), ref: 0070B89C
                        • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0070B8F2
                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0070B904
                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 0070B922
                        • FreeLibrary.KERNEL32(00000000), ref: 0070B983
                        • RegCloseKey.ADVAPI32(00000000), ref: 0070B994
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                        • String ID: RegDeleteKeyExW$advapi32.dll
                        • API String ID: 146587525-4033151799
                        • Opcode ID: 748382b85ef6e82984ced9947255934e634355d1a52c09d88afb4bd35a4c57f4
                        • Instruction ID: c63f17c624169e362c25981cb1416c8dbc8369afac9df018bfe0fd7d5a39c569
                        • Opcode Fuzzy Hash: 748382b85ef6e82984ced9947255934e634355d1a52c09d88afb4bd35a4c57f4
                        • Instruction Fuzzy Hash: 0EC15B70208201EFD714DF54C495F2ABBE5BF84318F14869CE59A8B2E2CB79E945CB91
                        APIs
                        • GetDC.USER32(00000000), ref: 007025D8
                        • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 007025E8
                        • CreateCompatibleDC.GDI32(?), ref: 007025F4
                        • SelectObject.GDI32(00000000,?), ref: 00702601
                        • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 0070266D
                        • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 007026AC
                        • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 007026D0
                        • SelectObject.GDI32(?,?), ref: 007026D8
                        • DeleteObject.GDI32(?), ref: 007026E1
                        • DeleteDC.GDI32(?), ref: 007026E8
                        • ReleaseDC.USER32(00000000,?), ref: 007026F3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                        • String ID: (
                        • API String ID: 2598888154-3887548279
                        • Opcode ID: 50f3724a2b854e8af2ab21ec3fc6fe22ad1b93c6cdc78809f2360a2f48288229
                        • Instruction ID: 9d288fd9ed4ce336957f29e9848492186ec3078ce23d5a0952b78f946cf7e745
                        • Opcode Fuzzy Hash: 50f3724a2b854e8af2ab21ec3fc6fe22ad1b93c6cdc78809f2360a2f48288229
                        • Instruction Fuzzy Hash: 9061F3B6D00219EFCF05CFE8C888AAEBBF6FF48310F208519E555A7250D775A9418F54
                        APIs
                        • ___free_lconv_mon.LIBCMT ref: 006BDAA1
                          • Part of subcall function 006BD63C: _free.LIBCMT ref: 006BD659
                          • Part of subcall function 006BD63C: _free.LIBCMT ref: 006BD66B
                          • Part of subcall function 006BD63C: _free.LIBCMT ref: 006BD67D
                          • Part of subcall function 006BD63C: _free.LIBCMT ref: 006BD68F
                          • Part of subcall function 006BD63C: _free.LIBCMT ref: 006BD6A1
                          • Part of subcall function 006BD63C: _free.LIBCMT ref: 006BD6B3
                          • Part of subcall function 006BD63C: _free.LIBCMT ref: 006BD6C5
                          • Part of subcall function 006BD63C: _free.LIBCMT ref: 006BD6D7
                          • Part of subcall function 006BD63C: _free.LIBCMT ref: 006BD6E9
                          • Part of subcall function 006BD63C: _free.LIBCMT ref: 006BD6FB
                          • Part of subcall function 006BD63C: _free.LIBCMT ref: 006BD70D
                          • Part of subcall function 006BD63C: _free.LIBCMT ref: 006BD71F
                          • Part of subcall function 006BD63C: _free.LIBCMT ref: 006BD731
                        • _free.LIBCMT ref: 006BDA96
                          • Part of subcall function 006B29C8: HeapFree.KERNEL32(00000000,00000000,?,006BD7D1,00000000,00000000,00000000,00000000,?,006BD7F8,00000000,00000007,00000000,?,006BDBF5,00000000), ref: 006B29DE
                          • Part of subcall function 006B29C8: GetLastError.KERNEL32(00000000,?,006BD7D1,00000000,00000000,00000000,00000000,?,006BD7F8,00000000,00000007,00000000,?,006BDBF5,00000000,00000000), ref: 006B29F0
                        • _free.LIBCMT ref: 006BDAB8
                        • _free.LIBCMT ref: 006BDACD
                        • _free.LIBCMT ref: 006BDAD8
                        • _free.LIBCMT ref: 006BDAFA
                        • _free.LIBCMT ref: 006BDB0D
                        • _free.LIBCMT ref: 006BDB1B
                        • _free.LIBCMT ref: 006BDB26
                        • _free.LIBCMT ref: 006BDB5E
                        • _free.LIBCMT ref: 006BDB65
                        • _free.LIBCMT ref: 006BDB82
                        • _free.LIBCMT ref: 006BDB9A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                        • String ID:
                        • API String ID: 161543041-0
                        • Opcode ID: 189e98e5426166aed59da98646c834dc9f3b740f2953abe78365b33da4452412
                        • Instruction ID: b4d081c51ab237daedf61d46a3666d10a77538c509db81790a9569d4ec90dd81
                        • Opcode Fuzzy Hash: 189e98e5426166aed59da98646c834dc9f3b740f2953abe78365b33da4452412
                        • Instruction Fuzzy Hash: C9314FF1644306AFDB61AA39D845BDAB7EAFF00710F15482DE449DB291EF31ACC08728
                        APIs
                        • GetClassNameW.USER32(?,?,00000100), ref: 006E369C
                        • _wcslen.LIBCMT ref: 006E36A7
                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 006E3797
                        • GetClassNameW.USER32(?,?,00000400), ref: 006E380C
                        • GetDlgCtrlID.USER32(?), ref: 006E385D
                        • GetWindowRect.USER32(?,?), ref: 006E3882
                        • GetParent.USER32(?), ref: 006E38A0
                        • ScreenToClient.USER32(00000000), ref: 006E38A7
                        • GetClassNameW.USER32(?,?,00000100), ref: 006E3921
                        • GetWindowTextW.USER32(?,?,00000400), ref: 006E395D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                        • String ID: %s%u
                        • API String ID: 4010501982-679674701
                        • Opcode ID: 05bb31bdd2e17f5dfcdc307c84c3be04e03306717f09ababcf44a9a967e52a41
                        • Instruction ID: 4d8e222a0730aea79d4ffee40b4f94c2ebdd69b4d5e859803849e042499a44c4
                        • Opcode Fuzzy Hash: 05bb31bdd2e17f5dfcdc307c84c3be04e03306717f09ababcf44a9a967e52a41
                        • Instruction Fuzzy Hash: A091D471201756AFD709DF65C889BEAF7AAFF44310F008519F999C3291EB30EA45CB91
                        APIs
                        • GetClassNameW.USER32(?,?,00000400), ref: 006E4994
                        • GetWindowTextW.USER32(?,?,00000400), ref: 006E49DA
                        • _wcslen.LIBCMT ref: 006E49EB
                        • CharUpperBuffW.USER32(?,00000000), ref: 006E49F7
                        • _wcsstr.LIBVCRUNTIME ref: 006E4A2C
                        • GetClassNameW.USER32(00000018,?,00000400), ref: 006E4A64
                        • GetWindowTextW.USER32(?,?,00000400), ref: 006E4A9D
                        • GetClassNameW.USER32(00000018,?,00000400), ref: 006E4AE6
                        • GetClassNameW.USER32(?,?,00000400), ref: 006E4B20
                        • GetWindowRect.USER32(?,?), ref: 006E4B8B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                        • String ID: ThumbnailClass
                        • API String ID: 1311036022-1241985126
                        • Opcode ID: 153672bffc0320363cfdbf35bb333b019efb7a52282de80061998bb8cf951206
                        • Instruction ID: 73d755e57a93b9f0ea79028339dbbb55d3a7e76724c498c9b0ead6b2f8b0e104
                        • Opcode Fuzzy Hash: 153672bffc0320363cfdbf35bb333b019efb7a52282de80061998bb8cf951206
                        • Instruction Fuzzy Hash: 8D91ED310063459FDB04DF26C985BAA77EAFF84310F048469FD859A296EF34ED45CBA1
                        APIs
                          • Part of subcall function 00699BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00699BB2
                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00718D5A
                        • GetFocus.USER32 ref: 00718D6A
                        • GetDlgCtrlID.USER32(00000000), ref: 00718D75
                        • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00718E1D
                        • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00718ECF
                        • GetMenuItemCount.USER32(?), ref: 00718EEC
                        • GetMenuItemID.USER32(?,00000000), ref: 00718EFC
                        • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00718F2E
                        • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00718F70
                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00718FA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                        • String ID: 0
                        • API String ID: 1026556194-4108050209
                        • Opcode ID: 4c2081d2a8e084ce3e1fdf4c750f2db5e5792d31810f3ce6fba758bac3e28396
                        • Instruction ID: f35266abc7e3f71d30c86178cb2b657ac8b8bb8ce5c3a6744e9729df139c2bce
                        • Opcode Fuzzy Hash: 4c2081d2a8e084ce3e1fdf4c750f2db5e5792d31810f3ce6fba758bac3e28396
                        • Instruction Fuzzy Hash: 5581E071604301AFDB50CF28D884AEB7BEAFB88310F14491DF994972D1DB78D985CBA2
                        APIs
                        • GetFileVersionInfoSizeW.VERSION(?,?), ref: 006EDC20
                        • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 006EDC46
                        • _wcslen.LIBCMT ref: 006EDC50
                        • _wcsstr.LIBVCRUNTIME ref: 006EDCA0
                        • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 006EDCBC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                        • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                        • API String ID: 1939486746-1459072770
                        • Opcode ID: 03a74eb46a412dc22628e196fe1e2c92f1ab1b35d5e08f1b6036f7fca5cc2207
                        • Instruction ID: 87aab27d450ce9b7225de5ea6ef5b6a9628a3a389f3e6bd99d8196529f4299df
                        • Opcode Fuzzy Hash: 03a74eb46a412dc22628e196fe1e2c92f1ab1b35d5e08f1b6036f7fca5cc2207
                        • Instruction Fuzzy Hash: 2441F0B2A403007ADB51B7759C07EFF77AEEF42750F20406DF900E6182EB759A018BA9
                        APIs
                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0070CC64
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 0070CC8D
                        • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0070CD48
                          • Part of subcall function 0070CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 0070CCAA
                          • Part of subcall function 0070CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 0070CCBD
                          • Part of subcall function 0070CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0070CCCF
                          • Part of subcall function 0070CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0070CD05
                          • Part of subcall function 0070CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0070CD28
                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 0070CCF3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                        • String ID: RegDeleteKeyExW$advapi32.dll
                        • API String ID: 2734957052-4033151799
                        • Opcode ID: 113dd7ad9e33faf09b13d81f2d75a1b39db7ee72f5f9b176d8cf1021e38b1d66
                        • Instruction ID: 6bad8da5343377c0bca3a4272b995d345faf5fecc19f38b753489981b67a9d59
                        • Opcode Fuzzy Hash: 113dd7ad9e33faf09b13d81f2d75a1b39db7ee72f5f9b176d8cf1021e38b1d66
                        • Instruction Fuzzy Hash: 793182B1A41118FBD7228B94DC88EFFBBBCEF05740F008265E905E6180D7789E45EAB0
                        APIs
                        • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 006F3D40
                        • _wcslen.LIBCMT ref: 006F3D6D
                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 006F3D9D
                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 006F3DBE
                        • RemoveDirectoryW.KERNEL32(?), ref: 006F3DCE
                        • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 006F3E55
                        • CloseHandle.KERNEL32(00000000), ref: 006F3E60
                        • CloseHandle.KERNEL32(00000000), ref: 006F3E6B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                        • String ID: :$\$\??\%s
                        • API String ID: 1149970189-3457252023
                        • Opcode ID: 41b59b9fb0dc9374870362bd6dfcf65ae67bee0183f04ef7ce7536e47c843457
                        • Instruction ID: d95ec94c6ea9c83ea90f6b2663cc6a8a674aff7da6ab5bb7f64ea1ca0576aa11
                        • Opcode Fuzzy Hash: 41b59b9fb0dc9374870362bd6dfcf65ae67bee0183f04ef7ce7536e47c843457
                        • Instruction Fuzzy Hash: 5531B471940119ABDB219FA4DC49FEF37BEEF89740F1080B9F615D6290EB7497448B28
                        APIs
                        • timeGetTime.WINMM ref: 006EE6B4
                          • Part of subcall function 0069E551: timeGetTime.WINMM(?,?,006EE6D4), ref: 0069E555
                        • Sleep.KERNEL32(0000000A), ref: 006EE6E1
                        • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 006EE705
                        • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 006EE727
                        • SetActiveWindow.USER32 ref: 006EE746
                        • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 006EE754
                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 006EE773
                        • Sleep.KERNEL32(000000FA), ref: 006EE77E
                        • IsWindow.USER32 ref: 006EE78A
                        • EndDialog.USER32(00000000), ref: 006EE79B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                        • String ID: BUTTON
                        • API String ID: 1194449130-3405671355
                        • Opcode ID: 32d9480019ccb653020ca7159b9d4b2d45ee61a2110ffdd8f2847713854635df
                        • Instruction ID: a6b2e2e7799a79c5ddc1ad1803b7fd916ffe1719a3e94a232d011bba01438a7a
                        • Opcode Fuzzy Hash: 32d9480019ccb653020ca7159b9d4b2d45ee61a2110ffdd8f2847713854635df
                        • Instruction Fuzzy Hash: 4521C6B0381385AFEB015F65EC89BA53B6BF75534AF10C424F405826E2DBBA9C01CA5C
                        APIs
                          • Part of subcall function 00689CB3: _wcslen.LIBCMT ref: 00689CBD
                        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 006EEA5D
                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 006EEA73
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 006EEA84
                        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 006EEA96
                        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 006EEAA7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: SendString$_wcslen
                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                        • API String ID: 2420728520-1007645807
                        • Opcode ID: 3d8acae8e05af914b655a7d7c2ef50c8bfd74dce1e79067d324e0092a0b90688
                        • Instruction ID: 784d5a11fca5e0b26f4fc1903b64ee9ca08598e994b41a7cee2314b0a6ce6143
                        • Opcode Fuzzy Hash: 3d8acae8e05af914b655a7d7c2ef50c8bfd74dce1e79067d324e0092a0b90688
                        • Instruction Fuzzy Hash: 75118CA1A9036979D720B7A6DC4ADFB6A7DEBD2B00F00052DB801A20D0EFB41A05C6B1
                        APIs
                        • GetDlgItem.USER32(?,00000001), ref: 006E5CE2
                        • GetWindowRect.USER32(00000000,?), ref: 006E5CFB
                        • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 006E5D59
                        • GetDlgItem.USER32(?,00000002), ref: 006E5D69
                        • GetWindowRect.USER32(00000000,?), ref: 006E5D7B
                        • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 006E5DCF
                        • GetDlgItem.USER32(?,000003E9), ref: 006E5DDD
                        • GetWindowRect.USER32(00000000,?), ref: 006E5DEF
                        • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 006E5E31
                        • GetDlgItem.USER32(?,000003EA), ref: 006E5E44
                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 006E5E5A
                        • InvalidateRect.USER32(?,00000000,00000001), ref: 006E5E67
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Window$ItemMoveRect$Invalidate
                        • String ID:
                        • API String ID: 3096461208-0
                        • Opcode ID: 153a6cda4696a52f86cfac0efff75591b38dee82ceb053288a46318516967972
                        • Instruction ID: 6479625c883f9dd73131dc964f18ad03b323d298ae9469f714cea27beff11dec
                        • Opcode Fuzzy Hash: 153a6cda4696a52f86cfac0efff75591b38dee82ceb053288a46318516967972
                        • Instruction Fuzzy Hash: 87511C70A40705AFDB18CFA9CD89AEEBBB6EF48304F148129F516E7290D7749E04CB54
                        APIs
                          • Part of subcall function 00698F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00698BE8,?,00000000,?,?,?,?,00698BBA,00000000,?), ref: 00698FC5
                        • DestroyWindow.USER32(?), ref: 00698C81
                        • KillTimer.USER32(00000000,?,?,?,?,00698BBA,00000000,?), ref: 00698D1B
                        • DestroyAcceleratorTable.USER32(00000000), ref: 006D6973
                        • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00698BBA,00000000,?), ref: 006D69A1
                        • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00698BBA,00000000,?), ref: 006D69B8
                        • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00698BBA,00000000), ref: 006D69D4
                        • DeleteObject.GDI32(00000000), ref: 006D69E6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                        • String ID:
                        • API String ID: 641708696-0
                        • Opcode ID: ed7d06da644a2a756ede15740a6a4ad9728439c479ff975496b47f7fc031baf0
                        • Instruction ID: bbc4e3b8307adc7e1aba7354b3eb6e0a36190b1a1bedd0dc3968bff3b7f2d888
                        • Opcode Fuzzy Hash: ed7d06da644a2a756ede15740a6a4ad9728439c479ff975496b47f7fc031baf0
                        • Instruction Fuzzy Hash: 2B618C30902700DFCF229F18C958BA577F6FB46313F54851DE0429BAA0CBB9AD81CB98
                        APIs
                          • Part of subcall function 00699944: GetWindowLongW.USER32(?,000000EB), ref: 00699952
                        • GetSysColor.USER32(0000000F), ref: 00699862
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ColorLongWindow
                        • String ID:
                        • API String ID: 259745315-0
                        • Opcode ID: f40bc438ae694edbd005979aeeb86e7ac140db2cd48e7bdf9f5d35e9d1e41dad
                        • Instruction ID: 75a53239defc0e6f1eb33fd17eab8e4654b647148b52e46ebb9c31994821c27f
                        • Opcode Fuzzy Hash: f40bc438ae694edbd005979aeeb86e7ac140db2cd48e7bdf9f5d35e9d1e41dad
                        • Instruction Fuzzy Hash: 8D41B271544644AFDF215F7C9C84BF937AAAB06331F148A0DF9A28B2E1E7359C42DB21
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID: .j
                        • API String ID: 0-79812232
                        • Opcode ID: 92fed38e60f7fc8e40dc6a3f6418ab9c80d1336de36e2dc0bb830a555674e170
                        • Instruction ID: fdaae63552974621a54b48df28723737f4fcaabb6e340680c8f22a4e5f52c4d3
                        • Opcode Fuzzy Hash: 92fed38e60f7fc8e40dc6a3f6418ab9c80d1336de36e2dc0bb830a555674e170
                        • Instruction Fuzzy Hash: A9C1E2B4904349AFCB51EFE8D841BEDBBB6AF0A310F14409DE914A7392C7749982CB75
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,006CF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 006E9717
                        • LoadStringW.USER32(00000000,?,006CF7F8,00000001), ref: 006E9720
                          • Part of subcall function 00689CB3: _wcslen.LIBCMT ref: 00689CBD
                        • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,006CF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 006E9742
                        • LoadStringW.USER32(00000000,?,006CF7F8,00000001), ref: 006E9745
                        • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 006E9866
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: HandleLoadModuleString$Message_wcslen
                        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                        • API String ID: 747408836-2268648507
                        • Opcode ID: 77437300a2599d29b4ce9c6ce084635ce9458056529eabe20da8e3822f8772d7
                        • Instruction ID: 2d46a5ac31a7a0e4467ab7db9cfef3d9d951db1636028b9c47a81161120bac45
                        • Opcode Fuzzy Hash: 77437300a2599d29b4ce9c6ce084635ce9458056529eabe20da8e3822f8772d7
                        • Instruction Fuzzy Hash: A2414BB2800259ABCF44FBE0CD86DEEB37AAF15740F144529F60172192EB296F49CB75
                        APIs
                          • Part of subcall function 00686B57: _wcslen.LIBCMT ref: 00686B6A
                        • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 006E07A2
                        • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 006E07BE
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 006E07DA
                        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 006E0804
                        • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 006E082C
                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 006E0837
                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 006E083C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                        • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                        • API String ID: 323675364-22481851
                        • Opcode ID: c50988380452c5a8e34d2d17ac0989505ec5b9f7da6a10e6be360c23c77fcceb
                        • Instruction ID: 679e855fe1474311f401aff93d7307e718124122ec16289095fd7c3a6b401d35
                        • Opcode Fuzzy Hash: c50988380452c5a8e34d2d17ac0989505ec5b9f7da6a10e6be360c23c77fcceb
                        • Instruction Fuzzy Hash: F9410B72C10229ABDF15EB94DC95CEDB779FF04750B044229E901A32A1EB749E44CBA4
                        APIs
                        • VariantInit.OLEAUT32(?), ref: 00703C5C
                        • CoInitialize.OLE32(00000000), ref: 00703C8A
                        • CoUninitialize.OLE32 ref: 00703C94
                        • _wcslen.LIBCMT ref: 00703D2D
                        • GetRunningObjectTable.OLE32(00000000,?), ref: 00703DB1
                        • SetErrorMode.KERNEL32(00000001,00000029), ref: 00703ED5
                        • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00703F0E
                        • CoGetObject.OLE32(?,00000000,0071FB98,?), ref: 00703F2D
                        • SetErrorMode.KERNEL32(00000000), ref: 00703F40
                        • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00703FC4
                        • VariantClear.OLEAUT32(?), ref: 00703FD8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                        • String ID:
                        • API String ID: 429561992-0
                        • Opcode ID: 6717f970bc8731a62120c29de4a241a302affa77a2414072df8145ad16f775cc
                        • Instruction ID: efe67d96b499b9bd2959eb2af43f8a84ed799b38b8c8b5e7f2eee7c3fd6f232d
                        • Opcode Fuzzy Hash: 6717f970bc8731a62120c29de4a241a302affa77a2414072df8145ad16f775cc
                        • Instruction Fuzzy Hash: 75C133B1608205DFD700DF68C88492BBBE9FF89744F044A1DF98A9B290D734EE45CB62
                        APIs
                        • CoInitialize.OLE32(00000000), ref: 006F7AF3
                        • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 006F7B8F
                        • SHGetDesktopFolder.SHELL32(?), ref: 006F7BA3
                        • CoCreateInstance.OLE32(0071FD08,00000000,00000001,00746E6C,?), ref: 006F7BEF
                        • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 006F7C74
                        • CoTaskMemFree.OLE32(?,?), ref: 006F7CCC
                        • SHBrowseForFolderW.SHELL32(?), ref: 006F7D57
                        • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 006F7D7A
                        • CoTaskMemFree.OLE32(00000000), ref: 006F7D81
                        • CoTaskMemFree.OLE32(00000000), ref: 006F7DD6
                        • CoUninitialize.OLE32 ref: 006F7DDC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                        • String ID:
                        • API String ID: 2762341140-0
                        • Opcode ID: b2963bc6e334074d43749aeb0e57e23ef01f1b1fc8ba1dc613c947e255234889
                        • Instruction ID: 4c5a2893e41e7902bf3d49e2a026cdb2f615c262d0eef165525160a7acb3ba90
                        • Opcode Fuzzy Hash: b2963bc6e334074d43749aeb0e57e23ef01f1b1fc8ba1dc613c947e255234889
                        • Instruction Fuzzy Hash: 47C12B75A04109AFCB14DFA8C884DAEBBFAFF49304B148599E919DB361D730EE41CB94
                        APIs
                        • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00715504
                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00715515
                        • CharNextW.USER32(00000158), ref: 00715544
                        • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00715585
                        • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0071559B
                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 007155AC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessageSend$CharNext
                        • String ID:
                        • API String ID: 1350042424-0
                        • Opcode ID: 7c1ed8a4a01e675b155b904b59f32d0c2a9f22979df56863de12859fe2bf449e
                        • Instruction ID: 7056bdfe70688865d2049791920a38754a6fd929ed42835aa8baf536037c36ab
                        • Opcode Fuzzy Hash: 7c1ed8a4a01e675b155b904b59f32d0c2a9f22979df56863de12859fe2bf449e
                        • Instruction Fuzzy Hash: 1D618070900608EFDF159F98CC85EFE7BB9EB89721F108145F925AA2D0D7789AC0DB61
                        APIs
                        • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 006DFAAF
                        • SafeArrayAllocData.OLEAUT32(?), ref: 006DFB08
                        • VariantInit.OLEAUT32(?), ref: 006DFB1A
                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 006DFB3A
                        • VariantCopy.OLEAUT32(?,?), ref: 006DFB8D
                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 006DFBA1
                        • VariantClear.OLEAUT32(?), ref: 006DFBB6
                        • SafeArrayDestroyData.OLEAUT32(?), ref: 006DFBC3
                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 006DFBCC
                        • VariantClear.OLEAUT32(?), ref: 006DFBDE
                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 006DFBE9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                        • String ID:
                        • API String ID: 2706829360-0
                        • Opcode ID: 5e15e3d0979677c07b41a464b2965b724c765dd086b6876437b82723433baded
                        • Instruction ID: ad114f0346a15277e05021a5338ff0971257d971bc82b0ff03f3d9747fd0a820
                        • Opcode Fuzzy Hash: 5e15e3d0979677c07b41a464b2965b724c765dd086b6876437b82723433baded
                        • Instruction Fuzzy Hash: 3D415135E04219DFDB01DFA8D8549EDBFBAEF48354F00C06AE946A7361CB34A945CBA4
                        APIs
                        • GetKeyboardState.USER32(?), ref: 006E9CA1
                        • GetAsyncKeyState.USER32(000000A0), ref: 006E9D22
                        • GetKeyState.USER32(000000A0), ref: 006E9D3D
                        • GetAsyncKeyState.USER32(000000A1), ref: 006E9D57
                        • GetKeyState.USER32(000000A1), ref: 006E9D6C
                        • GetAsyncKeyState.USER32(00000011), ref: 006E9D84
                        • GetKeyState.USER32(00000011), ref: 006E9D96
                        • GetAsyncKeyState.USER32(00000012), ref: 006E9DAE
                        • GetKeyState.USER32(00000012), ref: 006E9DC0
                        • GetAsyncKeyState.USER32(0000005B), ref: 006E9DD8
                        • GetKeyState.USER32(0000005B), ref: 006E9DEA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: State$Async$Keyboard
                        • String ID:
                        • API String ID: 541375521-0
                        • Opcode ID: e32f3ed1f275f297a25a4543991d746bd856b106fc51b431b7f66a861bdad172
                        • Instruction ID: ceb727f88c79da2f6d8dd30e99acd4823eac869284361aeec15e8de2a3695cc1
                        • Opcode Fuzzy Hash: e32f3ed1f275f297a25a4543991d746bd856b106fc51b431b7f66a861bdad172
                        • Instruction Fuzzy Hash: 4B410930505BC96DFF3197A688043F5BEE26F11304F14805ACAC65A3C2EBA499D8CBB2
                        APIs
                        • WSAStartup.WSOCK32(00000101,?), ref: 007005BC
                        • inet_addr.WSOCK32(?), ref: 0070061C
                        • gethostbyname.WSOCK32(?), ref: 00700628
                        • IcmpCreateFile.IPHLPAPI ref: 00700636
                        • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 007006C6
                        • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 007006E5
                        • IcmpCloseHandle.IPHLPAPI(?), ref: 007007B9
                        • WSACleanup.WSOCK32 ref: 007007BF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                        • String ID: Ping
                        • API String ID: 1028309954-2246546115
                        • Opcode ID: 0661864cca19c27fe1637eb0aa9969013c9bcc33a54576d7ca2714d529d453fe
                        • Instruction ID: 065027494c906eb0626f8ce12c220ab45630fe47d357c212217c2a8b2664c641
                        • Opcode Fuzzy Hash: 0661864cca19c27fe1637eb0aa9969013c9bcc33a54576d7ca2714d529d453fe
                        • Instruction Fuzzy Hash: AB918E75604201EFD720DF19C888F1ABBE1AF45328F1486A9E4698B6E2C778ED45CFD1
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _wcslen$BuffCharLower
                        • String ID: cdecl$none$stdcall$winapi
                        • API String ID: 707087890-567219261
                        • Opcode ID: 2c5911f610d0bb5537499cbb8d6f5cf4888e4a78acfa4f5e8d802a351e1d4347
                        • Instruction ID: 689fedd68541416c6f8c3319b3c3a8c9b481f014c28594ba0ef118dd0263fa8c
                        • Opcode Fuzzy Hash: 2c5911f610d0bb5537499cbb8d6f5cf4888e4a78acfa4f5e8d802a351e1d4347
                        • Instruction Fuzzy Hash: 16519F31A00516DBCF54EF68C9409BEB7E6AF65720B254329E8A6E73C4DB38DD40C791
                        APIs
                        • CoInitialize.OLE32 ref: 00703774
                        • CoUninitialize.OLE32 ref: 0070377F
                        • CoCreateInstance.OLE32(?,00000000,00000017,0071FB78,?), ref: 007037D9
                        • IIDFromString.OLE32(?,?), ref: 0070384C
                        • VariantInit.OLEAUT32(?), ref: 007038E4
                        • VariantClear.OLEAUT32(?), ref: 00703936
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                        • API String ID: 636576611-1287834457
                        • Opcode ID: 4552b35777a18899d7fd7943f452d0100ea66ee65be2bbeeea14c0b07c7f27db
                        • Instruction ID: 2a2dfd004c83f12a073c77c09559085ef2c433bb0838940d5b274da9e9600d5a
                        • Opcode Fuzzy Hash: 4552b35777a18899d7fd7943f452d0100ea66ee65be2bbeeea14c0b07c7f27db
                        • Instruction Fuzzy Hash: E361A070608301EFD311DF54C889B6AB7E9AF49714F104A4DF5859B2D1C778EE48CBA6
                        APIs
                          • Part of subcall function 00699BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00699BB2
                          • Part of subcall function 0069912D: GetCursorPos.USER32(?), ref: 00699141
                          • Part of subcall function 0069912D: ScreenToClient.USER32(00000000,?), ref: 0069915E
                          • Part of subcall function 0069912D: GetAsyncKeyState.USER32(00000001), ref: 00699183
                          • Part of subcall function 0069912D: GetAsyncKeyState.USER32(00000002), ref: 0069919D
                        • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00718B6B
                        • ImageList_EndDrag.COMCTL32 ref: 00718B71
                        • ReleaseCapture.USER32 ref: 00718B77
                        • SetWindowTextW.USER32(?,00000000), ref: 00718C12
                        • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00718C25
                        • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00718CFF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                        • String ID: @GUI_DRAGFILE$@GUI_DROPID$p#u
                        • API String ID: 1924731296-1558751646
                        • Opcode ID: ab79b6306fa4f0286f0cd0554e4fe35f832eb70f37f0b3e5d50b6f875a32de00
                        • Instruction ID: a5d6562c0797db08a6209261c1b8d1912ab5635ff150cb8b79549a0fdba58013
                        • Opcode Fuzzy Hash: ab79b6306fa4f0286f0cd0554e4fe35f832eb70f37f0b3e5d50b6f875a32de00
                        • Instruction Fuzzy Hash: B751BB70104300AFD704EF28DC5ABAA77E5FB88711F40062DF952A72E1CB78AD44CBA6
                        APIs
                        • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 006F33CF
                          • Part of subcall function 00689CB3: _wcslen.LIBCMT ref: 00689CBD
                        • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 006F33F0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: LoadString$_wcslen
                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                        • API String ID: 4099089115-3080491070
                        • Opcode ID: fe2260c60e2566ffd766cc78d8f7f8015d6ad3226d855800d02d1fc383941293
                        • Instruction ID: 7408c9c6cbc0c416ac449bc8fac89ef02efa62f8bf39f3e2efc540205ed5ff18
                        • Opcode Fuzzy Hash: fe2260c60e2566ffd766cc78d8f7f8015d6ad3226d855800d02d1fc383941293
                        • Instruction Fuzzy Hash: BC51ADB1900219AADF15FBE0CD56EFEB77AAF04300F144169F505722A2EB252F58CB65
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _wcslen$BuffCharUpper
                        • String ID: APPEND$EXISTS$KEYS$REMOVE
                        • API String ID: 1256254125-769500911
                        • Opcode ID: f32361ae0f26d7c016e2498d821b5ffe4642619acd3131259a4923a90846c67d
                        • Instruction ID: 9baad258e73876ec72f8d38d38d4cb138cf9d9d7478e0463f98ddf3ed9eae8ef
                        • Opcode Fuzzy Hash: f32361ae0f26d7c016e2498d821b5ffe4642619acd3131259a4923a90846c67d
                        • Instruction Fuzzy Hash: F541D832A022679ACB206F7E8C905FFB7A7AFA1754B245129E461DB384E735CD81C790
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 006F53A0
                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 006F5416
                        • GetLastError.KERNEL32 ref: 006F5420
                        • SetErrorMode.KERNEL32(00000000,READY), ref: 006F54A7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Error$Mode$DiskFreeLastSpace
                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                        • API String ID: 4194297153-14809454
                        • Opcode ID: 5629b8c5e4a011aa0d924168ae8a5309a74428b5d5af4cd119aa69c86d86a844
                        • Instruction ID: 894a12f72c87b186b6ad257967052374dc71fdacae5bdc15e3b4ca44e20114e1
                        • Opcode Fuzzy Hash: 5629b8c5e4a011aa0d924168ae8a5309a74428b5d5af4cd119aa69c86d86a844
                        • Instruction Fuzzy Hash: 3D318F75A006099FCB11DF68C484AF9BBE6EB05305F148069E606CB392DB35DD82CBA1
                        APIs
                        • CreateMenu.USER32 ref: 00713C79
                        • SetMenu.USER32(?,00000000), ref: 00713C88
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00713D10
                        • IsMenu.USER32(?), ref: 00713D24
                        • CreatePopupMenu.USER32 ref: 00713D2E
                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00713D5B
                        • DrawMenuBar.USER32 ref: 00713D63
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Menu$CreateItem$DrawInfoInsertPopup
                        • String ID: 0$F
                        • API String ID: 161812096-3044882817
                        • Opcode ID: 36ba2d23c46afe545ba4696cbd2fb17ce712030892b58b39ae2f4b72123b53d4
                        • Instruction ID: 419279cf0b53dfb46fccc8e0d9e1300afd811193d8851337c2add375a4bb2e4f
                        • Opcode Fuzzy Hash: 36ba2d23c46afe545ba4696cbd2fb17ce712030892b58b39ae2f4b72123b53d4
                        • Instruction Fuzzy Hash: E6418D74A01209EFDB14CFA8E844BDA77B6FF49305F144028F946973A0D778AA10CF94
                        APIs
                          • Part of subcall function 00689CB3: _wcslen.LIBCMT ref: 00689CBD
                          • Part of subcall function 006E3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 006E3CCA
                        • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 006E1F64
                        • GetDlgCtrlID.USER32 ref: 006E1F6F
                        • GetParent.USER32 ref: 006E1F8B
                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 006E1F8E
                        • GetDlgCtrlID.USER32(?), ref: 006E1F97
                        • GetParent.USER32(?), ref: 006E1FAB
                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 006E1FAE
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessageSend$CtrlParent$ClassName_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 711023334-1403004172
                        • Opcode ID: 5d525889c1c57dc252543e0df506f5b41e7253982685c9b92fff9009712bc4b3
                        • Instruction ID: 72afdd7758ca9d3817d3a80a7fbb22a480f7271e478eb1434695c70d11420cdc
                        • Opcode Fuzzy Hash: 5d525889c1c57dc252543e0df506f5b41e7253982685c9b92fff9009712bc4b3
                        • Instruction Fuzzy Hash: CB21C2B0941214BFCF05AFA5CC85DFEBBBAEF06310B108159F961672D1DB395904DBA4
                        APIs
                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00713A9D
                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00713AA0
                        • GetWindowLongW.USER32(?,000000F0), ref: 00713AC7
                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00713AEA
                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00713B62
                        • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00713BAC
                        • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00713BC7
                        • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00713BE2
                        • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00713BF6
                        • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00713C13
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessageSend$LongWindow
                        • String ID:
                        • API String ID: 312131281-0
                        • Opcode ID: a5338c668641ebe0f31847087a5d4a9369eaa86ac103fa778220bef293a109d9
                        • Instruction ID: 32b94696673514f47185a1be7773fdc0e468a1f02d0748d87a57abaa25deb48c
                        • Opcode Fuzzy Hash: a5338c668641ebe0f31847087a5d4a9369eaa86ac103fa778220bef293a109d9
                        • Instruction Fuzzy Hash: 5A617F75900248AFDB20DFA8CC81EEE77F8EB09710F104199FA15A72D1D778AE85DB54
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 006EB151
                        • GetForegroundWindow.USER32(00000000,?,?,?,?,?,006EA1E1,?,00000001), ref: 006EB165
                        • GetWindowThreadProcessId.USER32(00000000), ref: 006EB16C
                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,006EA1E1,?,00000001), ref: 006EB17B
                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 006EB18D
                        • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,006EA1E1,?,00000001), ref: 006EB1A6
                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,006EA1E1,?,00000001), ref: 006EB1B8
                        • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,006EA1E1,?,00000001), ref: 006EB1FD
                        • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,006EA1E1,?,00000001), ref: 006EB212
                        • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,006EA1E1,?,00000001), ref: 006EB21D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                        • String ID:
                        • API String ID: 2156557900-0
                        • Opcode ID: aa544d01a076188d0c445d875c033a23796b210e2325458e261f72703a3e0541
                        • Instruction ID: e63010e3bd4831e1d014172b6c5355f5398f5e412776c37d367110c3d0436fdb
                        • Opcode Fuzzy Hash: aa544d01a076188d0c445d875c033a23796b210e2325458e261f72703a3e0541
                        • Instruction Fuzzy Hash: EB31AC75541344BFDB119F69DC49BFE7BAAAF50352F14D014FA08DA2E0D7B89A008F68
                        APIs
                        • _free.LIBCMT ref: 006B2C94
                          • Part of subcall function 006B29C8: HeapFree.KERNEL32(00000000,00000000,?,006BD7D1,00000000,00000000,00000000,00000000,?,006BD7F8,00000000,00000007,00000000,?,006BDBF5,00000000), ref: 006B29DE
                          • Part of subcall function 006B29C8: GetLastError.KERNEL32(00000000,?,006BD7D1,00000000,00000000,00000000,00000000,?,006BD7F8,00000000,00000007,00000000,?,006BDBF5,00000000,00000000), ref: 006B29F0
                        • _free.LIBCMT ref: 006B2CA0
                        • _free.LIBCMT ref: 006B2CAB
                        • _free.LIBCMT ref: 006B2CB6
                        • _free.LIBCMT ref: 006B2CC1
                        • _free.LIBCMT ref: 006B2CCC
                        • _free.LIBCMT ref: 006B2CD7
                        • _free.LIBCMT ref: 006B2CE2
                        • _free.LIBCMT ref: 006B2CED
                        • _free.LIBCMT ref: 006B2CFB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: c0a5a7cba714c77a2578586b94a66dd0e5e206f4afd79bf1200b6c392a9373f5
                        • Instruction ID: 22f2e27aa5342cfd686466da645ca90c4b76c19f44a6f04e625cf5ab42cfd973
                        • Opcode Fuzzy Hash: c0a5a7cba714c77a2578586b94a66dd0e5e206f4afd79bf1200b6c392a9373f5
                        • Instruction Fuzzy Hash: FD11A7B6100109BFCB42FF55D852CDD3BA6FF05750F4148A9F9485F222DA31EE909B94
                        APIs
                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 006F7FAD
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 006F7FC1
                        • GetFileAttributesW.KERNEL32(?), ref: 006F7FEB
                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 006F8005
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 006F8017
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 006F8060
                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 006F80B0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CurrentDirectory$AttributesFile
                        • String ID: *.*
                        • API String ID: 769691225-438819550
                        • Opcode ID: da6d1e2ce800ea304aa8ad3c1649fe5ce349caeff460060d21f87b034dcb5fba
                        • Instruction ID: 56e3f93b14f094091ebbaa3ce00d15413ca3c97207d0dc87d4fa840da4bbe006
                        • Opcode Fuzzy Hash: da6d1e2ce800ea304aa8ad3c1649fe5ce349caeff460060d21f87b034dcb5fba
                        • Instruction Fuzzy Hash: 5081AE725082499FCB20EF14C844ABEB3EABF89314F54885EFA85D7250EB35DD498B52
                        APIs
                        • SetWindowLongW.USER32(?,000000EB), ref: 00685C7A
                          • Part of subcall function 00685D0A: GetClientRect.USER32(?,?), ref: 00685D30
                          • Part of subcall function 00685D0A: GetWindowRect.USER32(?,?), ref: 00685D71
                          • Part of subcall function 00685D0A: ScreenToClient.USER32(?,?), ref: 00685D99
                        • GetDC.USER32 ref: 006C46F5
                        • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 006C4708
                        • SelectObject.GDI32(00000000,00000000), ref: 006C4716
                        • SelectObject.GDI32(00000000,00000000), ref: 006C472B
                        • ReleaseDC.USER32(?,00000000), ref: 006C4733
                        • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 006C47C4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                        • String ID: U
                        • API String ID: 4009187628-3372436214
                        • Opcode ID: 8174eb8832ed66e9299d36aad8bbb2b82b5a5bca402bc9b45200fb0176d5aeb2
                        • Instruction ID: 5190376b8d048eb9ef53b4253fdb9bacc21aafc4b6f8ad954d0eb54cd5efe5f1
                        • Opcode Fuzzy Hash: 8174eb8832ed66e9299d36aad8bbb2b82b5a5bca402bc9b45200fb0176d5aeb2
                        • Instruction Fuzzy Hash: 1371AB31400205DFCF21DF64C994EFA3BB6FF4A325F14426DE9565A2A6CB319841DF60
                        APIs
                        • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 006F35E4
                          • Part of subcall function 00689CB3: _wcslen.LIBCMT ref: 00689CBD
                        • LoadStringW.USER32(00752390,?,00000FFF,?), ref: 006F360A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: LoadString$_wcslen
                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                        • API String ID: 4099089115-2391861430
                        • Opcode ID: deaef13f09726b825b6ffb51ac9372c6fd367ca6119fd389c2791553ea7d0ccb
                        • Instruction ID: 12dcf332f6124721b434f198ed149090dd6938909b10e2fdefb3a6c3686f14dd
                        • Opcode Fuzzy Hash: deaef13f09726b825b6ffb51ac9372c6fd367ca6119fd389c2791553ea7d0ccb
                        • Instruction Fuzzy Hash: 4A518EB1800259ABDF55FBA0CC42EFDBB36AF04301F044229F205722A1EB351B95CBA9
                        APIs
                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 006FC272
                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 006FC29A
                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 006FC2CA
                        • GetLastError.KERNEL32 ref: 006FC322
                        • SetEvent.KERNEL32(?), ref: 006FC336
                        • InternetCloseHandle.WININET(00000000), ref: 006FC341
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                        • String ID:
                        • API String ID: 3113390036-3916222277
                        • Opcode ID: 8c80f1e01bbe1887707dfd8e5c9a1c90a002d9c903cfe772c5d7cbbda2e1b38e
                        • Instruction ID: 2e86aea04efeadedef30859078dc4e543e0cd87010d8c89ab370550d6eb8d5ea
                        • Opcode Fuzzy Hash: 8c80f1e01bbe1887707dfd8e5c9a1c90a002d9c903cfe772c5d7cbbda2e1b38e
                        • Instruction Fuzzy Hash: 6831B3B250020CAFD7219FA88D84AFB7BFDEB45790F04851DF54692240DB34DD058B65
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,006C3AAF,?,?,Bad directive syntax error,0071CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 006E98BC
                        • LoadStringW.USER32(00000000,?,006C3AAF,?), ref: 006E98C3
                          • Part of subcall function 00689CB3: _wcslen.LIBCMT ref: 00689CBD
                        • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 006E9987
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: HandleLoadMessageModuleString_wcslen
                        • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                        • API String ID: 858772685-4153970271
                        • Opcode ID: 41224b143e87924af4db280336e5cdd4206dab88bbe5106aabad874a076acd78
                        • Instruction ID: bf9757e1e7bcbe503e497fc38a729cb04fa8ad3d21beb63b6a71658ab676e90b
                        • Opcode Fuzzy Hash: 41224b143e87924af4db280336e5cdd4206dab88bbe5106aabad874a076acd78
                        • Instruction Fuzzy Hash: FE21B17184026ABBCF15AF90CC06EFE773AFF19700F084419F515620A2EB359618CB25
                        APIs
                        • GetParent.USER32 ref: 006E20AB
                        • GetClassNameW.USER32(00000000,?,00000100), ref: 006E20C0
                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 006E214D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ClassMessageNameParentSend
                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                        • API String ID: 1290815626-3381328864
                        • Opcode ID: 4c2fb12fc531d6116ce76f2d3b33233304aa41fb8f54711737d793196ac11029
                        • Instruction ID: c2bd9554991844d7b0e08c8c89904786ca1295df271637ffbfa4d69ec5d20464
                        • Opcode Fuzzy Hash: 4c2fb12fc531d6116ce76f2d3b33233304aa41fb8f54711737d793196ac11029
                        • Instruction Fuzzy Hash: B5115CB62C4707BAF6013226DC17DE6339FCB06324B20405AF704A50E2FFB55D025918
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                        • String ID:
                        • API String ID: 1282221369-0
                        • Opcode ID: 8f538840ec8554941365ef3f67b1864ebb35d22b75d9c940bbf79833a1132ff0
                        • Instruction ID: fa9ce4879961b48ba025cedc147ee7223abde7a8f05c72e4c68597977fdbed3d
                        • Opcode Fuzzy Hash: 8f538840ec8554941365ef3f67b1864ebb35d22b75d9c940bbf79833a1132ff0
                        • Instruction Fuzzy Hash: F36149F1A04311AFDB21BFB49891AF97BEBEF05320F0441ADF9449B381E6359E818794
                        APIs
                        • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 006D6890
                        • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 006D68A9
                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 006D68B9
                        • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 006D68D1
                        • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 006D68F2
                        • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00698874,00000000,00000000,00000000,000000FF,00000000), ref: 006D6901
                        • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 006D691E
                        • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00698874,00000000,00000000,00000000,000000FF,00000000), ref: 006D692D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Icon$DestroyExtractImageLoadMessageSend
                        • String ID:
                        • API String ID: 1268354404-0
                        • Opcode ID: b31555fc88a0fb1e250185fdef25b6633165d01c9303019f5cb60b7f340d7d77
                        • Instruction ID: a871f1f2e3fa79b33c836041abfb9568e9dc4c39ec4c3ed1c4d29b92686fd593
                        • Opcode Fuzzy Hash: b31555fc88a0fb1e250185fdef25b6633165d01c9303019f5cb60b7f340d7d77
                        • Instruction Fuzzy Hash: EB51A970A00209EFDF20CF28CC55FAA3BBAEB58751F148519F902976E0DB74E991DB54
                        APIs
                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 006FC182
                        • GetLastError.KERNEL32 ref: 006FC195
                        • SetEvent.KERNEL32(?), ref: 006FC1A9
                          • Part of subcall function 006FC253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 006FC272
                          • Part of subcall function 006FC253: GetLastError.KERNEL32 ref: 006FC322
                          • Part of subcall function 006FC253: SetEvent.KERNEL32(?), ref: 006FC336
                          • Part of subcall function 006FC253: InternetCloseHandle.WININET(00000000), ref: 006FC341
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                        • String ID:
                        • API String ID: 337547030-0
                        • Opcode ID: 0ad9403c24fbf38058ba21be4bd12cbe7a77918eb8e81a166b1482097804064d
                        • Instruction ID: ccc48c25a9e8c6adad3eb88d8dc60aad8416eacf775de622231d819b20123fa3
                        • Opcode Fuzzy Hash: 0ad9403c24fbf38058ba21be4bd12cbe7a77918eb8e81a166b1482097804064d
                        • Instruction Fuzzy Hash: 0E31B27114060DAFDB229FE9DE44AF6BBFAFF18320B04841DFA5682650C734EA14DB60
                        APIs
                          • Part of subcall function 006E3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 006E3A57
                          • Part of subcall function 006E3A3D: GetCurrentThreadId.KERNEL32 ref: 006E3A5E
                          • Part of subcall function 006E3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,006E25B3), ref: 006E3A65
                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 006E25BD
                        • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 006E25DB
                        • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 006E25DF
                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 006E25E9
                        • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 006E2601
                        • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 006E2605
                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 006E260F
                        • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 006E2623
                        • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 006E2627
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                        • String ID:
                        • API String ID: 2014098862-0
                        • Opcode ID: 5a330496ba4e5859bd85f4a2f4f6b5a430ba43d2caab5f6fb56da75cd118740f
                        • Instruction ID: eeebec3ebbd3cff4ae8ac31046181332c5b4d086b7abafac92d67eb3d3c713e2
                        • Opcode Fuzzy Hash: 5a330496ba4e5859bd85f4a2f4f6b5a430ba43d2caab5f6fb56da75cd118740f
                        • Instruction Fuzzy Hash: 0A01B5702D0364BBFB1067AD9C8EF993F5ADB4AB11F108015F318AF1D1C9E118449A6D
                        APIs
                        • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,006E1449,?,?,00000000), ref: 006E180C
                        • HeapAlloc.KERNEL32(00000000,?,006E1449,?,?,00000000), ref: 006E1813
                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,006E1449,?,?,00000000), ref: 006E1828
                        • GetCurrentProcess.KERNEL32(?,00000000,?,006E1449,?,?,00000000), ref: 006E1830
                        • DuplicateHandle.KERNEL32(00000000,?,006E1449,?,?,00000000), ref: 006E1833
                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,006E1449,?,?,00000000), ref: 006E1843
                        • GetCurrentProcess.KERNEL32(006E1449,00000000,?,006E1449,?,?,00000000), ref: 006E184B
                        • DuplicateHandle.KERNEL32(00000000,?,006E1449,?,?,00000000), ref: 006E184E
                        • CreateThread.KERNEL32(00000000,00000000,006E1874,00000000,00000000,00000000), ref: 006E1868
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                        • String ID:
                        • API String ID: 1957940570-0
                        • Opcode ID: 73a450e1d061b82c562ba790d84c778dc924f67048dc5c2dc5eeb4f6cb36296d
                        • Instruction ID: eb4ac1a62cfb106eb7f3d2f3961a5808087e9143dab2113ca8fa7ddbab9b3f08
                        • Opcode Fuzzy Hash: 73a450e1d061b82c562ba790d84c778dc924f67048dc5c2dc5eeb4f6cb36296d
                        • Instruction Fuzzy Hash: BA01ACB52C0348BFE611ABA9DC4AF977B6DEB89B11F01C411FA05DB1D1C67498009B24
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: __alldvrm$_strrchr
                        • String ID: }}j$}}j$}}j
                        • API String ID: 1036877536-1157188393
                        • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                        • Instruction ID: 85fd20f6cc1b7e3360cc64f4c9befcbd5b2fd4e7470b3ba406d200aa43b90a4a
                        • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                        • Instruction Fuzzy Hash: BBA126B1E002969FDB25DF18C8917FABBE6EF62350F14416DE5859B382CA3499C2C750
                        APIs
                          • Part of subcall function 006ED4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 006ED501
                          • Part of subcall function 006ED4DC: Process32FirstW.KERNEL32(00000000,?), ref: 006ED50F
                          • Part of subcall function 006ED4DC: CloseHandle.KERNELBASE(00000000), ref: 006ED5DC
                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0070A16D
                        • GetLastError.KERNEL32 ref: 0070A180
                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0070A1B3
                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 0070A268
                        • GetLastError.KERNEL32(00000000), ref: 0070A273
                        • CloseHandle.KERNEL32(00000000), ref: 0070A2C4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                        • String ID: SeDebugPrivilege
                        • API String ID: 2533919879-2896544425
                        • Opcode ID: 6fca9bbb563c3ead6dd2fccc3f685576f05bc035c58205aa3c1f0fe6b7461403
                        • Instruction ID: 842932f835933df43f98d2d92cb557de0d64ad809bf63c3fa0428ebbf97821a1
                        • Opcode Fuzzy Hash: 6fca9bbb563c3ead6dd2fccc3f685576f05bc035c58205aa3c1f0fe6b7461403
                        • Instruction Fuzzy Hash: 6E617971204342EFD720DF18C494F16BBE2AF94318F14859CE4668B6E2C77AEC45CB96
                        APIs
                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00713925
                        • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 0071393A
                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00713954
                        • _wcslen.LIBCMT ref: 00713999
                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 007139C6
                        • SendMessageW.USER32(?,00001061,?,0000000F), ref: 007139F4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessageSend$Window_wcslen
                        • String ID: SysListView32
                        • API String ID: 2147712094-78025650
                        • Opcode ID: 32986818850defa41992bf5b77e8435f6b844ff662caf3cbcac36a91b7f8b544
                        • Instruction ID: b26c6ef1f90a723f1978b858ed959ed49110cb50a84b497ed5d1266409f37cfa
                        • Opcode Fuzzy Hash: 32986818850defa41992bf5b77e8435f6b844ff662caf3cbcac36a91b7f8b544
                        • Instruction Fuzzy Hash: 1B41B571A00218ABDF219F68CC45BEA77A9EF08354F10452AF958E72C1D7799D80CB94
                        APIs
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 006EBCFD
                        • IsMenu.USER32(00000000), ref: 006EBD1D
                        • CreatePopupMenu.USER32 ref: 006EBD53
                        • GetMenuItemCount.USER32(017F6410), ref: 006EBDA4
                        • InsertMenuItemW.USER32(017F6410,?,00000001,00000030), ref: 006EBDCC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Menu$Item$CountCreateInfoInsertPopup
                        • String ID: 0$2
                        • API String ID: 93392585-3793063076
                        • Opcode ID: 77e17db8bc1bd91d4f462b4741b11cacb8ad7c9d2b564e2e53a4838a6d469423
                        • Instruction ID: c59cb7b2eb6e5c78cbf61c0112ff624a673b9b895efccbb4efc582b06565a558
                        • Opcode Fuzzy Hash: 77e17db8bc1bd91d4f462b4741b11cacb8ad7c9d2b564e2e53a4838a6d469423
                        • Instruction Fuzzy Hash: 77519E70A023899BDB11CFAADC84BEFBBF6AF45314F249119E4119B3D0D7709941CB65
                        APIs
                        • _ValidateLocalCookies.LIBCMT ref: 006A2D4B
                        • ___except_validate_context_record.LIBVCRUNTIME ref: 006A2D53
                        • _ValidateLocalCookies.LIBCMT ref: 006A2DE1
                        • __IsNonwritableInCurrentImage.LIBCMT ref: 006A2E0C
                        • _ValidateLocalCookies.LIBCMT ref: 006A2E61
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                        • String ID: &Hj$csm
                        • API String ID: 1170836740-859257324
                        • Opcode ID: b68652991fd6e809b80adc6d1e08b930b43d50b34068d63a873e464de7f52ac2
                        • Instruction ID: e8d8fb719dc76df8cdb04965485cab4117f08c9ea3c495db3673852cd1d68c8b
                        • Opcode Fuzzy Hash: b68652991fd6e809b80adc6d1e08b930b43d50b34068d63a873e464de7f52ac2
                        • Instruction Fuzzy Hash: 57418F34A4021AABCF10FF6CC855ADEBBA6BF46324F148159E8156B392D735AE01CF90
                        APIs
                        • LoadIconW.USER32(00000000,00007F03), ref: 006EC913
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: IconLoad
                        • String ID: blank$info$question$stop$warning
                        • API String ID: 2457776203-404129466
                        • Opcode ID: 88081f7002276cece6a6be0e593f67884cb1e2e85124118af5bea8386678a170
                        • Instruction ID: b622b7e7a39584345d29f951363f37bb7bd30850be57e1037fbbd3abe0c3bcc6
                        • Opcode Fuzzy Hash: 88081f7002276cece6a6be0e593f67884cb1e2e85124118af5bea8386678a170
                        • Instruction Fuzzy Hash: 13113D3168A346BAE7016B5A9C83CEF279DDF16334B20002EF504A62C3EBB85D02566D
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                        • String ID: 0.0.0.0
                        • API String ID: 642191829-3771769585
                        • Opcode ID: 4e09fe1e6fa7a15e485699315e6714865b58a51f2acd83114615918799804c20
                        • Instruction ID: 965b9ce9ad7c66da27e8f417d77b54bf8636bb760633ea32d1a3ba74777ea31f
                        • Opcode Fuzzy Hash: 4e09fe1e6fa7a15e485699315e6714865b58a51f2acd83114615918799804c20
                        • Instruction Fuzzy Hash: 87113371900204AFCB20BBA5DC4AEEF37AEDF52310F0041A9F405AA0D1EFB58E818E64
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _wcslen$LocalTime
                        • String ID:
                        • API String ID: 952045576-0
                        • Opcode ID: 0906a570e30a483cd8bcece0dc4f65e6e0a54054ab998658fbd60a084130cbb5
                        • Instruction ID: 89db0477bb8461322e585f94e60d551c64229f42b60bbdd48814d20b09484ba3
                        • Opcode Fuzzy Hash: 0906a570e30a483cd8bcece0dc4f65e6e0a54054ab998658fbd60a084130cbb5
                        • Instruction Fuzzy Hash: 59419E65C11258A5CB51BBF4CC8AACFB7AEAF46300F00846AE514E3121EB34E755C7E9
                        APIs
                        • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,006D682C,00000004,00000000,00000000), ref: 0069F953
                        • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,006D682C,00000004,00000000,00000000), ref: 006DF3D1
                        • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,006D682C,00000004,00000000,00000000), ref: 006DF454
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ShowWindow
                        • String ID:
                        • API String ID: 1268545403-0
                        • Opcode ID: f2362eb76feae4cc873e9ed034c2d21bcf2fc59eca16e2f79c21df1c2757ffd8
                        • Instruction ID: f924fde9108cb349a69a7ff83c4846da06c340a9cbceec58e47b6038676ebd70
                        • Opcode Fuzzy Hash: f2362eb76feae4cc873e9ed034c2d21bcf2fc59eca16e2f79c21df1c2757ffd8
                        • Instruction Fuzzy Hash: 32410931604680BECF399B2D88887EA7BDBAB56314F16843DF047D6FA1C675A881C791
                        APIs
                        • DeleteObject.GDI32(00000000), ref: 00712D1B
                        • GetDC.USER32(00000000), ref: 00712D23
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00712D2E
                        • ReleaseDC.USER32(00000000,00000000), ref: 00712D3A
                        • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00712D76
                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00712D87
                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00715A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00712DC2
                        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00712DE1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                        • String ID:
                        • API String ID: 3864802216-0
                        • Opcode ID: 9756006a1026a1adee93d833315e5d1374af696d51c54ec1623686e8a4c83b13
                        • Instruction ID: c4042458f8c1478bc8af3556d1673c2439962c5516d6815c14a8d36999233226
                        • Opcode Fuzzy Hash: 9756006a1026a1adee93d833315e5d1374af696d51c54ec1623686e8a4c83b13
                        • Instruction Fuzzy Hash: A4319C72241214BFEB158F58DC8AFEB3BA9EF09711F048055FE48AA2D1C6799C51CBA4
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _memcmp
                        • String ID:
                        • API String ID: 2931989736-0
                        • Opcode ID: b43bdfff7b27e2c0b1fff27ba5f461061f9ab15ddffac339783617b7216a8b49
                        • Instruction ID: 4dee3d2cd69b742673b528b229872ed9dfa309d1922c93bf6e6ebf3b2e637618
                        • Opcode Fuzzy Hash: b43bdfff7b27e2c0b1fff27ba5f461061f9ab15ddffac339783617b7216a8b49
                        • Instruction Fuzzy Hash: 6F213AA1642B4477DB14AE264DA2FFB335FAF12388F000024FD065E6D1FB24ED1185E8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID: NULL Pointer assignment$Not an Object type
                        • API String ID: 0-572801152
                        • Opcode ID: f87876e40ac91d1bddb58fd0e2bfe54eabce65128e5b4cbe5be5441c1d9c8460
                        • Instruction ID: e315c0d9fb3bd7b6fb81d34377c7ebc4c47a894a814ddbccb3e455958ea65e32
                        • Opcode Fuzzy Hash: f87876e40ac91d1bddb58fd0e2bfe54eabce65128e5b4cbe5be5441c1d9c8460
                        • Instruction Fuzzy Hash: 5AD18DB5A0060ADFDF10CFA8C881BAEB7F5BF48344F148269E915AB281E7749D45CF90
                        APIs
                        • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,006C17FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 006C15CE
                        • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,006C17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 006C1651
                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,006C17FB,?,006C17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 006C16E4
                        • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,006C17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 006C16FB
                          • Part of subcall function 006B3820: RtlAllocateHeap.NTDLL(00000000,?,00751444,?,0069FDF5,?,?,0068A976,00000010,00751440,006813FC,?,006813C6,?,00681129), ref: 006B3852
                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,006C17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 006C1777
                        • __freea.LIBCMT ref: 006C17A2
                        • __freea.LIBCMT ref: 006C17AE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                        • String ID:
                        • API String ID: 2829977744-0
                        • Opcode ID: c3fdfdc6c891a95a6c111104c821b5229cfddb522a07ec14369fca0427763b6e
                        • Instruction ID: ba13b871ce5a50924c9ad1846016dfba527807f0fa903dbbe9ff5a519d456545
                        • Opcode Fuzzy Hash: c3fdfdc6c891a95a6c111104c821b5229cfddb522a07ec14369fca0427763b6e
                        • Instruction Fuzzy Hash: 849192B1E102169ADF219E64C851FFE7BB6DF4B310F58465DE801EB282D735DD418BA0
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Variant$ClearInit
                        • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                        • API String ID: 2610073882-625585964
                        • Opcode ID: a3113bc365a7f5705dd3db66a115235da4f00dcb70f423394cd4cb666c569ae5
                        • Instruction ID: d12bb68e725531f4cd5efd3ca738216f12543a798e1beeac831dba812e70544a
                        • Opcode Fuzzy Hash: a3113bc365a7f5705dd3db66a115235da4f00dcb70f423394cd4cb666c569ae5
                        • Instruction Fuzzy Hash: C59160B1A00219EBDF24CFA5CC44FAE7BF8EF46714F108659F615AB281D7789941CBA0
                        APIs
                        • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 006F125C
                        • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 006F1284
                        • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 006F12A8
                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 006F12D8
                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 006F135F
                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 006F13C4
                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 006F1430
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ArraySafe$Data$Access$UnaccessVartype
                        • String ID:
                        • API String ID: 2550207440-0
                        • Opcode ID: 8bdb325d9c479fbeec731ea1b234187835c67b8b9a662f2a090bada905886941
                        • Instruction ID: 7569ed1c265172941b00eece3a854d896fbe2c5aa8e7c1699cb6f948f0fb3862
                        • Opcode Fuzzy Hash: 8bdb325d9c479fbeec731ea1b234187835c67b8b9a662f2a090bada905886941
                        • Instruction Fuzzy Hash: FB91B071A00219DFDB01DFA8C885BFEB7B6FF46365F148029EA10EB291D774A941CB94
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ObjectSelect$BeginCreatePath
                        • String ID:
                        • API String ID: 3225163088-0
                        • Opcode ID: 652a82a7704423021947b2e5ee1c91ee313e7910fa0872e406efa286da3a1c54
                        • Instruction ID: 21a20bb0332488251c52bef331b14545ee349188973bddf7bfaffb5a32b80fde
                        • Opcode Fuzzy Hash: 652a82a7704423021947b2e5ee1c91ee313e7910fa0872e406efa286da3a1c54
                        • Instruction Fuzzy Hash: 95912671D40219AFCF11CFA9CC84AEEBBB9FF49320F158059E515B7251D378AA42CB60
                        APIs
                        • VariantInit.OLEAUT32(?), ref: 0070396B
                        • CharUpperBuffW.USER32(?,?), ref: 00703A7A
                        • _wcslen.LIBCMT ref: 00703A8A
                        • VariantClear.OLEAUT32(?), ref: 00703C1F
                          • Part of subcall function 006F0CDF: VariantInit.OLEAUT32(00000000), ref: 006F0D1F
                          • Part of subcall function 006F0CDF: VariantCopy.OLEAUT32(?,?), ref: 006F0D28
                          • Part of subcall function 006F0CDF: VariantClear.OLEAUT32(?), ref: 006F0D34
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                        • String ID: AUTOIT.ERROR$Incorrect Parameter format
                        • API String ID: 4137639002-1221869570
                        • Opcode ID: a4ffe74e68bf649f54f136fa1dc87412728dc73ee3f87d0c0796fd952cd0f293
                        • Instruction ID: 06cf7177b3c3a5441bfc2fd7a06e8153e9e5b7c8b6ec076f93022cd2ee77d2ae
                        • Opcode Fuzzy Hash: a4ffe74e68bf649f54f136fa1dc87412728dc73ee3f87d0c0796fd952cd0f293
                        • Instruction Fuzzy Hash: 039158B4608305DFC704EF64C48096AB7E9BF89314F148A2DF8899B391DB35EE05CB96
                        APIs
                          • Part of subcall function 006E000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,006DFF41,80070057,?,?,?,006E035E), ref: 006E002B
                          • Part of subcall function 006E000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,006DFF41,80070057,?,?), ref: 006E0046
                          • Part of subcall function 006E000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,006DFF41,80070057,?,?), ref: 006E0054
                          • Part of subcall function 006E000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,006DFF41,80070057,?), ref: 006E0064
                        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00704C51
                        • _wcslen.LIBCMT ref: 00704D59
                        • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00704DCF
                        • CoTaskMemFree.OLE32(?), ref: 00704DDA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                        • String ID: NULL Pointer assignment
                        • API String ID: 614568839-2785691316
                        • Opcode ID: 326f6bdfedd770ba5ebede0782280512da980725671a3ed55922aefa06a9b454
                        • Instruction ID: 6481fd0b5a58fdb439f8d611910c53b6c632ad0c5a1118abe62a635174f0f90f
                        • Opcode Fuzzy Hash: 326f6bdfedd770ba5ebede0782280512da980725671a3ed55922aefa06a9b454
                        • Instruction Fuzzy Hash: 3E9119B1D00219DFDF15EFA4C891AEEB7B9BF08310F108669EA15A7291DB745A44CF60
                        APIs
                        • GetMenu.USER32(?), ref: 00712183
                        • GetMenuItemCount.USER32(00000000), ref: 007121B5
                        • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 007121DD
                        • _wcslen.LIBCMT ref: 00712213
                        • GetMenuItemID.USER32(?,?), ref: 0071224D
                        • GetSubMenu.USER32(?,?), ref: 0071225B
                          • Part of subcall function 006E3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 006E3A57
                          • Part of subcall function 006E3A3D: GetCurrentThreadId.KERNEL32 ref: 006E3A5E
                          • Part of subcall function 006E3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,006E25B3), ref: 006E3A65
                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 007122E3
                          • Part of subcall function 006EE97B: Sleep.KERNEL32 ref: 006EE9F3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                        • String ID:
                        • API String ID: 4196846111-0
                        • Opcode ID: d9a58a6cc141ec1b0f37d75dac523758c1271d268ada6a8038e927308b7a3d6e
                        • Instruction ID: 38131ba6427cfd56c6c27c477d72dceb3e427482c1726d865662ab9959fef2e8
                        • Opcode Fuzzy Hash: d9a58a6cc141ec1b0f37d75dac523758c1271d268ada6a8038e927308b7a3d6e
                        • Instruction Fuzzy Hash: A2718675A00205AFCB50EF68C845AEEB7F6FF48310F158459E916EB392D738ED528B90
                        APIs
                        • IsWindow.USER32(017F6500), ref: 00717F37
                        • IsWindowEnabled.USER32(017F6500), ref: 00717F43
                        • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 0071801E
                        • SendMessageW.USER32(017F6500,000000B0,?,?), ref: 00718051
                        • IsDlgButtonChecked.USER32(?,?), ref: 00718089
                        • GetWindowLongW.USER32(017F6500,000000EC), ref: 007180AB
                        • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 007180C3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                        • String ID:
                        • API String ID: 4072528602-0
                        • Opcode ID: f80c561b8fcc5504411bfe792e53bebed0b9b2878a3ee638697117e6538c3b85
                        • Instruction ID: c66fd741bb73e44eb83e45b6e760c13c57f5ade81330bcb25f46943067528213
                        • Opcode Fuzzy Hash: f80c561b8fcc5504411bfe792e53bebed0b9b2878a3ee638697117e6538c3b85
                        • Instruction Fuzzy Hash: 06719274608208AFEB259F68CC84FEB7BB9EF09300F144459E945572E1CB39AD86DB11
                        APIs
                        • GetParent.USER32(?), ref: 006EAEF9
                        • GetKeyboardState.USER32(?), ref: 006EAF0E
                        • SetKeyboardState.USER32(?), ref: 006EAF6F
                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 006EAF9D
                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 006EAFBC
                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 006EAFFD
                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 006EB020
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessagePost$KeyboardState$Parent
                        • String ID:
                        • API String ID: 87235514-0
                        • Opcode ID: a1a478286591f5fa41b490d1c080dabedd2bb393e0416fa4e09637fb65e44d4a
                        • Instruction ID: e37a96f580c1696ed861e4c37be6151c42758491c6d52930e6b47a3eb62edd75
                        • Opcode Fuzzy Hash: a1a478286591f5fa41b490d1c080dabedd2bb393e0416fa4e09637fb65e44d4a
                        • Instruction Fuzzy Hash: E051DFB06157D53DFB3683768845BFBBEAA5B06304F088489E1D9469C2C398BCC8D751
                        APIs
                        • GetParent.USER32(00000000), ref: 006EAD19
                        • GetKeyboardState.USER32(?), ref: 006EAD2E
                        • SetKeyboardState.USER32(?), ref: 006EAD8F
                        • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 006EADBB
                        • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 006EADD8
                        • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 006EAE17
                        • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 006EAE38
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessagePost$KeyboardState$Parent
                        • String ID:
                        • API String ID: 87235514-0
                        • Opcode ID: 9927f635ea3961094473d9d63070f8ec6ec093594250591808690812ad52ede5
                        • Instruction ID: 8e7cddd378797a9761e259e51b1171c8171bc7a1b6de93f9c0f1b38b2f332db1
                        • Opcode Fuzzy Hash: 9927f635ea3961094473d9d63070f8ec6ec093594250591808690812ad52ede5
                        • Instruction Fuzzy Hash: 5C51F6B15067D53DFB3383B68C95BFA7EAA5F46300F088588E1D5469C2D294FC88E762
                        APIs
                        • GetConsoleCP.KERNEL32(006C3CD6,?,?,?,?,?,?,?,?,006B5BA3,?,?,006C3CD6,?,?), ref: 006B5470
                        • __fassign.LIBCMT ref: 006B54EB
                        • __fassign.LIBCMT ref: 006B5506
                        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,006C3CD6,00000005,00000000,00000000), ref: 006B552C
                        • WriteFile.KERNEL32(?,006C3CD6,00000000,006B5BA3,00000000,?,?,?,?,?,?,?,?,?,006B5BA3,?), ref: 006B554B
                        • WriteFile.KERNEL32(?,?,00000001,006B5BA3,00000000,?,?,?,?,?,?,?,?,?,006B5BA3,?), ref: 006B5584
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                        • String ID:
                        • API String ID: 1324828854-0
                        • Opcode ID: 2a39e10e8328d26c999189c028c9e39a26d802535d2702bf078a259d5c6b83cf
                        • Instruction ID: 150b3b5a47e492c8b9216f2e71d6c203faf4bdcdbc55dae17d3a741ea7496227
                        • Opcode Fuzzy Hash: 2a39e10e8328d26c999189c028c9e39a26d802535d2702bf078a259d5c6b83cf
                        • Instruction Fuzzy Hash: CA51E7B1A006489FDB21CFA8D841BEEBBF6EF09301F14415AF556E7391D7309A81CB64
                        APIs
                          • Part of subcall function 0070304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0070307A
                          • Part of subcall function 0070304E: _wcslen.LIBCMT ref: 0070309B
                        • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00701112
                        • WSAGetLastError.WSOCK32 ref: 00701121
                        • WSAGetLastError.WSOCK32 ref: 007011C9
                        • closesocket.WSOCK32(00000000), ref: 007011F9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                        • String ID:
                        • API String ID: 2675159561-0
                        • Opcode ID: 2a2aebfa40af6f54154a7f1823a62d25d777258266250ea7f0f3858802e1f8a0
                        • Instruction ID: 124a04a0cdda0206c03ed154fe48af5158256b816f7847a10875c062c1c95df1
                        • Opcode Fuzzy Hash: 2a2aebfa40af6f54154a7f1823a62d25d777258266250ea7f0f3858802e1f8a0
                        • Instruction Fuzzy Hash: AC41E431600208EFDB159F58C884BAAB7EAEF45324F14C259F915AB2D1C778ED41CBE5
                        APIs
                          • Part of subcall function 006EDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,006ECF22,?), ref: 006EDDFD
                          • Part of subcall function 006EDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,006ECF22,?), ref: 006EDE16
                        • lstrcmpiW.KERNEL32(?,?), ref: 006ECF45
                        • MoveFileW.KERNEL32(?,?), ref: 006ECF7F
                        • _wcslen.LIBCMT ref: 006ED005
                        • _wcslen.LIBCMT ref: 006ED01B
                        • SHFileOperationW.SHELL32(?), ref: 006ED061
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                        • String ID: \*.*
                        • API String ID: 3164238972-1173974218
                        • Opcode ID: 13afc841235b2acce1d917224c451f088662a5afb668b43c43f0ef54c993bdc5
                        • Instruction ID: b96c8d9a005d8d0581ca537979cc035a848fc59f328426b696e1758ff8fafa6b
                        • Opcode Fuzzy Hash: 13afc841235b2acce1d917224c451f088662a5afb668b43c43f0ef54c993bdc5
                        • Instruction Fuzzy Hash: 354165718462585FDF52EFA5C981ADEB7BAAF48380F0000EAE505EB141EA35AA85CB54
                        APIs
                        • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00712E1C
                        • GetWindowLongW.USER32(?,000000F0), ref: 00712E4F
                        • GetWindowLongW.USER32(?,000000F0), ref: 00712E84
                        • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00712EB6
                        • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00712EE0
                        • GetWindowLongW.USER32(?,000000F0), ref: 00712EF1
                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00712F0B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: LongWindow$MessageSend
                        • String ID:
                        • API String ID: 2178440468-0
                        • Opcode ID: f3599b340026dc8180377db5382315b58875608677ec69db9b415dfbe9db4cf7
                        • Instruction ID: 4e12fd4c02ef8b08aa98209cd2ef2d9f0c7b31a5501e3d2413090057c759312d
                        • Opcode Fuzzy Hash: f3599b340026dc8180377db5382315b58875608677ec69db9b415dfbe9db4cf7
                        • Instruction Fuzzy Hash: 3131F430644250AFDB218F5CDC88FE537E5EB4A711F1581A4F9108B2F2CB79ACA59B45
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 006E7769
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 006E778F
                        • SysAllocString.OLEAUT32(00000000), ref: 006E7792
                        • SysAllocString.OLEAUT32(?), ref: 006E77B0
                        • SysFreeString.OLEAUT32(?), ref: 006E77B9
                        • StringFromGUID2.OLE32(?,?,00000028), ref: 006E77DE
                        • SysAllocString.OLEAUT32(?), ref: 006E77EC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                        • String ID:
                        • API String ID: 3761583154-0
                        • Opcode ID: 7057cdf5f5265884aa4417fcb990d66bcafdeba750fe46df1a87214fd46b4238
                        • Instruction ID: 9f3fe8a45c5410c861992a0016868ea1406063be7ca39b759006f292c65dc2f3
                        • Opcode Fuzzy Hash: 7057cdf5f5265884aa4417fcb990d66bcafdeba750fe46df1a87214fd46b4238
                        • Instruction Fuzzy Hash: 6621AE76609259AFDF10DFADCC88CFB77ADEB093647148025FA04DB290D674DC428764
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 006E7842
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 006E7868
                        • SysAllocString.OLEAUT32(00000000), ref: 006E786B
                        • SysAllocString.OLEAUT32 ref: 006E788C
                        • SysFreeString.OLEAUT32 ref: 006E7895
                        • StringFromGUID2.OLE32(?,?,00000028), ref: 006E78AF
                        • SysAllocString.OLEAUT32(?), ref: 006E78BD
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                        • String ID:
                        • API String ID: 3761583154-0
                        • Opcode ID: 2fdc18ea4284a7f0f1888733e09c8618ab92b978f092cd8b1ed662aaa76c5902
                        • Instruction ID: 387428cb7e2023dabb04c5c9d2545ec66f37472887052335c373b2af2b26d3be
                        • Opcode Fuzzy Hash: 2fdc18ea4284a7f0f1888733e09c8618ab92b978f092cd8b1ed662aaa76c5902
                        • Instruction Fuzzy Hash: 9F21AC71609254AFAB10ABE9CC88DEB77ADEB18360710C125F914CB2A0DA74DC41CB68
                        APIs
                        • GetStdHandle.KERNEL32(0000000C), ref: 006F04F2
                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 006F052E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CreateHandlePipe
                        • String ID: nul
                        • API String ID: 1424370930-2873401336
                        • Opcode ID: d229e299374b29e662c90286bb49b57a399eeb4d6c31a441690eb8b9d9c310f4
                        • Instruction ID: cac877980728add3e16f8967f30f354e6ba8f630fc8667d6580abfd924290644
                        • Opcode Fuzzy Hash: d229e299374b29e662c90286bb49b57a399eeb4d6c31a441690eb8b9d9c310f4
                        • Instruction Fuzzy Hash: F22162B5500309ABEF209F69DD44AEA77A5BF44724F208A19F9A1D72E1D7B0D940CF20
                        APIs
                        • GetStdHandle.KERNEL32(000000F6), ref: 006F05C6
                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 006F0601
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CreateHandlePipe
                        • String ID: nul
                        • API String ID: 1424370930-2873401336
                        • Opcode ID: 1f443c4c0ef56ec29281ded37fdb138da86182a2f3fa2c68fa35f6ae22ef9f43
                        • Instruction ID: a761fc742800d7fbd7ea8e995385474b82bf028474781b55436e52f44aca931a
                        • Opcode Fuzzy Hash: 1f443c4c0ef56ec29281ded37fdb138da86182a2f3fa2c68fa35f6ae22ef9f43
                        • Instruction Fuzzy Hash: 7021B5756003199BEB208F68CC04AEA77E5BF85720F204A19FEA1E73D1D7B09860CB14
                        APIs
                          • Part of subcall function 0068600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0068604C
                          • Part of subcall function 0068600E: GetStockObject.GDI32(00000011), ref: 00686060
                          • Part of subcall function 0068600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0068606A
                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00714112
                        • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0071411F
                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0071412A
                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00714139
                        • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00714145
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessageSend$CreateObjectStockWindow
                        • String ID: Msctls_Progress32
                        • API String ID: 1025951953-3636473452
                        • Opcode ID: b243b194c84b3fad6b5794ce6f4d683a0bc582f5ceff40b9be6ad22cda117151
                        • Instruction ID: cee2de49cd01391ec357ff75073319eaf161c16bd5ec288acc88538ccbc0ba2e
                        • Opcode Fuzzy Hash: b243b194c84b3fad6b5794ce6f4d683a0bc582f5ceff40b9be6ad22cda117151
                        • Instruction Fuzzy Hash: C211B6B214021DBEEF119F68CC85EE77F6DEF09798F004110F618A6090C7769C61DBA4
                        APIs
                          • Part of subcall function 006BD7A3: _free.LIBCMT ref: 006BD7CC
                        • _free.LIBCMT ref: 006BD82D
                          • Part of subcall function 006B29C8: HeapFree.KERNEL32(00000000,00000000,?,006BD7D1,00000000,00000000,00000000,00000000,?,006BD7F8,00000000,00000007,00000000,?,006BDBF5,00000000), ref: 006B29DE
                          • Part of subcall function 006B29C8: GetLastError.KERNEL32(00000000,?,006BD7D1,00000000,00000000,00000000,00000000,?,006BD7F8,00000000,00000007,00000000,?,006BDBF5,00000000,00000000), ref: 006B29F0
                        • _free.LIBCMT ref: 006BD838
                        • _free.LIBCMT ref: 006BD843
                        • _free.LIBCMT ref: 006BD897
                        • _free.LIBCMT ref: 006BD8A2
                        • _free.LIBCMT ref: 006BD8AD
                        • _free.LIBCMT ref: 006BD8B8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                        • Instruction ID: ee9af1d6bcde403effaffd5558156c86d751c2b2f51bcc9dc861482476ba4c44
                        • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                        • Instruction Fuzzy Hash: DA112CB1540B04BAD5A1BFB1CC46FCB7BDE6F00700F400C29B29DAA092EA65E5854754
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 006EDA74
                        • LoadStringW.USER32(00000000), ref: 006EDA7B
                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 006EDA91
                        • LoadStringW.USER32(00000000), ref: 006EDA98
                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 006EDADC
                        Strings
                        • %s (%d) : ==> %s: %s %s, xrefs: 006EDAB9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: HandleLoadModuleString$Message
                        • String ID: %s (%d) : ==> %s: %s %s
                        • API String ID: 4072794657-3128320259
                        • Opcode ID: af5afefcdabb3e016a2233f3dd747e2dc732979607eaacbb00c076fa9676c265
                        • Instruction ID: 77036e3220ca43acb28963701db0bce54e222be394f3b36d1438a2f38989627e
                        • Opcode Fuzzy Hash: af5afefcdabb3e016a2233f3dd747e2dc732979607eaacbb00c076fa9676c265
                        • Instruction Fuzzy Hash: BE0186F65403087FE7119BE8DD89EE7336CEB08701F4084A5B706E6081E6789E844F78
                        APIs
                        • InterlockedExchange.KERNEL32(017EF978,017EF978), ref: 006F097B
                        • EnterCriticalSection.KERNEL32(017EF958,00000000), ref: 006F098D
                        • TerminateThread.KERNEL32(?,000001F6), ref: 006F099B
                        • WaitForSingleObject.KERNEL32(?,000003E8), ref: 006F09A9
                        • CloseHandle.KERNEL32(?), ref: 006F09B8
                        • InterlockedExchange.KERNEL32(017EF978,000001F6), ref: 006F09C8
                        • LeaveCriticalSection.KERNEL32(017EF958), ref: 006F09CF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                        • String ID:
                        • API String ID: 3495660284-0
                        • Opcode ID: fcbf016d7326592194def83e9aa3d3d1dbb1101a38d204547dd36e5b42217e18
                        • Instruction ID: e2176d0be22cd4ca7a9741ac789b70c312f3e25a46f593611189169898f9a22f
                        • Opcode Fuzzy Hash: fcbf016d7326592194def83e9aa3d3d1dbb1101a38d204547dd36e5b42217e18
                        • Instruction Fuzzy Hash: B6F0E131482612BBE7525FD8EE8DBE67B36FF05702F40A015F201508E1D7799565CF94
                        APIs
                        • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00701DC0
                        • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00701DE1
                        • WSAGetLastError.WSOCK32 ref: 00701DF2
                        • htons.WSOCK32(?,?,?,?,?), ref: 00701EDB
                        • inet_ntoa.WSOCK32(?), ref: 00701E8C
                          • Part of subcall function 006E39E8: _strlen.LIBCMT ref: 006E39F2
                          • Part of subcall function 00703224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,006FEC0C), ref: 00703240
                        • _strlen.LIBCMT ref: 00701F35
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                        • String ID:
                        • API String ID: 3203458085-0
                        • Opcode ID: 33d360c2c0541fe777110ed2d4041527ff5fd6fd69a223e3af34e51bec414569
                        • Instruction ID: ae81d2f06809abfc50c0375a1a96ef80afba9e9d0064574990a8b2c683fe6302
                        • Opcode Fuzzy Hash: 33d360c2c0541fe777110ed2d4041527ff5fd6fd69a223e3af34e51bec414569
                        • Instruction Fuzzy Hash: C9B10370204301EFD724EF24C895E2A7BE6AF85318F948A4CF5565B2E2DB35ED42CB91
                        APIs
                        • GetClientRect.USER32(?,?), ref: 00685D30
                        • GetWindowRect.USER32(?,?), ref: 00685D71
                        • ScreenToClient.USER32(?,?), ref: 00685D99
                        • GetClientRect.USER32(?,?), ref: 00685ED7
                        • GetWindowRect.USER32(?,?), ref: 00685EF8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Rect$Client$Window$Screen
                        • String ID:
                        • API String ID: 1296646539-0
                        • Opcode ID: e036bc2e005ea1567e1f8f60562ad6d8fcb17dca5392fe896dced60427084ed2
                        • Instruction ID: e5d2108fb8e654e013371c0024b66ea80e7427769d0a769078768433e40c0dd1
                        • Opcode Fuzzy Hash: e036bc2e005ea1567e1f8f60562ad6d8fcb17dca5392fe896dced60427084ed2
                        • Instruction Fuzzy Hash: 74B16A34A0074ADBDB10DFA9C844BEAB7F2FF58310F14851AE8AAD7250DB34EA51DB54
                        APIs
                        • __allrem.LIBCMT ref: 006B00BA
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006B00D6
                        • __allrem.LIBCMT ref: 006B00ED
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006B010B
                        • __allrem.LIBCMT ref: 006B0122
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006B0140
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                        • String ID:
                        • API String ID: 1992179935-0
                        • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                        • Instruction ID: 53b26c59451b950ee10819ae8761759ac3693a4034de502da4d62ba5da1c813b
                        • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                        • Instruction Fuzzy Hash: D281D4B1A007069FE724AFA8CC41BEB77EAAF46364F24413EF551D6281E770DD808B55
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,006A82D9,006A82D9,?,?,?,006B644F,00000001,00000001,8BE85006), ref: 006B6258
                        • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,006B644F,00000001,00000001,8BE85006,?,?,?), ref: 006B62DE
                        • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 006B63D8
                        • __freea.LIBCMT ref: 006B63E5
                          • Part of subcall function 006B3820: RtlAllocateHeap.NTDLL(00000000,?,00751444,?,0069FDF5,?,?,0068A976,00000010,00751440,006813FC,?,006813C6,?,00681129), ref: 006B3852
                        • __freea.LIBCMT ref: 006B63EE
                        • __freea.LIBCMT ref: 006B6413
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide__freea$AllocateHeap
                        • String ID:
                        • API String ID: 1414292761-0
                        • Opcode ID: 01a26788420023522c40870bc8479b09d494f8f0b5a3bcef5ff436c9bddad19a
                        • Instruction ID: 6c8ccaa726430f9c8cb43e5b0a1d36fbf0506a773985fd6d09c48e385297f2a5
                        • Opcode Fuzzy Hash: 01a26788420023522c40870bc8479b09d494f8f0b5a3bcef5ff436c9bddad19a
                        • Instruction Fuzzy Hash: BF51BFB2A10216ABEB258F64DC81EEF77ABEB44750F144629FC05D6240EB38DDC5C760
                        APIs
                          • Part of subcall function 00689CB3: _wcslen.LIBCMT ref: 00689CBD
                          • Part of subcall function 0070C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0070B6AE,?,?), ref: 0070C9B5
                          • Part of subcall function 0070C998: _wcslen.LIBCMT ref: 0070C9F1
                          • Part of subcall function 0070C998: _wcslen.LIBCMT ref: 0070CA68
                          • Part of subcall function 0070C998: _wcslen.LIBCMT ref: 0070CA9E
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0070BCCA
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0070BD25
                        • RegCloseKey.ADVAPI32(00000000), ref: 0070BD6A
                        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0070BD99
                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0070BDF3
                        • RegCloseKey.ADVAPI32(?), ref: 0070BDFF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                        • String ID:
                        • API String ID: 1120388591-0
                        • Opcode ID: fc9ba654c574b048588b74f7e508bb3defbcb4b5da4228ef74c2555a830758ca
                        • Instruction ID: 93ad06f781e7d39348a3a64ce7163b7e8983dcdf0837e74d43265ddadb03ed4a
                        • Opcode Fuzzy Hash: fc9ba654c574b048588b74f7e508bb3defbcb4b5da4228ef74c2555a830758ca
                        • Instruction Fuzzy Hash: BB81C270218241EFD714DF64C885E2ABBE5FF84308F148A5CF5558B2A2DB35EE45CB92
                        APIs
                        • VariantInit.OLEAUT32(00000035), ref: 006DF7B9
                        • SysAllocString.OLEAUT32(00000001), ref: 006DF860
                        • VariantCopy.OLEAUT32(006DFA64,00000000), ref: 006DF889
                        • VariantClear.OLEAUT32(006DFA64), ref: 006DF8AD
                        • VariantCopy.OLEAUT32(006DFA64,00000000), ref: 006DF8B1
                        • VariantClear.OLEAUT32(?), ref: 006DF8BB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Variant$ClearCopy$AllocInitString
                        • String ID:
                        • API String ID: 3859894641-0
                        • Opcode ID: b6ea9df7766c9164ba32a4430fc75fb1d1ad1b314a2937357671739fef9f8de0
                        • Instruction ID: fe0078295a75937c077d36584faa13c04f03bfdb22be7a905fe5f315274d11b1
                        • Opcode Fuzzy Hash: b6ea9df7766c9164ba32a4430fc75fb1d1ad1b314a2937357671739fef9f8de0
                        • Instruction Fuzzy Hash: 7551B531D40310BACF60AB65D8A5B69B3EAEF45310B24946BED07DF391DB708C41CB9A
                        APIs
                          • Part of subcall function 00687620: _wcslen.LIBCMT ref: 00687625
                          • Part of subcall function 00686B57: _wcslen.LIBCMT ref: 00686B6A
                        • GetOpenFileNameW.COMDLG32(00000058), ref: 006F94E5
                        • _wcslen.LIBCMT ref: 006F9506
                        • _wcslen.LIBCMT ref: 006F952D
                        • GetSaveFileNameW.COMDLG32(00000058), ref: 006F9585
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _wcslen$FileName$OpenSave
                        • String ID: X
                        • API String ID: 83654149-3081909835
                        • Opcode ID: 1820442443cc8c8f8acbd296525b2944a64454cdfe9b1100f46959d437d30669
                        • Instruction ID: 2982b47c8404c869f63387794b199cef7c00ff195b742cd0b4a409aff571e58b
                        • Opcode Fuzzy Hash: 1820442443cc8c8f8acbd296525b2944a64454cdfe9b1100f46959d437d30669
                        • Instruction Fuzzy Hash: 7BE1C2715083508FC754EF24C881B6AB7E6BF85310F04896DF9899B3A2DB31DD05CBA6
                        APIs
                          • Part of subcall function 00699BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00699BB2
                        • BeginPaint.USER32(?,?,?), ref: 00699241
                        • GetWindowRect.USER32(?,?), ref: 006992A5
                        • ScreenToClient.USER32(?,?), ref: 006992C2
                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 006992D3
                        • EndPaint.USER32(?,?,?,?,?), ref: 00699321
                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 006D71EA
                          • Part of subcall function 00699339: BeginPath.GDI32(00000000), ref: 00699357
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                        • String ID:
                        • API String ID: 3050599898-0
                        • Opcode ID: 0fb6e94f06c02b9006a24640b321e44882f04059372ff8dc158606cf62110d9b
                        • Instruction ID: dfc42a1788e5d0e33bfa1586a5878cce5ddcf27c287bf925c26c39db3e62525f
                        • Opcode Fuzzy Hash: 0fb6e94f06c02b9006a24640b321e44882f04059372ff8dc158606cf62110d9b
                        • Instruction Fuzzy Hash: 0741CC70104340AFDB21DF68CC84FEA7BAAEB46322F14422DF994872E1C774A845DB66
                        APIs
                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 006F080C
                        • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 006F0847
                        • EnterCriticalSection.KERNEL32(?), ref: 006F0863
                        • LeaveCriticalSection.KERNEL32(?), ref: 006F08DC
                        • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 006F08F3
                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 006F0921
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                        • String ID:
                        • API String ID: 3368777196-0
                        • Opcode ID: 3557d12f90ec9ee79f4b3b5853a8424966bcd6f4b1543acfaaf55cd2190feac6
                        • Instruction ID: 0a880e9ce27858ed652fe070519e128ba5d75d462eb4f46981f24c7e9adc7050
                        • Opcode Fuzzy Hash: 3557d12f90ec9ee79f4b3b5853a8424966bcd6f4b1543acfaaf55cd2190feac6
                        • Instruction Fuzzy Hash: 1041AF71A00209EFEF15AF54DC85AAA777AFF04300F1480A9ED00DA297DB74DE50DBA8
                        APIs
                        • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,006DF3AB,00000000,?,?,00000000,?,006D682C,00000004,00000000,00000000), ref: 0071824C
                        • EnableWindow.USER32(?,00000000), ref: 00718272
                        • ShowWindow.USER32(FFFFFFFF,00000000), ref: 007182D1
                        • ShowWindow.USER32(?,00000004), ref: 007182E5
                        • EnableWindow.USER32(?,00000001), ref: 0071830B
                        • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0071832F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Window$Show$Enable$MessageSend
                        • String ID:
                        • API String ID: 642888154-0
                        • Opcode ID: 74fd0e3bd4a204c28a9cf29e25b2ed13c11605c63a382ebf792121e0e0df3fac
                        • Instruction ID: ffab3f8c887d5b521be8264e9e658a1611425cf5963d8b18e57372cb8bb432e6
                        • Opcode Fuzzy Hash: 74fd0e3bd4a204c28a9cf29e25b2ed13c11605c63a382ebf792121e0e0df3fac
                        • Instruction Fuzzy Hash: 5041C734601644EFDB52CF18C899BE87BE0FB06715F1881A9E5184B2E2CB79AC81CB55
                        APIs
                        • IsWindowVisible.USER32(?), ref: 006E4C95
                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 006E4CB2
                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 006E4CEA
                        • _wcslen.LIBCMT ref: 006E4D08
                        • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 006E4D10
                        • _wcsstr.LIBVCRUNTIME ref: 006E4D1A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                        • String ID:
                        • API String ID: 72514467-0
                        • Opcode ID: ee0afe51d10b79505a52277bd1b0093b9377860f27562dfc687e4efe6df977b9
                        • Instruction ID: 8014d848c2163924a4d4d19856a8a1695dcc4d565923abfaf86880b731a2ee1f
                        • Opcode Fuzzy Hash: ee0afe51d10b79505a52277bd1b0093b9377860f27562dfc687e4efe6df977b9
                        • Instruction Fuzzy Hash: D3213832205340BBEB165B7AEC09EBB7BAEDF45750F10807DF805CB292EE65DC0196A4
                        APIs
                          • Part of subcall function 00683AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00683A97,?,?,00682E7F,?,?,?,00000000), ref: 00683AC2
                        • _wcslen.LIBCMT ref: 006F587B
                        • CoInitialize.OLE32(00000000), ref: 006F5995
                        • CoCreateInstance.OLE32(0071FCF8,00000000,00000001,0071FB68,?), ref: 006F59AE
                        • CoUninitialize.OLE32 ref: 006F59CC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                        • String ID: .lnk
                        • API String ID: 3172280962-24824748
                        • Opcode ID: c0a442705e8b6fc33ef1d5f5204cd7d985b77097c9543e6575dd769ec78f8b6a
                        • Instruction ID: e4a43098e479ce0c2f2d97be3abef8519738c41b0469876730445c95c9361e00
                        • Opcode Fuzzy Hash: c0a442705e8b6fc33ef1d5f5204cd7d985b77097c9543e6575dd769ec78f8b6a
                        • Instruction Fuzzy Hash: 4AD175706087059FC714EF28C49096ABBE6FF89710F14895DFA8A9B361DB31EC45CB92
                        APIs
                          • Part of subcall function 006E0FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 006E0FCA
                          • Part of subcall function 006E0FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 006E0FD6
                          • Part of subcall function 006E0FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 006E0FE5
                          • Part of subcall function 006E0FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 006E0FEC
                          • Part of subcall function 006E0FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 006E1002
                        • GetLengthSid.ADVAPI32(?,00000000,006E1335), ref: 006E17AE
                        • GetProcessHeap.KERNEL32(00000008,00000000), ref: 006E17BA
                        • HeapAlloc.KERNEL32(00000000), ref: 006E17C1
                        • CopySid.ADVAPI32(00000000,00000000,?), ref: 006E17DA
                        • GetProcessHeap.KERNEL32(00000000,00000000,006E1335), ref: 006E17EE
                        • HeapFree.KERNEL32(00000000), ref: 006E17F5
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                        • String ID:
                        • API String ID: 3008561057-0
                        • Opcode ID: 58510213004396f4bb23293734081c1eb8321b585e40d25d9603f2d415cf1812
                        • Instruction ID: 8f7ae52e931b32b12c7ad77eb481f6b6a2a1a2e693b1d9f8dd4afd12fbff61a5
                        • Opcode Fuzzy Hash: 58510213004396f4bb23293734081c1eb8321b585e40d25d9603f2d415cf1812
                        • Instruction Fuzzy Hash: 4611AC71582305FFDF119FA9CC49BEE7BBAEB46755F108018F8819B250C739AA40EB60
                        APIs
                        • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 006E14FF
                        • OpenProcessToken.ADVAPI32(00000000), ref: 006E1506
                        • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 006E1515
                        • CloseHandle.KERNEL32(00000004), ref: 006E1520
                        • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 006E154F
                        • DestroyEnvironmentBlock.USERENV(00000000), ref: 006E1563
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                        • String ID:
                        • API String ID: 1413079979-0
                        • Opcode ID: e437b29b8446f7de3bbb8a1958dc0780346683a282b10c341f1a9c125749e41d
                        • Instruction ID: fc2212456d7924521b2e1e575b34fb74803b85da2c514f3cba3ca4148ca86534
                        • Opcode Fuzzy Hash: e437b29b8446f7de3bbb8a1958dc0780346683a282b10c341f1a9c125749e41d
                        • Instruction Fuzzy Hash: 911159B250124DEBDF12CFD8DD49BDE7BAAEF49704F048014FA05A61A0C3758E60EB61
                        APIs
                        • GetLastError.KERNEL32(?,?,006A3379,006A2FE5), ref: 006A3390
                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 006A339E
                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 006A33B7
                        • SetLastError.KERNEL32(00000000,?,006A3379,006A2FE5), ref: 006A3409
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ErrorLastValue___vcrt_
                        • String ID:
                        • API String ID: 3852720340-0
                        • Opcode ID: 9ebb548d0a8cec48772a18be11652c18fe021c1872186c4b064281f9d1453ddf
                        • Instruction ID: c98b57a717b1b0220f1afa200dc4310de5628cbe6901d9a88b8d17e0eab5092c
                        • Opcode Fuzzy Hash: 9ebb548d0a8cec48772a18be11652c18fe021c1872186c4b064281f9d1453ddf
                        • Instruction Fuzzy Hash: E701473360E331BEAAA637B47C855A72A96EB17379320822EF420843F1EF254D025D4C
                        APIs
                        • GetLastError.KERNEL32(?,?,006B5686,006C3CD6,?,00000000,?,006B5B6A,?,?,?,?,?,006AE6D1,?,00748A48), ref: 006B2D78
                        • _free.LIBCMT ref: 006B2DAB
                        • _free.LIBCMT ref: 006B2DD3
                        • SetLastError.KERNEL32(00000000,?,?,?,?,006AE6D1,?,00748A48,00000010,00684F4A,?,?,00000000,006C3CD6), ref: 006B2DE0
                        • SetLastError.KERNEL32(00000000,?,?,?,?,006AE6D1,?,00748A48,00000010,00684F4A,?,?,00000000,006C3CD6), ref: 006B2DEC
                        • _abort.LIBCMT ref: 006B2DF2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ErrorLast$_free$_abort
                        • String ID:
                        • API String ID: 3160817290-0
                        • Opcode ID: d9055f4e60ec802e3d996fef28b4535ef06c297036d191e4b2845360677ef2c0
                        • Instruction ID: 5668c018185f397804fcb59b8545e5099a2bd070d7218dccb895a83e72bb1d73
                        • Opcode Fuzzy Hash: d9055f4e60ec802e3d996fef28b4535ef06c297036d191e4b2845360677ef2c0
                        • Instruction Fuzzy Hash: 03F02DF554561227C6533778BC36EDA15D76FC77A1F20851CF824922D6DF3888C14369
                        APIs
                          • Part of subcall function 00699639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00699693
                          • Part of subcall function 00699639: SelectObject.GDI32(?,00000000), ref: 006996A2
                          • Part of subcall function 00699639: BeginPath.GDI32(?), ref: 006996B9
                          • Part of subcall function 00699639: SelectObject.GDI32(?,00000000), ref: 006996E2
                        • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00718A4E
                        • LineTo.GDI32(?,00000003,00000000), ref: 00718A62
                        • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00718A70
                        • LineTo.GDI32(?,00000000,00000003), ref: 00718A80
                        • EndPath.GDI32(?), ref: 00718A90
                        • StrokePath.GDI32(?), ref: 00718AA0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                        • String ID:
                        • API String ID: 43455801-0
                        • Opcode ID: f15fc88aeab7e1bf5583227533f806a7bfc5a1ecb5b0a981851b11fa9d157100
                        • Instruction ID: e43d4383d656213f3230c01d313f7e31318b03dd7941d4fd03ff1a66e0f69c10
                        • Opcode Fuzzy Hash: f15fc88aeab7e1bf5583227533f806a7bfc5a1ecb5b0a981851b11fa9d157100
                        • Instruction Fuzzy Hash: 5A11F77604014CFFEB129F98DC88EEA7F6DEB08351F00C012BA199A1A1C775AD55DBA4
                        APIs
                        • GetDC.USER32(00000000), ref: 006E5218
                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 006E5229
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 006E5230
                        • ReleaseDC.USER32(00000000,00000000), ref: 006E5238
                        • MulDiv.KERNEL32(000009EC,?,00000000), ref: 006E524F
                        • MulDiv.KERNEL32(000009EC,00000001,?), ref: 006E5261
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CapsDevice$Release
                        • String ID:
                        • API String ID: 1035833867-0
                        • Opcode ID: 4e99357ec633b7884b8c700044a5a550e45b2c3dfde506f9d94454720f9a3ea2
                        • Instruction ID: dac321222907d278baa8caf1080cfcd87ff91dae52aaee4940f7223bdf4c001d
                        • Opcode Fuzzy Hash: 4e99357ec633b7884b8c700044a5a550e45b2c3dfde506f9d94454720f9a3ea2
                        • Instruction Fuzzy Hash: AD018475E41708BBEB115BEA9C49A9EBF79EB48351F048065FA05A7380D670D900CB64
                        APIs
                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00681BF4
                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 00681BFC
                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00681C07
                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00681C12
                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 00681C1A
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00681C22
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Virtual
                        • String ID:
                        • API String ID: 4278518827-0
                        • Opcode ID: e37f887b9bd4edbf5c4018132e2701ab1c7baf1df362c0b6cc283c6b908872a4
                        • Instruction ID: 987e8bc580772fcd5b0f3daf1053374add1e05c21dd6d586d89d59b5cff9d54f
                        • Opcode Fuzzy Hash: e37f887b9bd4edbf5c4018132e2701ab1c7baf1df362c0b6cc283c6b908872a4
                        • Instruction Fuzzy Hash: 69016CB0942759BDE3008F5A8C85B52FFA8FF19354F00415B915C47941C7F5A864CBE5
                        APIs
                        • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 006EEB30
                        • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 006EEB46
                        • GetWindowThreadProcessId.USER32(?,?), ref: 006EEB55
                        • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 006EEB64
                        • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 006EEB6E
                        • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 006EEB75
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                        • String ID:
                        • API String ID: 839392675-0
                        • Opcode ID: 749af5f460ab83004f283c674e0377ee247bc0df6acd64fd6adde620904500be
                        • Instruction ID: 187a70c51407ca5b814e99fe8de7000aca235e38374d5c131e0937c42422420c
                        • Opcode Fuzzy Hash: 749af5f460ab83004f283c674e0377ee247bc0df6acd64fd6adde620904500be
                        • Instruction Fuzzy Hash: 63F09072180158BBE72257969C0EEEF3A7CEFCAB11F00C158F601D10D0D7A41A01C6B9
                        APIs
                        • GetClientRect.USER32(?), ref: 006D7452
                        • SendMessageW.USER32(?,00001328,00000000,?), ref: 006D7469
                        • GetWindowDC.USER32(?), ref: 006D7475
                        • GetPixel.GDI32(00000000,?,?), ref: 006D7484
                        • ReleaseDC.USER32(?,00000000), ref: 006D7496
                        • GetSysColor.USER32(00000005), ref: 006D74B0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ClientColorMessagePixelRectReleaseSendWindow
                        • String ID:
                        • API String ID: 272304278-0
                        • Opcode ID: 3c7dab1082661cf626203d4e3afa89eebb2691c50ed939a5abd90f2002e0cf2c
                        • Instruction ID: e207c7ef1499ca4f4bf5875f09255b207230df2a40bfd06364dfa7a310f208df
                        • Opcode Fuzzy Hash: 3c7dab1082661cf626203d4e3afa89eebb2691c50ed939a5abd90f2002e0cf2c
                        • Instruction Fuzzy Hash: DB018B31440215EFDB525FA8DC08BEE7BB6FB04311F6080A4F915A22E0DB352E51EB15
                        APIs
                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 006E187F
                        • UnloadUserProfile.USERENV(?,?), ref: 006E188B
                        • CloseHandle.KERNEL32(?), ref: 006E1894
                        • CloseHandle.KERNEL32(?), ref: 006E189C
                        • GetProcessHeap.KERNEL32(00000000,?), ref: 006E18A5
                        • HeapFree.KERNEL32(00000000), ref: 006E18AC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                        • String ID:
                        • API String ID: 146765662-0
                        • Opcode ID: b69629ccc40f74155e829f60c68f10cda70330dae8f1e8a574ea22e0614979b4
                        • Instruction ID: 7ebcda2de398e0c811609d7c93e9d953c2ffd6e4494c931173b1413c779fde9f
                        • Opcode Fuzzy Hash: b69629ccc40f74155e829f60c68f10cda70330dae8f1e8a574ea22e0614979b4
                        • Instruction Fuzzy Hash: F6E0ED76484215BBD7025FE9ED0C985BF39FF49721710C220F225810F0CB765420EF54
                        APIs
                        • __Init_thread_footer.LIBCMT ref: 0068BEB3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Init_thread_footer
                        • String ID: D%u$D%u$D%u$D%uD%u
                        • API String ID: 1385522511-690889655
                        • Opcode ID: acb79b2fe72ef4f23e965bac18e1899f6eba5c9ab3a47000fddd4c1749a12660
                        • Instruction ID: 8d208f336c3ff344af4244767700962a4131e777a37ef6668bd807836720901b
                        • Opcode Fuzzy Hash: acb79b2fe72ef4f23e965bac18e1899f6eba5c9ab3a47000fddd4c1749a12660
                        • Instruction Fuzzy Hash: D5912A75A0020ADFCB18DF58C0906AAB7F2FF59314F24926ED945AB351E771AD82CBD0
                        APIs
                          • Part of subcall function 006A0242: EnterCriticalSection.KERNEL32(0075070C,00751884,?,?,0069198B,00752518,?,?,?,006812F9,00000000), ref: 006A024D
                          • Part of subcall function 006A0242: LeaveCriticalSection.KERNEL32(0075070C,?,0069198B,00752518,?,?,?,006812F9,00000000), ref: 006A028A
                          • Part of subcall function 00689CB3: _wcslen.LIBCMT ref: 00689CBD
                          • Part of subcall function 006A00A3: __onexit.LIBCMT ref: 006A00A9
                        • __Init_thread_footer.LIBCMT ref: 00707BFB
                          • Part of subcall function 006A01F8: EnterCriticalSection.KERNEL32(0075070C,?,?,00698747,00752514), ref: 006A0202
                          • Part of subcall function 006A01F8: LeaveCriticalSection.KERNEL32(0075070C,?,00698747,00752514), ref: 006A0235
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                        • String ID: +Tm$5$G$Variable must be of type 'Object'.
                        • API String ID: 535116098-2641281785
                        • Opcode ID: a88886367b195687377a8936890a0e672938e22dfd5b84a207e710cc671ff880
                        • Instruction ID: fc56407f3ccc7c658cec2e98696e2266a759aa0d5623c03c33245e207cb4318e
                        • Opcode Fuzzy Hash: a88886367b195687377a8936890a0e672938e22dfd5b84a207e710cc671ff880
                        • Instruction Fuzzy Hash: 24918C70A04209EFDB08EF94D8919BEB7F6BF45300F14825DF8069B292DB75AE45CB61
                        APIs
                          • Part of subcall function 00687620: _wcslen.LIBCMT ref: 00687625
                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 006EC6EE
                        • _wcslen.LIBCMT ref: 006EC735
                        • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 006EC79C
                        • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 006EC7CA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ItemMenu$Info_wcslen$Default
                        • String ID: 0
                        • API String ID: 1227352736-4108050209
                        • Opcode ID: fc9b9dd163dc54143a1af07060553643d70ad0920835d9894addd834be596b98
                        • Instruction ID: 2195470ebfde3f4585a68f69f373667d19d0bf8b18e9de91cfd354079b796a9b
                        • Opcode Fuzzy Hash: fc9b9dd163dc54143a1af07060553643d70ad0920835d9894addd834be596b98
                        • Instruction Fuzzy Hash: 1D51F3716063809BDB509F2AC845BEB7BEAAF49320F040A2DF991D32D0DB74DC068F56
                        APIs
                        • ShellExecuteExW.SHELL32(0000003C), ref: 0070AEA3
                          • Part of subcall function 00687620: _wcslen.LIBCMT ref: 00687625
                        • GetProcessId.KERNEL32(00000000), ref: 0070AF38
                        • CloseHandle.KERNEL32(00000000), ref: 0070AF67
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CloseExecuteHandleProcessShell_wcslen
                        • String ID: <$@
                        • API String ID: 146682121-1426351568
                        • Opcode ID: a2851ffa689a4e8e02a945fe842d4a73336699551b36204f6c29951c8caf7974
                        • Instruction ID: 13025ad5ec9c569af676e2896d174d4b9d70b931692ddce68a10138d22cf6a1b
                        • Opcode Fuzzy Hash: a2851ffa689a4e8e02a945fe842d4a73336699551b36204f6c29951c8caf7974
                        • Instruction Fuzzy Hash: 78717A71A00215EFCB14EF54C485A9EBBF1BF08314F14869DE816AB792CB78ED41CBA5
                        APIs
                        • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 006E7206
                        • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 006E723C
                        • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 006E724D
                        • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 006E72CF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ErrorMode$AddressCreateInstanceProc
                        • String ID: DllGetClassObject
                        • API String ID: 753597075-1075368562
                        • Opcode ID: 6f8fd947a0b4811f1311101ac0fef1d2fe327824a2916b7e873f35d16fa52493
                        • Instruction ID: 4bed613c6ea28118f4be66c1422bb9a0057a136577c6f3968e7b75c64df7c759
                        • Opcode Fuzzy Hash: 6f8fd947a0b4811f1311101ac0fef1d2fe327824a2916b7e873f35d16fa52493
                        • Instruction Fuzzy Hash: 1E418EB1A05345EFDB15CF95C884A9A7BAAEF44310F1480ADFE059F24AD7B4DA41CBA0
                        APIs
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00713E35
                        • IsMenu.USER32(?), ref: 00713E4A
                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00713E92
                        • DrawMenuBar.USER32 ref: 00713EA5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Menu$Item$DrawInfoInsert
                        • String ID: 0
                        • API String ID: 3076010158-4108050209
                        • Opcode ID: e9b2d2c6369d72d2adcb8ec513a723250beb0419c24517e998cc0198aacc29bb
                        • Instruction ID: 7f3186949d1d138b36094bf3288b1d957aabc1dd00f945437af8dbae717056c9
                        • Opcode Fuzzy Hash: e9b2d2c6369d72d2adcb8ec513a723250beb0419c24517e998cc0198aacc29bb
                        • Instruction Fuzzy Hash: 6D414C75A00309EFDB10DF58D884ADABBB5FF45351F048119E915A7290D738AE98CF50
                        APIs
                          • Part of subcall function 00689CB3: _wcslen.LIBCMT ref: 00689CBD
                          • Part of subcall function 006E3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 006E3CCA
                        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 006E1E66
                        • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 006E1E79
                        • SendMessageW.USER32(?,00000189,?,00000000), ref: 006E1EA9
                          • Part of subcall function 00686B57: _wcslen.LIBCMT ref: 00686B6A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessageSend$_wcslen$ClassName
                        • String ID: ComboBox$ListBox
                        • API String ID: 2081771294-1403004172
                        • Opcode ID: 0738c4938dadb3801ae2851e8012d537959fb20846edcdbd997354ec6a5138ad
                        • Instruction ID: c2ad923494881778a7f2cbb93f356cc0dcd6888772cacb873ecbae678979f37e
                        • Opcode Fuzzy Hash: 0738c4938dadb3801ae2851e8012d537959fb20846edcdbd997354ec6a5138ad
                        • Instruction Fuzzy Hash: A92149B1A41244BFDB14ABB5CC49CFFB7BADF42350B14411DF821AB2E1DB3849069B20
                        APIs
                        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00712F8D
                        • LoadLibraryW.KERNEL32(?), ref: 00712F94
                        • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00712FA9
                        • DestroyWindow.USER32(?), ref: 00712FB1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessageSend$DestroyLibraryLoadWindow
                        • String ID: SysAnimate32
                        • API String ID: 3529120543-1011021900
                        • Opcode ID: af586b2f070dc83322e53e91a351ffe6f529afbd154ab64f1b8492d25c480e1d
                        • Instruction ID: 2dff48dcc5b6d1cc1812fed2dc954fa99f6e3fc302afa225060361e9a120676c
                        • Opcode Fuzzy Hash: af586b2f070dc83322e53e91a351ffe6f529afbd154ab64f1b8492d25c480e1d
                        • Instruction Fuzzy Hash: 5521AC71204209ABEB114FA8DC84EFB37BDEB59364F108618FA50D61E1D779DCA39760
                        APIs
                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,006A4D1E,006B28E9,?,006A4CBE,006B28E9,007488B8,0000000C,006A4E15,006B28E9,00000002), ref: 006A4D8D
                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 006A4DA0
                        • FreeLibrary.KERNEL32(00000000,?,?,?,006A4D1E,006B28E9,?,006A4CBE,006B28E9,007488B8,0000000C,006A4E15,006B28E9,00000002,00000000), ref: 006A4DC3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: AddressFreeHandleLibraryModuleProc
                        • String ID: CorExitProcess$mscoree.dll
                        • API String ID: 4061214504-1276376045
                        • Opcode ID: f2212f92dad9e58cc4c8a4f9a4ddf40d24d1afe2fbed8afbf1cd8d6ba108283e
                        • Instruction ID: c34475ee7361d761fd4db62bfec2a17ec4405cad753efcc32d0607ee22383cb0
                        • Opcode Fuzzy Hash: f2212f92dad9e58cc4c8a4f9a4ddf40d24d1afe2fbed8afbf1cd8d6ba108283e
                        • Instruction Fuzzy Hash: 42F0A434580218BBDB116F94DC49BDDBBB5EF44711F008094F805A22A1CF745D40DE94
                        APIs
                        • LoadLibraryA.KERNEL32 ref: 006DD3AD
                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 006DD3BF
                        • FreeLibrary.KERNEL32(00000000), ref: 006DD3E5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: GetSystemWow64DirectoryW$X64
                        • API String ID: 145871493-2590602151
                        • Opcode ID: 49f8cec36df8716b373640e0943aabd17dc4fff204ce1146d6948ad1c5be952b
                        • Instruction ID: b68557f6c0b7d4d504311b8657a31fe57afe57569f4d02d2c64f7e4539b0edba
                        • Opcode Fuzzy Hash: 49f8cec36df8716b373640e0943aabd17dc4fff204ce1146d6948ad1c5be952b
                        • Instruction Fuzzy Hash: 01F05C70CC1620E7DB3237548C14DE972275F11702B56C057F901E1344D724CE408697
                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00684EDD,?,00751418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00684E9C
                        • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00684EAE
                        • FreeLibrary.KERNEL32(00000000,?,?,00684EDD,?,00751418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00684EC0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                        • API String ID: 145871493-3689287502
                        • Opcode ID: 91ca440c365584461b9633e19bb646de990eba3f725288012b0f1f0b84de5424
                        • Instruction ID: 84919cc9070ffc76ded7bcf50402dd9a429d9adc0c2f4ac1602639a308b5131e
                        • Opcode Fuzzy Hash: 91ca440c365584461b9633e19bb646de990eba3f725288012b0f1f0b84de5424
                        • Instruction Fuzzy Hash: 1EE0CD75A816236BD3332B6D6C1CBEF6655AF81F627058215FC04E2380DF68CD0151A4
                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?,006C3CDE,?,00751418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00684E62
                        • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00684E74
                        • FreeLibrary.KERNEL32(00000000,?,?,006C3CDE,?,00751418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00684E87
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                        • API String ID: 145871493-1355242751
                        • Opcode ID: c81ca259a61614a80a9dea477934e78fe486478b06966874598670669e336631
                        • Instruction ID: f0f54d3ac71940b0df3b3ac28171ac887267b23ef0a5f9026402d5c8f6e5da85
                        • Opcode Fuzzy Hash: c81ca259a61614a80a9dea477934e78fe486478b06966874598670669e336631
                        • Instruction Fuzzy Hash: 34D0C2715C26226746332B686C0CDCB6A1AAF81F113058210B804E2290CF28CD0192D4
                        APIs
                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 006F2C05
                        • DeleteFileW.KERNEL32(?), ref: 006F2C87
                        • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 006F2C9D
                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 006F2CAE
                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 006F2CC0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: File$Delete$Copy
                        • String ID:
                        • API String ID: 3226157194-0
                        • Opcode ID: e9c35e6d89773f04c2ac6a9b23c1f11bf71d5a537263b942bc8f187954557bfc
                        • Instruction ID: 1c57639abf560fc72c009150a2cfb805f146ed0e0344eb5593c1f7fbfd62157e
                        • Opcode Fuzzy Hash: e9c35e6d89773f04c2ac6a9b23c1f11bf71d5a537263b942bc8f187954557bfc
                        • Instruction Fuzzy Hash: 6CB13E71D0011DABDF51EBA4CC95EEEBBBEEF49350F1040AAF609E6141EA309E448F65
                        APIs
                        • GetCurrentProcessId.KERNEL32 ref: 0070A427
                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0070A435
                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0070A468
                        • CloseHandle.KERNEL32(?), ref: 0070A63D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Process$CloseCountersCurrentHandleOpen
                        • String ID:
                        • API String ID: 3488606520-0
                        • Opcode ID: 39868f2b07a7439e3718b71fe89d9f8227274aec4949fb7eb494f0ecc9b2c07c
                        • Instruction ID: caea2379d40cf4ca23973ea9f7f363bac3b6b27c24368877cd5f4d408c636608
                        • Opcode Fuzzy Hash: 39868f2b07a7439e3718b71fe89d9f8227274aec4949fb7eb494f0ecc9b2c07c
                        • Instruction Fuzzy Hash: 51A1D371604300AFE720DF28D886F2AB7E6AF84714F14891CF55A9B2D2D7B4EC40CB96
                        APIs
                        • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00723700), ref: 006BBB91
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,0075121C,000000FF,00000000,0000003F,00000000,?,?), ref: 006BBC09
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00751270,000000FF,?,0000003F,00000000,?), ref: 006BBC36
                        • _free.LIBCMT ref: 006BBB7F
                          • Part of subcall function 006B29C8: HeapFree.KERNEL32(00000000,00000000,?,006BD7D1,00000000,00000000,00000000,00000000,?,006BD7F8,00000000,00000007,00000000,?,006BDBF5,00000000), ref: 006B29DE
                          • Part of subcall function 006B29C8: GetLastError.KERNEL32(00000000,?,006BD7D1,00000000,00000000,00000000,00000000,?,006BD7F8,00000000,00000007,00000000,?,006BDBF5,00000000,00000000), ref: 006B29F0
                        • _free.LIBCMT ref: 006BBD4B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                        • String ID:
                        • API String ID: 1286116820-0
                        • Opcode ID: f1df6a6b2656d7c699bc0ec7101529df09562b40cee6d227272a79fa48b8a9d1
                        • Instruction ID: 2b7a9c9202178489bd5b41431e810686b6b02d0d6e64a94138f41ca80dbb69bd
                        • Opcode Fuzzy Hash: f1df6a6b2656d7c699bc0ec7101529df09562b40cee6d227272a79fa48b8a9d1
                        • Instruction Fuzzy Hash: BC51EAF1900209AFCB10EF65DC819EEBBBAFF41311F50526EE514D7291EBB49E818B58
                        APIs
                          • Part of subcall function 006EDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,006ECF22,?), ref: 006EDDFD
                          • Part of subcall function 006EDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,006ECF22,?), ref: 006EDE16
                          • Part of subcall function 006EE199: GetFileAttributesW.KERNEL32(?,006ECF95), ref: 006EE19A
                        • lstrcmpiW.KERNEL32(?,?), ref: 006EE473
                        • MoveFileW.KERNEL32(?,?), ref: 006EE4AC
                        • _wcslen.LIBCMT ref: 006EE5EB
                        • _wcslen.LIBCMT ref: 006EE603
                        • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 006EE650
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                        • String ID:
                        • API String ID: 3183298772-0
                        • Opcode ID: cc5b6b6fc4c77f6b2f83c48f608fcde6fba2a56d6f11c71bff5efde65c023a4a
                        • Instruction ID: 631248d7a1f5e24f9858376c85c08a505b96524cc63f9c8fdf8466efc2355da9
                        • Opcode Fuzzy Hash: cc5b6b6fc4c77f6b2f83c48f608fcde6fba2a56d6f11c71bff5efde65c023a4a
                        • Instruction Fuzzy Hash: D351B8B24093859BC764EB90DC81DDFB3EEAF85340F00491EF589D3191EF75A5888B6A
                        APIs
                          • Part of subcall function 00689CB3: _wcslen.LIBCMT ref: 00689CBD
                          • Part of subcall function 0070C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0070B6AE,?,?), ref: 0070C9B5
                          • Part of subcall function 0070C998: _wcslen.LIBCMT ref: 0070C9F1
                          • Part of subcall function 0070C998: _wcslen.LIBCMT ref: 0070CA68
                          • Part of subcall function 0070C998: _wcslen.LIBCMT ref: 0070CA9E
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0070BAA5
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0070BB00
                        • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0070BB63
                        • RegCloseKey.ADVAPI32(?,?), ref: 0070BBA6
                        • RegCloseKey.ADVAPI32(00000000), ref: 0070BBB3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                        • String ID:
                        • API String ID: 826366716-0
                        • Opcode ID: 565653633a5840fef39935675bddd869a254ed8e8d32f4b97ab25265168d60f1
                        • Instruction ID: 07f3325b520bcb8d98469b8224f6cee73071dfcfb48ec6ae8410391a85a88d40
                        • Opcode Fuzzy Hash: 565653633a5840fef39935675bddd869a254ed8e8d32f4b97ab25265168d60f1
                        • Instruction Fuzzy Hash: DA61A171208241EFD714DF64C890E2ABBE5FF84308F548A5CF4994B2A2DB35ED45CB92
                        APIs
                        • VariantInit.OLEAUT32(?), ref: 006E8BCD
                        • VariantClear.OLEAUT32 ref: 006E8C3E
                        • VariantClear.OLEAUT32 ref: 006E8C9D
                        • VariantClear.OLEAUT32(?), ref: 006E8D10
                        • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 006E8D3B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Variant$Clear$ChangeInitType
                        • String ID:
                        • API String ID: 4136290138-0
                        • Opcode ID: 6b6f5062cebdc857bc4f06a8bf8edcb0ce2413de66d6a5c44acf47da4bcb110f
                        • Instruction ID: c0ab9c55394f13cd458638fbd54e4e82bdbd633208cee970858ee69a8e82f4ad
                        • Opcode Fuzzy Hash: 6b6f5062cebdc857bc4f06a8bf8edcb0ce2413de66d6a5c44acf47da4bcb110f
                        • Instruction Fuzzy Hash: 3B5189B5A01259EFCB10CF69C884AAABBF9FF89310B158559E909DB350E734E911CF90
                        APIs
                        • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 006F8BAE
                        • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 006F8BDA
                        • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 006F8C32
                        • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 006F8C57
                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 006F8C5F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: PrivateProfile$SectionWrite$String
                        • String ID:
                        • API String ID: 2832842796-0
                        • Opcode ID: 32f385cc1e12d33ed894853b62f1012f229ab0494bfbd27e58aacbc817787a06
                        • Instruction ID: e162c3c27da46b94a7f746450c4e135b40e5e61dad1093efb32f44cdd0263faa
                        • Opcode Fuzzy Hash: 32f385cc1e12d33ed894853b62f1012f229ab0494bfbd27e58aacbc817787a06
                        • Instruction Fuzzy Hash: 5D515F35A002199FCB05DF54C881AADBBF6FF48314F08C498E949AB362CB35ED41CBA5
                        APIs
                        • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00708F40
                        • GetProcAddress.KERNEL32(00000000,?), ref: 00708FD0
                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00708FEC
                        • GetProcAddress.KERNEL32(00000000,?), ref: 00709032
                        • FreeLibrary.KERNEL32(00000000), ref: 00709052
                          • Part of subcall function 0069F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,006F1043,?,7529E610), ref: 0069F6E6
                          • Part of subcall function 0069F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,006DFA64,00000000,00000000,?,?,006F1043,?,7529E610,?,006DFA64), ref: 0069F70D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                        • String ID:
                        • API String ID: 666041331-0
                        • Opcode ID: 11259cfdbcf74c3564d433a2802d8485ca87b96f41d76b2618740a627b34470d
                        • Instruction ID: 44b17cb53cfefc509faa391df57bc977fa81b5d65d21e0483e08686afb26b037
                        • Opcode Fuzzy Hash: 11259cfdbcf74c3564d433a2802d8485ca87b96f41d76b2618740a627b34470d
                        • Instruction Fuzzy Hash: EE515F74600206DFCB55EF68C4848ADBBF1FF49314F088298E945AB3A2DB35ED85CB95
                        APIs
                        • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00716C33
                        • SetWindowLongW.USER32(?,000000EC,?), ref: 00716C4A
                        • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00716C73
                        • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,006FAB79,00000000,00000000), ref: 00716C98
                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00716CC7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Window$Long$MessageSendShow
                        • String ID:
                        • API String ID: 3688381893-0
                        • Opcode ID: 53d7e09270870840ecba1fbfb7971b7a18b8b6da50b559d5cacb423113c46804
                        • Instruction ID: c7158988340b6830d0bb6c646e9717466ffa69510f8b852065bddfbd37b9d64f
                        • Opcode Fuzzy Hash: 53d7e09270870840ecba1fbfb7971b7a18b8b6da50b559d5cacb423113c46804
                        • Instruction Fuzzy Hash: CF41F375A04104AFDB25DF6CCC58FE97BA5EB09350F154268F895A72E0D379FD80CAA0
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _free
                        • String ID:
                        • API String ID: 269201875-0
                        • Opcode ID: 9202ec4f3ac32b6af5118bdfc93044ab6605bc15e63d5e84537d2ccaaae7db36
                        • Instruction ID: 55f4a22a6040ec0efb1c38e4832dfb7b08daaed515530476b1b7156127ee300b
                        • Opcode Fuzzy Hash: 9202ec4f3ac32b6af5118bdfc93044ab6605bc15e63d5e84537d2ccaaae7db36
                        • Instruction Fuzzy Hash: AC41E4B2A00201AFCB20DF78C890A9DB7E6EF89314F158569E615EB351DB31AD41CB80
                        APIs
                        • GetCursorPos.USER32(?), ref: 00699141
                        • ScreenToClient.USER32(00000000,?), ref: 0069915E
                        • GetAsyncKeyState.USER32(00000001), ref: 00699183
                        • GetAsyncKeyState.USER32(00000002), ref: 0069919D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: AsyncState$ClientCursorScreen
                        • String ID:
                        • API String ID: 4210589936-0
                        • Opcode ID: f87de7fb2dfa6914234a2795ca81bb329566cd62f7d9ab017f1ec8dcfa341f36
                        • Instruction ID: a6c0fab8c9087d1608c2bdd32f9041c86fe9e0218073867c2c197261cbac8ef1
                        • Opcode Fuzzy Hash: f87de7fb2dfa6914234a2795ca81bb329566cd62f7d9ab017f1ec8dcfa341f36
                        • Instruction Fuzzy Hash: AD41607190851AFBDF159F68C848BEEB77AFB05324F24831AE425A33D0D7345951CBA1
                        APIs
                        • GetInputState.USER32 ref: 006F38CB
                        • TranslateAcceleratorW.USER32(?,00000000,?), ref: 006F3922
                        • TranslateMessage.USER32(?), ref: 006F394B
                        • DispatchMessageW.USER32(?), ref: 006F3955
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006F3966
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                        • String ID:
                        • API String ID: 2256411358-0
                        • Opcode ID: c8baba99295c358c7801db3822418a89838f1d87db2e0f919d4ba1a9520fa82c
                        • Instruction ID: 29dd6928f13dda1e48474b41c03a3846e55b22155ddfc7478b7b48c315241c67
                        • Opcode Fuzzy Hash: c8baba99295c358c7801db3822418a89838f1d87db2e0f919d4ba1a9520fa82c
                        • Instruction Fuzzy Hash: BA310B7050439A9EEB35CB74D809BF637AAAB01342F44856DD662C23D0F3F8AA85CB15
                        APIs
                        • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,006FC21E,00000000), ref: 006FCF38
                        • InternetReadFile.WININET(?,00000000,?,?), ref: 006FCF6F
                        • GetLastError.KERNEL32(?,00000000,?,?,?,006FC21E,00000000), ref: 006FCFB4
                        • SetEvent.KERNEL32(?,?,00000000,?,?,?,006FC21E,00000000), ref: 006FCFC8
                        • SetEvent.KERNEL32(?,?,00000000,?,?,?,006FC21E,00000000), ref: 006FCFF2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                        • String ID:
                        • API String ID: 3191363074-0
                        • Opcode ID: e6cc04a6ff66674cddc3ed7d36bbc00a36867fc74c4d2b1964af236c433a609c
                        • Instruction ID: 643d37b21c79f8517c18e5240e2909cd89098bdab4de3a3fcefaff24fea838dc
                        • Opcode Fuzzy Hash: e6cc04a6ff66674cddc3ed7d36bbc00a36867fc74c4d2b1964af236c433a609c
                        • Instruction Fuzzy Hash: 65314D7150520DAFDB20DFA9C9849BABBFAEF14360B10842EF616D2240DB34AE41DB64
                        APIs
                        • GetWindowRect.USER32(?,?), ref: 006E1915
                        • PostMessageW.USER32(00000001,00000201,00000001), ref: 006E19C1
                        • Sleep.KERNEL32(00000000,?,?,?), ref: 006E19C9
                        • PostMessageW.USER32(00000001,00000202,00000000), ref: 006E19DA
                        • Sleep.KERNEL32(00000000,?,?,?,?), ref: 006E19E2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessagePostSleep$RectWindow
                        • String ID:
                        • API String ID: 3382505437-0
                        • Opcode ID: f8efd6a87f704a7096aa54d770483d769de8d682a150dc1f700c26c15100a90b
                        • Instruction ID: 036a0a19b3b9d73331086f1241dfc3e8e4936aeb41cb0e58e1f9efa7a54f45b7
                        • Opcode Fuzzy Hash: f8efd6a87f704a7096aa54d770483d769de8d682a150dc1f700c26c15100a90b
                        • Instruction Fuzzy Hash: 5431AF71900259EFCB00CFADC999ADE3BB6EB05315F108229F921AB2D1C7709944DB90
                        APIs
                        • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00715745
                        • SendMessageW.USER32(?,00001074,?,00000001), ref: 0071579D
                        • _wcslen.LIBCMT ref: 007157AF
                        • _wcslen.LIBCMT ref: 007157BA
                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00715816
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessageSend$_wcslen
                        • String ID:
                        • API String ID: 763830540-0
                        • Opcode ID: 8705210395be794540cc747e99426f178fd5f5c90eca7118bff3159de9194dcb
                        • Instruction ID: 5828e986e301b1dd3c5145f08e536d0ca607b48421047524b4127efb9da89108
                        • Opcode Fuzzy Hash: 8705210395be794540cc747e99426f178fd5f5c90eca7118bff3159de9194dcb
                        • Instruction Fuzzy Hash: A621A271904618DADB209FA8CC85EEEB7B8FF84725F108256E929EA1C0D77899C5CF50
                        APIs
                        • IsWindow.USER32(00000000), ref: 00700951
                        • GetForegroundWindow.USER32 ref: 00700968
                        • GetDC.USER32(00000000), ref: 007009A4
                        • GetPixel.GDI32(00000000,?,00000003), ref: 007009B0
                        • ReleaseDC.USER32(00000000,00000003), ref: 007009E8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Window$ForegroundPixelRelease
                        • String ID:
                        • API String ID: 4156661090-0
                        • Opcode ID: 0e541dbb40284f6986e9996bf7cc1ba92a5e868a5161dd9599e9d40e07418a58
                        • Instruction ID: ce9a09c70a09412fce0472feebfa7a1131a2acc9a76ba36f60723dba2fb57701
                        • Opcode Fuzzy Hash: 0e541dbb40284f6986e9996bf7cc1ba92a5e868a5161dd9599e9d40e07418a58
                        • Instruction Fuzzy Hash: 3A218179600204EFD744EFA9D884AAEBBF5EF45750F04C16CE94A973A2DB74AC04CB94
                        APIs
                        • GetEnvironmentStringsW.KERNEL32 ref: 006BCDC6
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 006BCDE9
                          • Part of subcall function 006B3820: RtlAllocateHeap.NTDLL(00000000,?,00751444,?,0069FDF5,?,?,0068A976,00000010,00751440,006813FC,?,006813C6,?,00681129), ref: 006B3852
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 006BCE0F
                        • _free.LIBCMT ref: 006BCE22
                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 006BCE31
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                        • String ID:
                        • API String ID: 336800556-0
                        • Opcode ID: 113c645581917d927da657490009b2609c83e4e3bd467bdcd8a6d70af81a8609
                        • Instruction ID: 528ff0e1bd62f75f7aee231e4b2bb34b5a8bcef147efe3153d807b0bf76310ea
                        • Opcode Fuzzy Hash: 113c645581917d927da657490009b2609c83e4e3bd467bdcd8a6d70af81a8609
                        • Instruction Fuzzy Hash: 1801D8F2601215BF632216BA6C48CFB696EDEC6FB1315412DF905DB240DA64CE4393B5
                        APIs
                        • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00699693
                        • SelectObject.GDI32(?,00000000), ref: 006996A2
                        • BeginPath.GDI32(?), ref: 006996B9
                        • SelectObject.GDI32(?,00000000), ref: 006996E2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ObjectSelect$BeginCreatePath
                        • String ID:
                        • API String ID: 3225163088-0
                        • Opcode ID: 27a5f95f305024d6c2a509097401d5b38bcde6f284f88d41e6c1be34a06fe9bd
                        • Instruction ID: b41cc71033a5f3f6975bc4dd06e218e2140ad19c81d453222aedfa8ca323aeb3
                        • Opcode Fuzzy Hash: 27a5f95f305024d6c2a509097401d5b38bcde6f284f88d41e6c1be34a06fe9bd
                        • Instruction Fuzzy Hash: 96218370801385EBEF119F6CEC047E93B6ABB11357F50821AF411962F0D3B8A851CBA8
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _memcmp
                        • String ID:
                        • API String ID: 2931989736-0
                        • Opcode ID: 7ed3f2e527eeaf5bb8f1d8e5837baac3a8743aa470f188a27fe42aff7a05f33b
                        • Instruction ID: 179270f8e766e5ca211d70f9a2590622e2e6e09bca9f6f579aa5f19afee47402
                        • Opcode Fuzzy Hash: 7ed3f2e527eeaf5bb8f1d8e5837baac3a8743aa470f188a27fe42aff7a05f33b
                        • Instruction Fuzzy Hash: D501F9E1242705FBDB08A9169D52FFB735F9B22398F000024FD069E281FB60ED6186F4
                        APIs
                        • GetLastError.KERNEL32(?,?,?,006AF2DE,006B3863,00751444,?,0069FDF5,?,?,0068A976,00000010,00751440,006813FC,?,006813C6), ref: 006B2DFD
                        • _free.LIBCMT ref: 006B2E32
                        • _free.LIBCMT ref: 006B2E59
                        • SetLastError.KERNEL32(00000000,00681129), ref: 006B2E66
                        • SetLastError.KERNEL32(00000000,00681129), ref: 006B2E6F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ErrorLast$_free
                        • String ID:
                        • API String ID: 3170660625-0
                        • Opcode ID: bcca0470279052ffffc3313f216cf0a5e701c6c35295afd7b2089188e22fa8d5
                        • Instruction ID: 7b558b3436141b4c706b7d57da68c86ccf293a56e590ad64b63e37e26781489c
                        • Opcode Fuzzy Hash: bcca0470279052ffffc3313f216cf0a5e701c6c35295afd7b2089188e22fa8d5
                        • Instruction Fuzzy Hash: FB0149F624560227C613277A6C96DEB16DBABC6761720842CF824A23D2EF38CCC30324
                        APIs
                        • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,006DFF41,80070057,?,?,?,006E035E), ref: 006E002B
                        • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,006DFF41,80070057,?,?), ref: 006E0046
                        • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,006DFF41,80070057,?,?), ref: 006E0054
                        • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,006DFF41,80070057,?), ref: 006E0064
                        • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,006DFF41,80070057,?,?), ref: 006E0070
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: From$Prog$FreeStringTasklstrcmpi
                        • String ID:
                        • API String ID: 3897988419-0
                        • Opcode ID: f0e7e1084e25455880687d4814d34dcb20c73182debff609b6f72c54fb2f606c
                        • Instruction ID: 8226634a45f2bd35a7a9c21f32db7eb648588b9d11e9d46bc288547ee3f481ec
                        • Opcode Fuzzy Hash: f0e7e1084e25455880687d4814d34dcb20c73182debff609b6f72c54fb2f606c
                        • Instruction Fuzzy Hash: 3B01A272641304BFEB119FAADC44BEA7AEEEF44751F148124F905D6250D7B5DD808BA0
                        APIs
                        • QueryPerformanceCounter.KERNEL32(?), ref: 006EE997
                        • QueryPerformanceFrequency.KERNEL32(?), ref: 006EE9A5
                        • Sleep.KERNEL32(00000000), ref: 006EE9AD
                        • QueryPerformanceCounter.KERNEL32(?), ref: 006EE9B7
                        • Sleep.KERNEL32 ref: 006EE9F3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: PerformanceQuery$CounterSleep$Frequency
                        • String ID:
                        • API String ID: 2833360925-0
                        • Opcode ID: dd50e03af6b41e49409f543ecac73e44994e7d7edff7ac90150a162036ea818f
                        • Instruction ID: 9b77edd85017200425632d322928a549012e9c83520f46c3fcd6f932c7772e83
                        • Opcode Fuzzy Hash: dd50e03af6b41e49409f543ecac73e44994e7d7edff7ac90150a162036ea818f
                        • Instruction Fuzzy Hash: BD018471C4262DDBCF009FE5DC596EDBBB9FF08301F108546E501B2241CB395551C765
                        APIs
                        • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 006E1114
                        • GetLastError.KERNEL32(?,00000000,00000000,?,?,006E0B9B,?,?,?), ref: 006E1120
                        • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,006E0B9B,?,?,?), ref: 006E112F
                        • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,006E0B9B,?,?,?), ref: 006E1136
                        • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 006E114D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                        • String ID:
                        • API String ID: 842720411-0
                        • Opcode ID: 10f6991939e30acda66da9cec73150d6eebf5b70adee39a7d530579242186fec
                        • Instruction ID: 3e377c470aa9cb9e3128ec2bf473b5fae4201f65a918faff4e5f50c7f4611ea2
                        • Opcode Fuzzy Hash: 10f6991939e30acda66da9cec73150d6eebf5b70adee39a7d530579242186fec
                        • Instruction Fuzzy Hash: 050181B9141305BFDB124FA9DC49EEA3F6EEF86360B108414FA41C7390DB75DC009A60
                        APIs
                        • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 006E0FCA
                        • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 006E0FD6
                        • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 006E0FE5
                        • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 006E0FEC
                        • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 006E1002
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: HeapInformationToken$AllocErrorLastProcess
                        • String ID:
                        • API String ID: 44706859-0
                        • Opcode ID: 47ef24ee7068f4b495749fe5f9e67395b78ff5cd9138d4f9743b4e1edbdd67c3
                        • Instruction ID: 2cb3d9a1b22e964839aaabba9812f6b15a3819c1cf612b178202b8399521aa38
                        • Opcode Fuzzy Hash: 47ef24ee7068f4b495749fe5f9e67395b78ff5cd9138d4f9743b4e1edbdd67c3
                        • Instruction Fuzzy Hash: 32F0AF79281305BBD7220FA99C49F963B6EEF8A761F118414F905CA290DA34DC409A60
                        APIs
                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 006E102A
                        • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 006E1036
                        • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 006E1045
                        • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 006E104C
                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 006E1062
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: HeapInformationToken$AllocErrorLastProcess
                        • String ID:
                        • API String ID: 44706859-0
                        • Opcode ID: af6287620d48e1145fa843582450a5b009c7096836b36897fb0a13747e99ef0b
                        • Instruction ID: d31506918e9047b6c57dbbcb7ff7dfd0f0216e6a2eb14119b669d2c7f30076e1
                        • Opcode Fuzzy Hash: af6287620d48e1145fa843582450a5b009c7096836b36897fb0a13747e99ef0b
                        • Instruction Fuzzy Hash: 31F0C279281305FBD7221FE9EC49F963B6EEF8A761F118414F905CB290CE34DC809A60
                        APIs
                        • CloseHandle.KERNEL32(?,?,?,?,006F017D,?,006F32FC,?,00000001,006C2592,?), ref: 006F0324
                        • CloseHandle.KERNEL32(?,?,?,?,006F017D,?,006F32FC,?,00000001,006C2592,?), ref: 006F0331
                        • CloseHandle.KERNEL32(?,?,?,?,006F017D,?,006F32FC,?,00000001,006C2592,?), ref: 006F033E
                        • CloseHandle.KERNEL32(?,?,?,?,006F017D,?,006F32FC,?,00000001,006C2592,?), ref: 006F034B
                        • CloseHandle.KERNEL32(?,?,?,?,006F017D,?,006F32FC,?,00000001,006C2592,?), ref: 006F0358
                        • CloseHandle.KERNEL32(?,?,?,?,006F017D,?,006F32FC,?,00000001,006C2592,?), ref: 006F0365
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CloseHandle
                        • String ID:
                        • API String ID: 2962429428-0
                        • Opcode ID: 9e9a7f70ca46c14163a3bb555720240491ac0fe15e3e6e1e49c3c532070ae80a
                        • Instruction ID: 6470faff149e9c1d07561bb015195b167a2854ebbdc26667925d8d8c6ef01420
                        • Opcode Fuzzy Hash: 9e9a7f70ca46c14163a3bb555720240491ac0fe15e3e6e1e49c3c532070ae80a
                        • Instruction Fuzzy Hash: EC01A276800B1A9FD7309F6AD880862F7F6BF503153158A3FD29652A32C371A954CF80
                        APIs
                        • _free.LIBCMT ref: 006BD752
                          • Part of subcall function 006B29C8: HeapFree.KERNEL32(00000000,00000000,?,006BD7D1,00000000,00000000,00000000,00000000,?,006BD7F8,00000000,00000007,00000000,?,006BDBF5,00000000), ref: 006B29DE
                          • Part of subcall function 006B29C8: GetLastError.KERNEL32(00000000,?,006BD7D1,00000000,00000000,00000000,00000000,?,006BD7F8,00000000,00000007,00000000,?,006BDBF5,00000000,00000000), ref: 006B29F0
                        • _free.LIBCMT ref: 006BD764
                        • _free.LIBCMT ref: 006BD776
                        • _free.LIBCMT ref: 006BD788
                        • _free.LIBCMT ref: 006BD79A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 229ea432af34e192173561d490f758ce85d153d871175f84a5e2b08353757550
                        • Instruction ID: 21b931d55458fce7d30ff5858a1c6f65984eac20e27a435c092d40cee072f0de
                        • Opcode Fuzzy Hash: 229ea432af34e192173561d490f758ce85d153d871175f84a5e2b08353757550
                        • Instruction Fuzzy Hash: 8EF019B2501205BB86A2FA65F9858DA77DEBB057107954C1AF048DB601DB24F8C08768
                        APIs
                        • GetDlgItem.USER32(?,000003E9), ref: 006E5C58
                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 006E5C6F
                        • MessageBeep.USER32(00000000), ref: 006E5C87
                        • KillTimer.USER32(?,0000040A), ref: 006E5CA3
                        • EndDialog.USER32(?,00000001), ref: 006E5CBD
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                        • String ID:
                        • API String ID: 3741023627-0
                        • Opcode ID: e9160fb07824f9143db8ec18d1a53564f7883bbdebadc5a882a2ca99ec554013
                        • Instruction ID: 1dfdf8945015f7fabab999fd9f197e2048975d2e9162f370cb039c3bb803b5fc
                        • Opcode Fuzzy Hash: e9160fb07824f9143db8ec18d1a53564f7883bbdebadc5a882a2ca99ec554013
                        • Instruction Fuzzy Hash: 1601F430540B04ABEB215B55DD5EFE677B9BF04F09F00825DB283A10E1DBF4A985CB95
                        APIs
                        • _free.LIBCMT ref: 006B22BE
                          • Part of subcall function 006B29C8: HeapFree.KERNEL32(00000000,00000000,?,006BD7D1,00000000,00000000,00000000,00000000,?,006BD7F8,00000000,00000007,00000000,?,006BDBF5,00000000), ref: 006B29DE
                          • Part of subcall function 006B29C8: GetLastError.KERNEL32(00000000,?,006BD7D1,00000000,00000000,00000000,00000000,?,006BD7F8,00000000,00000007,00000000,?,006BDBF5,00000000,00000000), ref: 006B29F0
                        • _free.LIBCMT ref: 006B22D0
                        • _free.LIBCMT ref: 006B22E3
                        • _free.LIBCMT ref: 006B22F4
                        • _free.LIBCMT ref: 006B2305
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 4965d8c59828258617c1f43929f785d28bb10a8cda88900588a2997986fae4a2
                        • Instruction ID: 029e520742f4338c7ee93839f7d13ed41aa7cb2cff7a78f7d6a29098f28867cd
                        • Opcode Fuzzy Hash: 4965d8c59828258617c1f43929f785d28bb10a8cda88900588a2997986fae4a2
                        • Instruction Fuzzy Hash: 1BF030B45013119B8693BF55BC119D83BA6B719B53B418A0FF418D22B1C77C05919BED
                        APIs
                        • EndPath.GDI32(?), ref: 006995D4
                        • StrokeAndFillPath.GDI32(?,?,006D71F7,00000000,?,?,?), ref: 006995F0
                        • SelectObject.GDI32(?,00000000), ref: 00699603
                        • DeleteObject.GDI32 ref: 00699616
                        • StrokePath.GDI32(?), ref: 00699631
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Path$ObjectStroke$DeleteFillSelect
                        • String ID:
                        • API String ID: 2625713937-0
                        • Opcode ID: 05a3c40fb9eaa45747d03459a57ae5f921b691e384469abb6177a14d918577b4
                        • Instruction ID: 1a7bb8ccfcc06d32cbd7a72bf30d5e8b58214ff988e3bce47ec405ff13e644e4
                        • Opcode Fuzzy Hash: 05a3c40fb9eaa45747d03459a57ae5f921b691e384469abb6177a14d918577b4
                        • Instruction Fuzzy Hash: D0F03C30045388EBDB125FADED1C7E93B66AB05323F44C218F465955F0C7B89992DF68
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: __freea$_free
                        • String ID: a/p$am/pm
                        • API String ID: 3432400110-3206640213
                        • Opcode ID: a7b8b207f47fa5c15da38d3479075b7a304a5a2cf3f1fc2dd47014b0e1fa9d59
                        • Instruction ID: 979aaa51b8f8b8741a05ad17542029286eb12f4d24b75d094f7b746b90c1f886
                        • Opcode Fuzzy Hash: a7b8b207f47fa5c15da38d3479075b7a304a5a2cf3f1fc2dd47014b0e1fa9d59
                        • Instruction Fuzzy Hash: 83D1D3B1900205EADB249F68C865BFAB7B2EF07300F98415AE9019F751E7759EC1CB91
                        APIs
                          • Part of subcall function 006A0242: EnterCriticalSection.KERNEL32(0075070C,00751884,?,?,0069198B,00752518,?,?,?,006812F9,00000000), ref: 006A024D
                          • Part of subcall function 006A0242: LeaveCriticalSection.KERNEL32(0075070C,?,0069198B,00752518,?,?,?,006812F9,00000000), ref: 006A028A
                          • Part of subcall function 006A00A3: __onexit.LIBCMT ref: 006A00A9
                        • __Init_thread_footer.LIBCMT ref: 00706238
                          • Part of subcall function 006A01F8: EnterCriticalSection.KERNEL32(0075070C,?,?,00698747,00752514), ref: 006A0202
                          • Part of subcall function 006A01F8: LeaveCriticalSection.KERNEL32(0075070C,?,00698747,00752514), ref: 006A0235
                          • Part of subcall function 006F359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 006F35E4
                          • Part of subcall function 006F359C: LoadStringW.USER32(00752390,?,00000FFF,?), ref: 006F360A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                        • String ID: x#u$x#u$x#u
                        • API String ID: 1072379062-3372033415
                        • Opcode ID: b57483479f9ac8561877215af89fd58e3d53fcec81aa3c21c961f217ba2d9e7e
                        • Instruction ID: 83a7115a5ccbf13789dca1e197f730ace9ef7ef69fc27306bbc20b3f918893c8
                        • Opcode Fuzzy Hash: b57483479f9ac8561877215af89fd58e3d53fcec81aa3c21c961f217ba2d9e7e
                        • Instruction Fuzzy Hash: 87C16C71A00105EFDB14EF98C8A0EBAB7FAEF49310F148169F9059B291DB74EE55CB90
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID: JOh
                        • API String ID: 0-3066325924
                        • Opcode ID: ecc4b3bdf2563cb7e37261f740811eeb550613505cd0ee5565491893f168cc8e
                        • Instruction ID: 32783232c119bfed01e7ec13fcac915130d22e02071208362f0d8845b90c30ec
                        • Opcode Fuzzy Hash: ecc4b3bdf2563cb7e37261f740811eeb550613505cd0ee5565491893f168cc8e
                        • Instruction Fuzzy Hash: 1D5191B5D006099FDB21AFE4C845FEE7FBBAF05310F14005DF406A7292D7759A828B66
                        APIs
                        • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 006B8B6E
                        • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 006B8B7A
                        • __dosmaperr.LIBCMT ref: 006B8B81
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ByteCharErrorLastMultiWide__dosmaperr
                        • String ID: .j
                        • API String ID: 2434981716-79812232
                        • Opcode ID: 6bc01c7912973724bf176b04d0ea3cd9aa4f327f7940a23298fbac0cced34595
                        • Instruction ID: a45204116e08c063d3d7ff94ed352ca9e7f218169b6220c9efb2b4770bdd1be2
                        • Opcode Fuzzy Hash: 6bc01c7912973724bf176b04d0ea3cd9aa4f327f7940a23298fbac0cced34595
                        • Instruction Fuzzy Hash: 9A417BF0604145AFCB259F78CC80AF97FABDB85304B2881ADF88487242DE358C82C794
                        APIs
                          • Part of subcall function 006EB403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,006E21D0,?,?,00000034,00000800,?,00000034), ref: 006EB42D
                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 006E2760
                          • Part of subcall function 006EB3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,006E21FF,?,?,00000800,?,00001073,00000000,?,?), ref: 006EB3F8
                          • Part of subcall function 006EB32A: GetWindowThreadProcessId.USER32(?,?), ref: 006EB355
                          • Part of subcall function 006EB32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,006E2194,00000034,?,?,00001004,00000000,00000000), ref: 006EB365
                          • Part of subcall function 006EB32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,006E2194,00000034,?,?,00001004,00000000,00000000), ref: 006EB37B
                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 006E27CD
                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 006E281A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                        • String ID: @
                        • API String ID: 4150878124-2766056989
                        • Opcode ID: eaf3a51415fd37454da6e931cc52c95b3b91da02121bac05d1eff455c3224176
                        • Instruction ID: 385362a80be49d5a7adabbbaba17b1c08ad69cadea7d113f7e70f6c767de6ae8
                        • Opcode Fuzzy Hash: eaf3a51415fd37454da6e931cc52c95b3b91da02121bac05d1eff455c3224176
                        • Instruction Fuzzy Hash: 9F416D72901218BFDB10DFA4CD52AEEBBB9EF09300F109099FA45B7181DB706E45CBA1
                        APIs
                        • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 006B1769
                        • _free.LIBCMT ref: 006B1834
                        • _free.LIBCMT ref: 006B183E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _free$FileModuleName
                        • String ID: C:\Users\user\Desktop\file.exe
                        • API String ID: 2506810119-517116171
                        • Opcode ID: b25f23b3c81ac0887f985689b13514d3b2bcc82339c7b123b24b7c049f01e2af
                        • Instruction ID: a0e63b397f52ea0f60ce9c61fad1148477f02b062824e9d5f21a395795a87fb9
                        • Opcode Fuzzy Hash: b25f23b3c81ac0887f985689b13514d3b2bcc82339c7b123b24b7c049f01e2af
                        • Instruction Fuzzy Hash: 0731A6B1A40218BBDB21DF999895DDEBBFEFB86310F90416AF404DB211D6704E81CB94
                        APIs
                        • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 006EC306
                        • DeleteMenu.USER32(?,00000007,00000000), ref: 006EC34C
                        • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00751990,017F6410), ref: 006EC395
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Menu$Delete$InfoItem
                        • String ID: 0
                        • API String ID: 135850232-4108050209
                        • Opcode ID: 02992e7b721a6e92ad838a7d4e0ed83e6a23b6303a3d01c2a345f75625649a5b
                        • Instruction ID: e0b0ee1d822b1d8a41f629966620aa9524f7c06c27783c3a5079f4477d8bb3a0
                        • Opcode Fuzzy Hash: 02992e7b721a6e92ad838a7d4e0ed83e6a23b6303a3d01c2a345f75625649a5b
                        • Instruction Fuzzy Hash: 4141B2312053819FD720DF2AD844F5ABBEAAF85320F14861DF9A5973D1D730E906CB66
                        APIs
                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0071CC08,00000000,?,?,?,?), ref: 007144AA
                        • GetWindowLongW.USER32 ref: 007144C7
                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 007144D7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Window$Long
                        • String ID: SysTreeView32
                        • API String ID: 847901565-1698111956
                        • Opcode ID: 8a93001cdf380636ef96fa7e1ea5313f18e30332942b452617c61f4353cfc4ca
                        • Instruction ID: a21e08c61efc0155124b6926aa5db5d91eea72b9db3d0759a5f8a0566741bb38
                        • Opcode Fuzzy Hash: 8a93001cdf380636ef96fa7e1ea5313f18e30332942b452617c61f4353cfc4ca
                        • Instruction Fuzzy Hash: D431AD71200245AFDF219E7CDC45BEA7BAAEB08334F208319F975921D0D778ECA09B50
                        APIs
                        • SysReAllocString.OLEAUT32(?,?), ref: 006E6EED
                        • VariantCopyInd.OLEAUT32(?,?), ref: 006E6F08
                        • VariantClear.OLEAUT32(?), ref: 006E6F12
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Variant$AllocClearCopyString
                        • String ID: *jn
                        • API String ID: 2173805711-4286829910
                        • Opcode ID: 9e961724a0915d85b89fb862147c2197663847a5b5587292ca839aad089fbd39
                        • Instruction ID: 074cf53fc732d0ae1dfa09320a9dccb7db5a601c74d4dab5adb2610fda154007
                        • Opcode Fuzzy Hash: 9e961724a0915d85b89fb862147c2197663847a5b5587292ca839aad089fbd39
                        • Instruction Fuzzy Hash: AF31C171605385DBCB05AFA6E8508BD3777FF61340B100598F9024B2B1CB349912DB95
                        APIs
                          • Part of subcall function 0070335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00703077,?,?), ref: 00703378
                        • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0070307A
                        • _wcslen.LIBCMT ref: 0070309B
                        • htons.WSOCK32(00000000,?,?,00000000), ref: 00703106
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                        • String ID: 255.255.255.255
                        • API String ID: 946324512-2422070025
                        • Opcode ID: 9eb66ee70efd13f6eba387dac90acffba912a18e4ffcba7d7b4d9bf29baaaab5
                        • Instruction ID: 52772c350d589e5bc8a0812036ef79a33054c0675f84e78126461df76bab8e3d
                        • Opcode Fuzzy Hash: 9eb66ee70efd13f6eba387dac90acffba912a18e4ffcba7d7b4d9bf29baaaab5
                        • Instruction Fuzzy Hash: AD31D339200205DFDB10DF68C485EAAB7E9EF54318F248259E8158B3D2DB7AEE45C760
                        APIs
                        • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00713F40
                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00713F54
                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00713F78
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessageSend$Window
                        • String ID: SysMonthCal32
                        • API String ID: 2326795674-1439706946
                        • Opcode ID: c3d022ccd89edd8e230fe556a14b4f6c0567b6243e877171cb3cd80911772643
                        • Instruction ID: 465ee3997e950724f894f8000b8add42f5da87eba0f4dd5868ea7f22f0c20bd9
                        • Opcode Fuzzy Hash: c3d022ccd89edd8e230fe556a14b4f6c0567b6243e877171cb3cd80911772643
                        • Instruction Fuzzy Hash: 5221AD32600219BBDF218E94CC46FEA3B79EB48724F114218FA157B1D0D6B9A995CB90
                        APIs
                        • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00714705
                        • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00714713
                        • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0071471A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessageSend$DestroyWindow
                        • String ID: msctls_updown32
                        • API String ID: 4014797782-2298589950
                        • Opcode ID: 69347577664d89f6202c3a966cb3a63eb175ba69f58274aee099bf5dbdfe81c2
                        • Instruction ID: 4879eb1731d475bc1c6e9ee3571b05b3ac828b344a4328373ac06ec3e4794aad
                        • Opcode Fuzzy Hash: 69347577664d89f6202c3a966cb3a63eb175ba69f58274aee099bf5dbdfe81c2
                        • Instruction Fuzzy Hash: 4B215CB5600209AFEB11DF68DC81DA737ADEB4A7A8B044059FA009B291CB75EC51CA64
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _wcslen
                        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                        • API String ID: 176396367-2734436370
                        • Opcode ID: 678ae8ffdf10d3967728d67f43ee63aed98ab9e9d0eaba36bc9fe764beed6572
                        • Instruction ID: dbeb9a3e56b062991a9798e1751821d676861e926720b6c5def7a22d2bfe328a
                        • Opcode Fuzzy Hash: 678ae8ffdf10d3967728d67f43ee63aed98ab9e9d0eaba36bc9fe764beed6572
                        • Instruction Fuzzy Hash: F2213B7220579066D731BB2A9C02FFB739AAF51300F10442AF94997282EB559D81C3B9
                        APIs
                        • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00713840
                        • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00713850
                        • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00713876
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessageSend$MoveWindow
                        • String ID: Listbox
                        • API String ID: 3315199576-2633736733
                        • Opcode ID: de17cb2494df1e57bf60c581c2c9d4edb3cdff16e9cac8095c5f8eb66027017b
                        • Instruction ID: 84a932e2d7bcb9f77de2a4aec3b67756dc0f6c11f748da5cee939894e7034365
                        • Opcode Fuzzy Hash: de17cb2494df1e57bf60c581c2c9d4edb3cdff16e9cac8095c5f8eb66027017b
                        • Instruction Fuzzy Hash: AF217C72610218BBEF219F98DC85EEB376AEF89760F108124F9049B1D0C6799C9287A0
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 006F4A08
                        • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 006F4A5C
                        • SetErrorMode.KERNEL32(00000000,?,?,0071CC08), ref: 006F4AD0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ErrorMode$InformationVolume
                        • String ID: %lu
                        • API String ID: 2507767853-685833217
                        • Opcode ID: e140a390ad9e5a7d374d492a508335f1f5a122a1cca5b98aa26c017e4d8c9ee8
                        • Instruction ID: 0e1f59ffa11e7359ca0cf5d1c3b4739ca8f7ff48c10453ea25adfcd541209480
                        • Opcode Fuzzy Hash: e140a390ad9e5a7d374d492a508335f1f5a122a1cca5b98aa26c017e4d8c9ee8
                        • Instruction Fuzzy Hash: E4318E70A40108AFDB11DF58C881EBA7BF9EF09308F1480A8E909DB252DB75ED46CB65
                        APIs
                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0071424F
                        • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00714264
                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00714271
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: msctls_trackbar32
                        • API String ID: 3850602802-1010561917
                        • Opcode ID: 1e203c44c73f9d5ecf89dcb0da74873f59cf3906197f034026c5e1117112dc85
                        • Instruction ID: eb950357a1d6f49c5018ef538d49c50dfd44de45563535c01931d0b3e8f95b71
                        • Opcode Fuzzy Hash: 1e203c44c73f9d5ecf89dcb0da74873f59cf3906197f034026c5e1117112dc85
                        • Instruction Fuzzy Hash: 0211E331240208BEEF205E68CC06FEB3BACFF95B64F114114FA55E20D0D275DC919B14
                        APIs
                          • Part of subcall function 00686B57: _wcslen.LIBCMT ref: 00686B6A
                          • Part of subcall function 006E2DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 006E2DC5
                          • Part of subcall function 006E2DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 006E2DD6
                          • Part of subcall function 006E2DA7: GetCurrentThreadId.KERNEL32 ref: 006E2DDD
                          • Part of subcall function 006E2DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 006E2DE4
                        • GetFocus.USER32 ref: 006E2F78
                          • Part of subcall function 006E2DEE: GetParent.USER32(00000000), ref: 006E2DF9
                        • GetClassNameW.USER32(?,?,00000100), ref: 006E2FC3
                        • EnumChildWindows.USER32(?,006E303B), ref: 006E2FEB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                        • String ID: %s%d
                        • API String ID: 1272988791-1110647743
                        • Opcode ID: 787186279592c2bcee0070025aaa4bb17a77cf7b36988b071d2d179d00eb1a4a
                        • Instruction ID: da96012c193a189ece0e8e65f4b6ffb2999ff989af360441f7fca19217ab902e
                        • Opcode Fuzzy Hash: 787186279592c2bcee0070025aaa4bb17a77cf7b36988b071d2d179d00eb1a4a
                        • Instruction Fuzzy Hash: DA11E4B1600345ABCF417FB5CC9AEEE376BAF84304F048079FA099B292DE3499458B74
                        APIs
                        • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 007158C1
                        • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 007158EE
                        • DrawMenuBar.USER32(?), ref: 007158FD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Menu$InfoItem$Draw
                        • String ID: 0
                        • API String ID: 3227129158-4108050209
                        • Opcode ID: 331f76b3a226d55833e5cd418bc4a68b98271b8254f016a925815d8194a50727
                        • Instruction ID: d6d2a4126fd26917b287389507e3995f04b34db660423844ba1dc737b2897208
                        • Opcode Fuzzy Hash: 331f76b3a226d55833e5cd418bc4a68b98271b8254f016a925815d8194a50727
                        • Instruction Fuzzy Hash: D901AD31500258EFDB219F59DC44BEEBBB9FB85360F10C099E848D6191DB349AD0DF21
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6243a16004bbf746d7a94e7d27720ea00db91d3a09e976449291ba4afb14f6b0
                        • Instruction ID: 84e1bd43d49cb5f501eaa9b05617d5a3b1d592f5448d8246f9f66e873129d7ba
                        • Opcode Fuzzy Hash: 6243a16004bbf746d7a94e7d27720ea00db91d3a09e976449291ba4afb14f6b0
                        • Instruction Fuzzy Hash: D3C18D75A01256EFEB14CFA5C884AAEB7B6FF48304F208598E505EF251C771DE82CB90
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Variant$ClearInitInitializeUninitialize
                        • String ID:
                        • API String ID: 1998397398-0
                        • Opcode ID: dbaaa77f812ec49ad6dce3cac41db4cf61b429f5c583fc10ab8f54f15e953889
                        • Instruction ID: 2c74c124ea394b5e56b9bfd071a3e8384b30236f031704af410fcba97be36a44
                        • Opcode Fuzzy Hash: dbaaa77f812ec49ad6dce3cac41db4cf61b429f5c583fc10ab8f54f15e953889
                        • Instruction Fuzzy Hash: 8DA12A75604200DFC740EF28C485A2AB7E9FF88714F148A5DF9999B3A2DB35ED01CB56
                        APIs
                        • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,0071FC08,?), ref: 006E05F0
                        • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,0071FC08,?), ref: 006E0608
                        • CLSIDFromProgID.OLE32(?,?,00000000,0071CC40,000000FF,?,00000000,00000800,00000000,?,0071FC08,?), ref: 006E062D
                        • _memcmp.LIBVCRUNTIME ref: 006E064E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: FromProg$FreeTask_memcmp
                        • String ID:
                        • API String ID: 314563124-0
                        • Opcode ID: 989965c19e0f2571d7c248af9ca5783e84bf0fb611c9ea969c51988cc56be55f
                        • Instruction ID: d4a15aca9fd2fdfc9aa075bab55f9b0f3f252b4625974a582bccc6be8bdece47
                        • Opcode Fuzzy Hash: 989965c19e0f2571d7c248af9ca5783e84bf0fb611c9ea969c51988cc56be55f
                        • Instruction Fuzzy Hash: F2811B71A00209EFDB04DF94C984EEEB7BAFF89315F204558E516AB250DB71AE46CB60
                        APIs
                        • CreateToolhelp32Snapshot.KERNEL32 ref: 0070A6AC
                        • Process32FirstW.KERNEL32(00000000,?), ref: 0070A6BA
                          • Part of subcall function 00689CB3: _wcslen.LIBCMT ref: 00689CBD
                        • Process32NextW.KERNEL32(00000000,?), ref: 0070A79C
                        • CloseHandle.KERNEL32(00000000), ref: 0070A7AB
                          • Part of subcall function 0069CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,006C3303,?), ref: 0069CE8A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                        • String ID:
                        • API String ID: 1991900642-0
                        • Opcode ID: 87e65e1399f92e9639eaedbf7be74608c3bb55ef243934e48fd4f67b24f28a66
                        • Instruction ID: 17d48455067efc370e34576ec1d2ba180b3352cd2d911ec1e694432d118ae1bb
                        • Opcode Fuzzy Hash: 87e65e1399f92e9639eaedbf7be74608c3bb55ef243934e48fd4f67b24f28a66
                        • Instruction Fuzzy Hash: 02517FB1508300AFD750EF24C885E6BBBE9FF89754F008A2DF58597291EB34D904CB96
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _free
                        • String ID:
                        • API String ID: 269201875-0
                        • Opcode ID: d2f442ef8602ce85bd976124527524a501c4b4d7914bb1e0075abb4dac7b8d43
                        • Instruction ID: db5b4b0e61c642620a04a0c4f1857d85aef75404926a7e10181406f57980a00f
                        • Opcode Fuzzy Hash: d2f442ef8602ce85bd976124527524a501c4b4d7914bb1e0075abb4dac7b8d43
                        • Instruction Fuzzy Hash: F741E271A00500AADB297BF98C45FFE3AE7EF43360F24862DF419DA293E63489415766
                        APIs
                        • GetWindowRect.USER32(?,?), ref: 007162E2
                        • ScreenToClient.USER32(?,?), ref: 00716315
                        • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00716382
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Window$ClientMoveRectScreen
                        • String ID:
                        • API String ID: 3880355969-0
                        • Opcode ID: ca6e1498bafd7f1c9dd890ee8d836b406c3e9bb32d6676a054c3610b2a9ab8af
                        • Instruction ID: 83e68f3c1de97b955bfa9604f9cc9a5a656a2c20ccac65f7bd7d9aadcdc7cccc
                        • Opcode Fuzzy Hash: ca6e1498bafd7f1c9dd890ee8d836b406c3e9bb32d6676a054c3610b2a9ab8af
                        • Instruction Fuzzy Hash: A7512974A00249AFDF10DF68D880AEE7BB6FB45361F108259F9259B2D0D774ED81CB50
                        APIs
                        • socket.WSOCK32(00000002,00000002,00000011), ref: 00701AFD
                        • WSAGetLastError.WSOCK32 ref: 00701B0B
                        • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00701B8A
                        • WSAGetLastError.WSOCK32 ref: 00701B94
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ErrorLast$socket
                        • String ID:
                        • API String ID: 1881357543-0
                        • Opcode ID: 24fcd095b16101a75e697fc1d175f47a11f4554c86e63eaca114ef3c711177ef
                        • Instruction ID: 737efb72bca5de69285b2128bd3c4e858b35191017bc667fc96ef2e26df238bc
                        • Opcode Fuzzy Hash: 24fcd095b16101a75e697fc1d175f47a11f4554c86e63eaca114ef3c711177ef
                        • Instruction Fuzzy Hash: B741BF74640200AFE720AF24C886F2A77E6AF44718F54C58CFA1A9F6D2D776DD41CB94
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 73b2dc97920a4e35d1de2f844ed08101781efd09b3d57db4a6be83ea4d628c90
                        • Instruction ID: bf2a45741105707f283628327db68e363f9e540b41a8e3654b6c6d2114f3a2a4
                        • Opcode Fuzzy Hash: 73b2dc97920a4e35d1de2f844ed08101781efd09b3d57db4a6be83ea4d628c90
                        • Instruction Fuzzy Hash: CC410AB2A00704AFD724AF78CC41BEA7BEAEF89710F10453EF145DB282D7B199818784
                        APIs
                        • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 006F5783
                        • GetLastError.KERNEL32(?,00000000), ref: 006F57A9
                        • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 006F57CE
                        • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 006F57FA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CreateHardLink$DeleteErrorFileLast
                        • String ID:
                        • API String ID: 3321077145-0
                        • Opcode ID: 109be95fca54ca276b61d1e8c7f43d0be3ab86782cc70e043cecd2cc4ef7e8f7
                        • Instruction ID: 1d8cc51ad067fe2eea77a736ae493d8e8da2d456e4610d474533ff9dcd4f69ad
                        • Opcode Fuzzy Hash: 109be95fca54ca276b61d1e8c7f43d0be3ab86782cc70e043cecd2cc4ef7e8f7
                        • Instruction Fuzzy Hash: 13414C39600610DFCB11EF55C444A5EBBE2FF89720B18C488EA5AAB362CB35FD40CB95
                        APIs
                        • MultiByteToWideChar.KERNEL32(?,00000000,?,006A6D71,00000000,00000000,006A82D9,?,006A82D9,?,00000001,006A6D71,?,00000001,006A82D9,006A82D9), ref: 006BD910
                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 006BD999
                        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 006BD9AB
                        • __freea.LIBCMT ref: 006BD9B4
                          • Part of subcall function 006B3820: RtlAllocateHeap.NTDLL(00000000,?,00751444,?,0069FDF5,?,?,0068A976,00000010,00751440,006813FC,?,006813C6,?,00681129), ref: 006B3852
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                        • String ID:
                        • API String ID: 2652629310-0
                        • Opcode ID: 4900d671d626bce7349f1829de0dd05917ed5ed5057f5e709339fa55109c6152
                        • Instruction ID: 1c2e6b1d099f435114b9fbdd8e03c5ded51c3c63844e47ffca0265df5192e556
                        • Opcode Fuzzy Hash: 4900d671d626bce7349f1829de0dd05917ed5ed5057f5e709339fa55109c6152
                        • Instruction Fuzzy Hash: 2D31BEB2A0020AABDF25AF64DC41EEE7BA6EB41310F054168FC04DB290EB35CD91CB90
                        APIs
                        • SendMessageW.USER32(?,00001024,00000000,?), ref: 00715352
                        • GetWindowLongW.USER32(?,000000F0), ref: 00715375
                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00715382
                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 007153A8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: LongWindow$InvalidateMessageRectSend
                        • String ID:
                        • API String ID: 3340791633-0
                        • Opcode ID: 37377b80a10351b257dd968f0bbeae65e9839eeaa55664da1ef4de14448655a6
                        • Instruction ID: 4aa0661b1ddc6998ceea9d4816e323d26d9e37576da0ab04fbbfa5d373affef5
                        • Opcode Fuzzy Hash: 37377b80a10351b257dd968f0bbeae65e9839eeaa55664da1ef4de14448655a6
                        • Instruction Fuzzy Hash: 6D31C634A55A08EFEB3D9E5CCC06BE83766AB84394F948102FA20971E1C7BC9DC0E755
                        APIs
                        • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 006EABF1
                        • SetKeyboardState.USER32(00000080,?,00008000), ref: 006EAC0D
                        • PostMessageW.USER32(00000000,00000101,00000000), ref: 006EAC74
                        • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 006EACC6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: KeyboardState$InputMessagePostSend
                        • String ID:
                        • API String ID: 432972143-0
                        • Opcode ID: 688b63ef2ee4637e5f2ae7d36e986f6b9beec87af3bab645bbd12c235d67f164
                        • Instruction ID: 8746983256eb24dfcfe87cabca89b551458b5fc3fe3523e6b9d8fd51281c9b28
                        • Opcode Fuzzy Hash: 688b63ef2ee4637e5f2ae7d36e986f6b9beec87af3bab645bbd12c235d67f164
                        • Instruction Fuzzy Hash: 78312830A413986FFF35CBA68C047FA7BA7AF85B10F28821AE485562D0C374A9858756
                        APIs
                        • ClientToScreen.USER32(?,?), ref: 0071769A
                        • GetWindowRect.USER32(?,?), ref: 00717710
                        • PtInRect.USER32(?,?,00718B89), ref: 00717720
                        • MessageBeep.USER32(00000000), ref: 0071778C
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Rect$BeepClientMessageScreenWindow
                        • String ID:
                        • API String ID: 1352109105-0
                        • Opcode ID: ace0a8981adb45124ff19d8e3759c5875b37ad8b344dc810f9d536dbd4bd9003
                        • Instruction ID: 64dc86587b32a99eadc1e18d98932ad05b5c3fdac91e43b9a47ec7d59526c697
                        • Opcode Fuzzy Hash: ace0a8981adb45124ff19d8e3759c5875b37ad8b344dc810f9d536dbd4bd9003
                        • Instruction Fuzzy Hash: 6B419C34605254DFCB05CF5CC894EE9B7F5BB49311F5580A8E4149B2E1C378E981CB90
                        APIs
                        • GetForegroundWindow.USER32 ref: 007116EB
                          • Part of subcall function 006E3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 006E3A57
                          • Part of subcall function 006E3A3D: GetCurrentThreadId.KERNEL32 ref: 006E3A5E
                          • Part of subcall function 006E3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,006E25B3), ref: 006E3A65
                        • GetCaretPos.USER32(?), ref: 007116FF
                        • ClientToScreen.USER32(00000000,?), ref: 0071174C
                        • GetForegroundWindow.USER32 ref: 00711752
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                        • String ID:
                        • API String ID: 2759813231-0
                        • Opcode ID: f7b6aab00cb6e277591bdd8404e698575b31d976c50190391a9ceb0bc8ff326e
                        • Instruction ID: 29d7beb3432850d10377e52aa84e545402ec6db1bdd41f522bb22b548d989b44
                        • Opcode Fuzzy Hash: f7b6aab00cb6e277591bdd8404e698575b31d976c50190391a9ceb0bc8ff326e
                        • Instruction Fuzzy Hash: 6B315E71D00249AFDB00EFA9C885CEEBBFAEF88304B5080ADE515E7251D635DE45CBA4
                        APIs
                          • Part of subcall function 00699BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00699BB2
                        • GetCursorPos.USER32(?), ref: 00719001
                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,006D7711,?,?,?,?,?), ref: 00719016
                        • GetCursorPos.USER32(?), ref: 0071905E
                        • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,006D7711,?,?,?), ref: 00719094
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Cursor$LongMenuPopupProcTrackWindow
                        • String ID:
                        • API String ID: 2864067406-0
                        • Opcode ID: 4d3d2b1a2f54673a8c9d4933fad4f0a555b725e5b2f635a2654508f41021eb4d
                        • Instruction ID: f640edbf4b61e50c8ae27a3d69e1952d44f3b2824eb6bbec5c524d23973d230f
                        • Opcode Fuzzy Hash: 4d3d2b1a2f54673a8c9d4933fad4f0a555b725e5b2f635a2654508f41021eb4d
                        • Instruction Fuzzy Hash: B2219435600114EFCB15CF98CC65EEA7BB9EB49361F148069F605471A1C379AD91DB60
                        APIs
                        • GetFileAttributesW.KERNEL32(?,0071CB68), ref: 006ED2FB
                        • GetLastError.KERNEL32 ref: 006ED30A
                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 006ED319
                        • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0071CB68), ref: 006ED376
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CreateDirectory$AttributesErrorFileLast
                        • String ID:
                        • API String ID: 2267087916-0
                        • Opcode ID: 2f4172ccb3b0fe11fd72d85ed796b6c828893a4b3186a8091109b022c6fa225f
                        • Instruction ID: d7c2d6b21841dd35621ba13d8a942d847db297e4eb1db733f144a7e9f194c870
                        • Opcode Fuzzy Hash: 2f4172ccb3b0fe11fd72d85ed796b6c828893a4b3186a8091109b022c6fa225f
                        • Instruction Fuzzy Hash: F621D1B054A3019F8310EF69C8818AEB7E5EE56324F108A1DF499D72E1DB30D946CB97
                        APIs
                          • Part of subcall function 006E1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 006E102A
                          • Part of subcall function 006E1014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 006E1036
                          • Part of subcall function 006E1014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 006E1045
                          • Part of subcall function 006E1014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 006E104C
                          • Part of subcall function 006E1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 006E1062
                        • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 006E15BE
                        • _memcmp.LIBVCRUNTIME ref: 006E15E1
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 006E1617
                        • HeapFree.KERNEL32(00000000), ref: 006E161E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                        • String ID:
                        • API String ID: 1592001646-0
                        • Opcode ID: 81cdc8215f68a1446b562ce184d93ef7555cebd244edcec026bf8c2eb568597a
                        • Instruction ID: 5a62381dc01d47f44e86883075baaf44a99f4c797b0695c9c5f0c50b6c44581d
                        • Opcode Fuzzy Hash: 81cdc8215f68a1446b562ce184d93ef7555cebd244edcec026bf8c2eb568597a
                        • Instruction Fuzzy Hash: 1A21A171E41208EFDF00DFA5C945BEEB7B9EF45354F088459E445AB241D734AE09EB90
                        APIs
                        • GetWindowLongW.USER32(?,000000EC), ref: 0071280A
                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00712824
                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00712832
                        • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00712840
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Window$Long$AttributesLayered
                        • String ID:
                        • API String ID: 2169480361-0
                        • Opcode ID: cb67b5e0551f6f79a4e4099bd6a7f8ea583b2a91c286cab6768046a862c0fa1f
                        • Instruction ID: 9128c6840f562bc1f1398d83dd89be320351c258df5b1c0567da3009fdf0aff4
                        • Opcode Fuzzy Hash: cb67b5e0551f6f79a4e4099bd6a7f8ea583b2a91c286cab6768046a862c0fa1f
                        • Instruction Fuzzy Hash: AB21D331204111AFE7159B28C844FEA7B96AF85324F248258F5268B6E3CB79FC92C7D0
                        APIs
                          • Part of subcall function 006E8D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,006E790A,?,000000FF,?,006E8754,00000000,?,0000001C,?,?), ref: 006E8D8C
                          • Part of subcall function 006E8D7D: lstrcpyW.KERNEL32(00000000,?,?,006E790A,?,000000FF,?,006E8754,00000000,?,0000001C,?,?,00000000), ref: 006E8DB2
                          • Part of subcall function 006E8D7D: lstrcmpiW.KERNEL32(00000000,?,006E790A,?,000000FF,?,006E8754,00000000,?,0000001C,?,?), ref: 006E8DE3
                        • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,006E8754,00000000,?,0000001C,?,?,00000000), ref: 006E7923
                        • lstrcpyW.KERNEL32(00000000,?,?,006E8754,00000000,?,0000001C,?,?,00000000), ref: 006E7949
                        • lstrcmpiW.KERNEL32(00000002,cdecl,?,006E8754,00000000,?,0000001C,?,?,00000000), ref: 006E7984
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: lstrcmpilstrcpylstrlen
                        • String ID: cdecl
                        • API String ID: 4031866154-3896280584
                        • Opcode ID: 5b64f88737420eac5ca3d84409b39801413edb80c9a987145b3fd34f8b0c16f5
                        • Instruction ID: 28cc80b74e6d6e4e6e3168023b31a5585f1d46c6f7b463e1ac9288aa5f0ef141
                        • Opcode Fuzzy Hash: 5b64f88737420eac5ca3d84409b39801413edb80c9a987145b3fd34f8b0c16f5
                        • Instruction Fuzzy Hash: 1211063A201381AFCB155F79CC44EBA77AAFF45350B10802AF806C73A5EB319901D795
                        APIs
                        • GetWindowLongW.USER32(?,000000F0), ref: 00717D0B
                        • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00717D2A
                        • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00717D42
                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,006FB7AD,00000000), ref: 00717D6B
                          • Part of subcall function 00699BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00699BB2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Window$Long
                        • String ID:
                        • API String ID: 847901565-0
                        • Opcode ID: 97dee7d8730a169dde5e1fb7b418d90ca2b6a19d05e38868867094cf54137c04
                        • Instruction ID: 46bf89548cb5f93c9585c4d3fec9c2efb756f84d9111c953c0a23cdb5f12c2dd
                        • Opcode Fuzzy Hash: 97dee7d8730a169dde5e1fb7b418d90ca2b6a19d05e38868867094cf54137c04
                        • Instruction Fuzzy Hash: 5911D231204618AFCB148F6CDC04AE63BB5AF45365B118724F835DB2F0E7389DA0CB90
                        APIs
                        • SendMessageW.USER32(?,00001060,?,00000004), ref: 007156BB
                        • _wcslen.LIBCMT ref: 007156CD
                        • _wcslen.LIBCMT ref: 007156D8
                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00715816
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessageSend_wcslen
                        • String ID:
                        • API String ID: 455545452-0
                        • Opcode ID: e32762d1c9b9d2cdb39d5218a1ca0b1028036300e82b37f30cceb5768c6e601b
                        • Instruction ID: 76f389c2ea7ec7e7c16d9e6caf75670d84ba3f0e3f4d499d72838be133e2222b
                        • Opcode Fuzzy Hash: e32762d1c9b9d2cdb39d5218a1ca0b1028036300e82b37f30cceb5768c6e601b
                        • Instruction Fuzzy Hash: 0311E471600604DADB249F69CC85AEE776CAF91764B10806AF905D60C1EBB899C0CBA4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 37150d9303088d2db18999fe8d1bc81ba99e78a6e525778793202d3163aa24d4
                        • Instruction ID: 36df905096f3ead091685acb892dc376b43960b31ae2ed6e77438d5b41fe7e68
                        • Opcode Fuzzy Hash: 37150d9303088d2db18999fe8d1bc81ba99e78a6e525778793202d3163aa24d4
                        • Instruction Fuzzy Hash: 980126F220961A3EF61126B86CD0FE7261EDF427B8F74432AF520592D2DB60CC805374
                        APIs
                        • SendMessageW.USER32(?,000000B0,?,?), ref: 006E1A47
                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 006E1A59
                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 006E1A6F
                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 006E1A8A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID:
                        • API String ID: 3850602802-0
                        • Opcode ID: ff31a51e36e5d4bdc4094f147aa2094e8f521513d7d6174180e728c1f3d00653
                        • Instruction ID: 8b8f92d2d13c621ee4df1ad3e37d11e57cdc05c9f0d503ed2c01fc8e43438af1
                        • Opcode Fuzzy Hash: ff31a51e36e5d4bdc4094f147aa2094e8f521513d7d6174180e728c1f3d00653
                        • Instruction Fuzzy Hash: 78113C3AD01219FFEB11DBA9CD85FEDBB79EB04750F2000A1E600B7290D6716E50EB94
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 006EE1FD
                        • MessageBoxW.USER32(?,?,?,?), ref: 006EE230
                        • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 006EE246
                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 006EE24D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                        • String ID:
                        • API String ID: 2880819207-0
                        • Opcode ID: 0ac5688dd585dbabc6c0506d782553c167329d869d7cab1ca99a4bb8f9e44883
                        • Instruction ID: e01c19e6ca562a7b886f2ae324ff08ac7eded4eaffdbdb80a04a7d7a8afdbf44
                        • Opcode Fuzzy Hash: 0ac5688dd585dbabc6c0506d782553c167329d869d7cab1ca99a4bb8f9e44883
                        • Instruction Fuzzy Hash: 4211E576904358BFC7019FE89C05ADA7BAD9B45311F00C215F924D3290D2B98A0487A5
                        APIs
                        • CreateThread.KERNEL32(00000000,?,006ACFF9,00000000,00000004,00000000), ref: 006AD218
                        • GetLastError.KERNEL32 ref: 006AD224
                        • __dosmaperr.LIBCMT ref: 006AD22B
                        • ResumeThread.KERNEL32(00000000), ref: 006AD249
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Thread$CreateErrorLastResume__dosmaperr
                        • String ID:
                        • API String ID: 173952441-0
                        • Opcode ID: 7a51e5e502bdbfbc3a0345937c1ef0c4abaf9752b5e6a0f553ca5f62323a9ca6
                        • Instruction ID: f8bfd75458843b736ad27549ae7a2090c807251713be8fd0534f89119b4d2889
                        • Opcode Fuzzy Hash: 7a51e5e502bdbfbc3a0345937c1ef0c4abaf9752b5e6a0f553ca5f62323a9ca6
                        • Instruction Fuzzy Hash: 4C01C4764451047BC7117BA5DC09BEA7A6ADF83730F104229F926925D0DB708E01CAA5
                        APIs
                          • Part of subcall function 00699BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00699BB2
                        • GetClientRect.USER32(?,?), ref: 00719F31
                        • GetCursorPos.USER32(?), ref: 00719F3B
                        • ScreenToClient.USER32(?,?), ref: 00719F46
                        • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00719F7A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Client$CursorLongProcRectScreenWindow
                        • String ID:
                        • API String ID: 4127811313-0
                        • Opcode ID: 8c7ece84670ce1428db94be1a478b9f526f233eb77af47a9f724b01732a1dc59
                        • Instruction ID: 9d9451b7c79a34a6eb33b943b637556f94d7e15ab4f7acae7d34a49735a47674
                        • Opcode Fuzzy Hash: 8c7ece84670ce1428db94be1a478b9f526f233eb77af47a9f724b01732a1dc59
                        • Instruction Fuzzy Hash: A611363290021AFBDB11DFACC8599EE77BDEB05312F508455FA01E3180D378BA92CBA5
                        APIs
                        • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0068604C
                        • GetStockObject.GDI32(00000011), ref: 00686060
                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 0068606A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CreateMessageObjectSendStockWindow
                        • String ID:
                        • API String ID: 3970641297-0
                        • Opcode ID: 8c4290d99deaa933c93944417dec5f9f828051ec524e7ab6e9ddb779e30e5d08
                        • Instruction ID: 0601b40b87a89a4fb09e000ebe68fb25736f9aed276750c5b712a46f094a6277
                        • Opcode Fuzzy Hash: 8c4290d99deaa933c93944417dec5f9f828051ec524e7ab6e9ddb779e30e5d08
                        • Instruction Fuzzy Hash: 5C11AD72101508BFEF129FA4CD44EEABB7AEF083A4F008205FA0452160C7369C60EBA8
                        APIs
                        • ___BuildCatchObject.LIBVCRUNTIME ref: 006A3B56
                          • Part of subcall function 006A3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 006A3AD2
                          • Part of subcall function 006A3AA3: ___AdjustPointer.LIBCMT ref: 006A3AED
                        • _UnwindNestedFrames.LIBCMT ref: 006A3B6B
                        • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 006A3B7C
                        • CallCatchBlock.LIBVCRUNTIME ref: 006A3BA4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                        • String ID:
                        • API String ID: 737400349-0
                        • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                        • Instruction ID: c9af43de2258010d75510deb55238ab84220ae581e32587d281fada7fee7af48
                        • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                        • Instruction Fuzzy Hash: D6015732100148BBCF126E95CC42EEB7B6BEF9A754F044008FE0856221C732ED619FA4
                        APIs
                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,006813C6,00000000,00000000,?,006B301A,006813C6,00000000,00000000,00000000,?,006B328B,00000006,FlsSetValue), ref: 006B30A5
                        • GetLastError.KERNEL32(?,006B301A,006813C6,00000000,00000000,00000000,?,006B328B,00000006,FlsSetValue,00722290,FlsSetValue,00000000,00000364,?,006B2E46), ref: 006B30B1
                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,006B301A,006813C6,00000000,00000000,00000000,?,006B328B,00000006,FlsSetValue,00722290,FlsSetValue,00000000), ref: 006B30BF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: LibraryLoad$ErrorLast
                        • String ID:
                        • API String ID: 3177248105-0
                        • Opcode ID: e0838f481d2058a0687c9c27830d7d0fe8ebf0d9c4d619c9436924de5804cff7
                        • Instruction ID: 23c47ff5414f0aafd9ebc470ef9680c43f9b2900e0cc91c1b1a5d2d4abafb31a
                        • Opcode Fuzzy Hash: e0838f481d2058a0687c9c27830d7d0fe8ebf0d9c4d619c9436924de5804cff7
                        • Instruction Fuzzy Hash: D601FC76795332ABC7315BBC9C449D77799AF05761B108620F905D3380C725D981C7E4
                        APIs
                        • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 006E747F
                        • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 006E7497
                        • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 006E74AC
                        • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 006E74CA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Type$Register$FileLoadModuleNameUser
                        • String ID:
                        • API String ID: 1352324309-0
                        • Opcode ID: 635fe41fb4dc511e5c3d917c89ecf3883794e7c2d558ad89d0a727ff3f262c85
                        • Instruction ID: 2d6c11f0fcc9abb8f8f25fa2ce0cc0cb8de0e58bf169daaa20214c9ec4cee9c1
                        • Opcode Fuzzy Hash: 635fe41fb4dc511e5c3d917c89ecf3883794e7c2d558ad89d0a727ff3f262c85
                        • Instruction Fuzzy Hash: FF118EB524A358EBE720CF59DC08B927FFDEB00B00F10C569AA16D61D1D774E905DB50
                        APIs
                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,006EACD3,?,00008000), ref: 006EB0C4
                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,006EACD3,?,00008000), ref: 006EB0E9
                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,006EACD3,?,00008000), ref: 006EB0F3
                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,006EACD3,?,00008000), ref: 006EB126
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CounterPerformanceQuerySleep
                        • String ID:
                        • API String ID: 2875609808-0
                        • Opcode ID: 76a8589a0f2802fdedd844819b1bfef6991a8dbd6c3b752bd8cf4fb513516727
                        • Instruction ID: 3d8972ecce3ebe43d379ce3ea2c525e920f3d85df95a81a107be794ad7b188c3
                        • Opcode Fuzzy Hash: 76a8589a0f2802fdedd844819b1bfef6991a8dbd6c3b752bd8cf4fb513516727
                        • Instruction Fuzzy Hash: 86117C70C4265CE7CF00AFE9E9596EFBB79FF0A320F008086D941B3281CB3456509B55
                        APIs
                        • GetWindowRect.USER32(?,?), ref: 00717E33
                        • ScreenToClient.USER32(?,?), ref: 00717E4B
                        • ScreenToClient.USER32(?,?), ref: 00717E6F
                        • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00717E8A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ClientRectScreen$InvalidateWindow
                        • String ID:
                        • API String ID: 357397906-0
                        • Opcode ID: 1eb6e08d75fce7c71f865bea5cc8fc4495f612cee330bfe9da7bbea65c1cf7f4
                        • Instruction ID: 9c0d4f846986cbc9d4bfed2254a9e04b45e307d3d7e489e31e1280d6ab50b38e
                        • Opcode Fuzzy Hash: 1eb6e08d75fce7c71f865bea5cc8fc4495f612cee330bfe9da7bbea65c1cf7f4
                        • Instruction Fuzzy Hash: 2F1153B9D0020AAFDB41CF98C884AEEBBF9FF08310F509066E915E3250D775AA54CF94
                        APIs
                        • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 006E2DC5
                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 006E2DD6
                        • GetCurrentThreadId.KERNEL32 ref: 006E2DDD
                        • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 006E2DE4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                        • String ID:
                        • API String ID: 2710830443-0
                        • Opcode ID: 0c1f4dd61bfc14c9708ec744e57dadb97cd90c4d35c6d4edd5c0dbf04fe7975d
                        • Instruction ID: 10d41059dfd4c69de5d69eb973867965a57a78a7c9662bb45c007c18de480ad9
                        • Opcode Fuzzy Hash: 0c1f4dd61bfc14c9708ec744e57dadb97cd90c4d35c6d4edd5c0dbf04fe7975d
                        • Instruction Fuzzy Hash: C1E092715823247BD7211BB79C0EFEB7E6EEF42BA1F008115F205D10C0DAA8C841CAB1
                        APIs
                          • Part of subcall function 00699639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00699693
                          • Part of subcall function 00699639: SelectObject.GDI32(?,00000000), ref: 006996A2
                          • Part of subcall function 00699639: BeginPath.GDI32(?), ref: 006996B9
                          • Part of subcall function 00699639: SelectObject.GDI32(?,00000000), ref: 006996E2
                        • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00718887
                        • LineTo.GDI32(?,?,?), ref: 00718894
                        • EndPath.GDI32(?), ref: 007188A4
                        • StrokePath.GDI32(?), ref: 007188B2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                        • String ID:
                        • API String ID: 1539411459-0
                        • Opcode ID: d0dfa5bf207e4016c02ef6de85605ac0cab0408dbeb244a7de9c689d11240480
                        • Instruction ID: 79296ff4a174b098c19d358e0fde0bafd9ed3a466ba59c1816f42ababbef7693
                        • Opcode Fuzzy Hash: d0dfa5bf207e4016c02ef6de85605ac0cab0408dbeb244a7de9c689d11240480
                        • Instruction Fuzzy Hash: 4BF03A36081298BAEB135F98AC0AFCA3B59AF0A311F44C000FA11651E1C7B95651DBED
                        APIs
                        • GetSysColor.USER32(00000008), ref: 006998CC
                        • SetTextColor.GDI32(?,?), ref: 006998D6
                        • SetBkMode.GDI32(?,00000001), ref: 006998E9
                        • GetStockObject.GDI32(00000005), ref: 006998F1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Color$ModeObjectStockText
                        • String ID:
                        • API String ID: 4037423528-0
                        • Opcode ID: e8ed484359a931e9908a804aebd49bd4b1f9678fd9bf64132ee8c9f6fd43f55f
                        • Instruction ID: cead5b7156812ee6d8603b2a94b330b80c044e385a2637911daa13675cead0c5
                        • Opcode Fuzzy Hash: e8ed484359a931e9908a804aebd49bd4b1f9678fd9bf64132ee8c9f6fd43f55f
                        • Instruction Fuzzy Hash: EBE065316C4244BADB225BB8BC09BD83F51AB11335F14C21AF6F5541E1C77546509B11
                        APIs
                        • GetCurrentThread.KERNEL32 ref: 006E1634
                        • OpenThreadToken.ADVAPI32(00000000,?,?,?,006E11D9), ref: 006E163B
                        • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,006E11D9), ref: 006E1648
                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,006E11D9), ref: 006E164F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CurrentOpenProcessThreadToken
                        • String ID:
                        • API String ID: 3974789173-0
                        • Opcode ID: 1680b44f42fbbd897eb7205abb4f845dc44a634583769c273097b6fdbcfe4f6f
                        • Instruction ID: c4e8bb804bd057b01356be96622cd1c2a3871adf69bdb7ba812ff62a1435a99b
                        • Opcode Fuzzy Hash: 1680b44f42fbbd897eb7205abb4f845dc44a634583769c273097b6fdbcfe4f6f
                        • Instruction Fuzzy Hash: FEE04632682221ABD7201BE9AE0DBC63B79BF49792F15C808F245CA0C0E63885408B68
                        APIs
                        • GetDesktopWindow.USER32 ref: 006DD858
                        • GetDC.USER32(00000000), ref: 006DD862
                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 006DD882
                        • ReleaseDC.USER32(?), ref: 006DD8A3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CapsDesktopDeviceReleaseWindow
                        • String ID:
                        • API String ID: 2889604237-0
                        • Opcode ID: 82818f4831758a338fb22571be3209e2bf0a4b17500dfa1849ae4513dbc52d14
                        • Instruction ID: a140a6499411def49f8d62fd86d0d0f3c406c6cd6a7ffa1887575ac8243d16e8
                        • Opcode Fuzzy Hash: 82818f4831758a338fb22571be3209e2bf0a4b17500dfa1849ae4513dbc52d14
                        • Instruction Fuzzy Hash: 1AE01AB4C40204EFCF42AFE4D8086ADBBB6FF08310F10D019E90AE7290C7388902AF54
                        APIs
                        • GetDesktopWindow.USER32 ref: 006DD86C
                        • GetDC.USER32(00000000), ref: 006DD876
                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 006DD882
                        • ReleaseDC.USER32(?), ref: 006DD8A3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CapsDesktopDeviceReleaseWindow
                        • String ID:
                        • API String ID: 2889604237-0
                        • Opcode ID: e7ba6ca97e6f6c052b1f10f9e666e6939ebab349ca53ccc51e7b9c888471a501
                        • Instruction ID: 204a21cfd1c51c1972e11da25b8660ce0217474e6049f13f5a705290624f44b6
                        • Opcode Fuzzy Hash: e7ba6ca97e6f6c052b1f10f9e666e6939ebab349ca53ccc51e7b9c888471a501
                        • Instruction Fuzzy Hash: F5E09A75C40204DFCF52AFE4D8086ADBBB6BF48315B14D459E94AE7290C73C99019F54
                        APIs
                          • Part of subcall function 00687620: _wcslen.LIBCMT ref: 00687625
                        • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 006F4ED4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Connection_wcslen
                        • String ID: *$LPT
                        • API String ID: 1725874428-3443410124
                        • Opcode ID: e54730685fcecae680f0c289974c7143501a13a73579f1b6c32b57ca493a2107
                        • Instruction ID: 45319c7bafcd68504e212eb3a9edc1c8349f1e2c73f4689c438600f90b252e87
                        • Opcode Fuzzy Hash: e54730685fcecae680f0c289974c7143501a13a73579f1b6c32b57ca493a2107
                        • Instruction Fuzzy Hash: 2C916F75A012089FCB14DF58C484EBABBF2BF85314F148099E50A9F762DB35ED85CB91
                        APIs
                        • __startOneArgErrorHandling.LIBCMT ref: 006AE30D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ErrorHandling__start
                        • String ID: pow
                        • API String ID: 3213639722-2276729525
                        • Opcode ID: 3949f22ff25feb42d3a0b3f994997b496c8c1bca627fa5e848a1ab410c6a4c1e
                        • Instruction ID: f295f1f3960d19dd2c89a5cd03e605c6b8b5c4a2cc1f69a8b116b7f25e0cbe04
                        • Opcode Fuzzy Hash: 3949f22ff25feb42d3a0b3f994997b496c8c1bca627fa5e848a1ab410c6a4c1e
                        • Instruction Fuzzy Hash: F2513DA1A0C20296CB157714C9413F93BA7EF91781F34899CE095423E9EB36CDD79F4A
                        APIs
                        • CharUpperBuffW.USER32(006D569E,00000000,?,0071CC08,?,00000000,00000000), ref: 007078DD
                          • Part of subcall function 00686B57: _wcslen.LIBCMT ref: 00686B6A
                        • CharUpperBuffW.USER32(006D569E,00000000,?,0071CC08,00000000,?,00000000,00000000), ref: 0070783B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: BuffCharUpper$_wcslen
                        • String ID: <st
                        • API String ID: 3544283678-2169133814
                        • Opcode ID: cfa57dd62f88dacd5c7c20ae1a7a4186dbe2c45abd4efb1e7f3300811c379e38
                        • Instruction ID: 9245d258fc5f90cce771faa8ec443428b1e9a73ebdc8755ceeaab45da0100b7b
                        • Opcode Fuzzy Hash: cfa57dd62f88dacd5c7c20ae1a7a4186dbe2c45abd4efb1e7f3300811c379e38
                        • Instruction Fuzzy Hash: 87613D72924129EBCF48FBE4CC91DFDB3B9BF14700B544629F542A7191EF286A05CBA4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID: #
                        • API String ID: 0-1885708031
                        • Opcode ID: b530266ee5f28f51d916242657c9fe7d97283441c6ef95e677ee174aed143d2e
                        • Instruction ID: 9e0708c411d33a820912362c4cb6882a8528ad09180e24c01627ff1db12c5a98
                        • Opcode Fuzzy Hash: b530266ee5f28f51d916242657c9fe7d97283441c6ef95e677ee174aed143d2e
                        • Instruction Fuzzy Hash: A9513475900246DFDF55EF68C481AFA7BAAEF15310F24805AE8919F3D0D6369E43CBA0
                        APIs
                        • Sleep.KERNEL32(00000000), ref: 0069F2A2
                        • GlobalMemoryStatusEx.KERNEL32(?), ref: 0069F2BB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: GlobalMemorySleepStatus
                        • String ID: @
                        • API String ID: 2783356886-2766056989
                        • Opcode ID: 1862765d1253cc416ba2374a89d97939141a2d03306230ca8c65da5c74bd1335
                        • Instruction ID: 64aec774e9c9a2e32c3af54cfc2aaf36aa140ae8c2874438281fefb2e66b1796
                        • Opcode Fuzzy Hash: 1862765d1253cc416ba2374a89d97939141a2d03306230ca8c65da5c74bd1335
                        • Instruction Fuzzy Hash: 685167714087449BE360AF10E886BABBBF9FF84314F91894DF29951095EB309529CB6A
                        APIs
                        • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 007057E0
                        • _wcslen.LIBCMT ref: 007057EC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: BuffCharUpper_wcslen
                        • String ID: CALLARGARRAY
                        • API String ID: 157775604-1150593374
                        • Opcode ID: 6adcb11efafb9eafb32c48834a22a02e7d2ac7207bed7c04bde1d67b7034b1df
                        • Instruction ID: 2e959bd89b11f15f75b01f633636eeb4a8ba5ec77c542f435c4c19be7958833f
                        • Opcode Fuzzy Hash: 6adcb11efafb9eafb32c48834a22a02e7d2ac7207bed7c04bde1d67b7034b1df
                        • Instruction Fuzzy Hash: A1417D71A00209DFCB04DFA9C8858AEBBF9EF59310B14826DE905A72D1E7749D81CFA4
                        APIs
                        • _wcslen.LIBCMT ref: 006FD130
                        • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 006FD13A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CrackInternet_wcslen
                        • String ID: |
                        • API String ID: 596671847-2343686810
                        • Opcode ID: da8e4c2f331d0cc93cbcd847310b6d780efc073282af59ec08ff1087bbb0b545
                        • Instruction ID: 20b4c28335c000825676cd0b8e248c47bd6ebc125baa50733245a23fb0565e15
                        • Opcode Fuzzy Hash: da8e4c2f331d0cc93cbcd847310b6d780efc073282af59ec08ff1087bbb0b545
                        • Instruction Fuzzy Hash: 40313E71D00209ABCF55EFA4CC85AEEBFBBFF05304F000119F915A6265DB31AA16DB64
                        APIs
                        • DestroyWindow.USER32(?,?,?,?), ref: 00713621
                        • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0071365C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Window$DestroyMove
                        • String ID: static
                        • API String ID: 2139405536-2160076837
                        • Opcode ID: 050c3987deb4deb126bb04ece7f1cec25659f9a76a34ca030320486b00353753
                        • Instruction ID: 24b52b0319114228952507e93b55313cf4e4d72a125f5f6c571c2bb30bd234d6
                        • Opcode Fuzzy Hash: 050c3987deb4deb126bb04ece7f1cec25659f9a76a34ca030320486b00353753
                        • Instruction Fuzzy Hash: 20319C71100204AEEB20DF78DC80EFB73A9FF88764F10861DF9A597280DA38AD91D764
                        APIs
                        • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 0071461F
                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00714634
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: '
                        • API String ID: 3850602802-1997036262
                        • Opcode ID: c9a3bb95c86709c91b6a2898f5415f58451268ab166c6aeed84a4d03faae003d
                        • Instruction ID: 5c6e0633093ff24defa932a563807b21f9e4f5dc240448f28b5b8e283e501b4e
                        • Opcode Fuzzy Hash: c9a3bb95c86709c91b6a2898f5415f58451268ab166c6aeed84a4d03faae003d
                        • Instruction Fuzzy Hash: 31313874A0030A9FDF14CFA9C980BDA7BB6FF09304F14406AE904AB381D774A991CF90
                        APIs
                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0071327C
                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00713287
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: Combobox
                        • API String ID: 3850602802-2096851135
                        • Opcode ID: c5ad5083ea64c57dfb285a92a63761e7fab43f1c751f0f0302fd49454f4b4eb1
                        • Instruction ID: 143846895865adb55c874f8efd6e112b57b1fa734e89a660ce02fb1a754a212e
                        • Opcode Fuzzy Hash: c5ad5083ea64c57dfb285a92a63761e7fab43f1c751f0f0302fd49454f4b4eb1
                        • Instruction Fuzzy Hash: EA118271300208BFEF25AE98DC85EFB376BFB98364F104229F918972D0D6799D919760
                        APIs
                          • Part of subcall function 0068600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0068604C
                          • Part of subcall function 0068600E: GetStockObject.GDI32(00000011), ref: 00686060
                          • Part of subcall function 0068600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0068606A
                        • GetWindowRect.USER32(00000000,?), ref: 0071377A
                        • GetSysColor.USER32(00000012), ref: 00713794
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Window$ColorCreateMessageObjectRectSendStock
                        • String ID: static
                        • API String ID: 1983116058-2160076837
                        • Opcode ID: 8432e439a21ca0807780dc39103749e184b1b98065858ed23a25691053f09b1d
                        • Instruction ID: 61da0d0496ca9e69391961c7053b0afbffbe979f92a4f8924f9b991c33ace907
                        • Opcode Fuzzy Hash: 8432e439a21ca0807780dc39103749e184b1b98065858ed23a25691053f09b1d
                        • Instruction Fuzzy Hash: 1E113AB2610209AFDF11DFBCCC45EEA7BB9FB08314F004514F955E2290D779E9519B50
                        APIs
                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 006FCD7D
                        • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 006FCDA6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Internet$OpenOption
                        • String ID: <local>
                        • API String ID: 942729171-4266983199
                        • Opcode ID: bc984c6dfd36d8514c51eed5a98c5365b51d515c78dd150647c9c747db631811
                        • Instruction ID: 1d36f391f1ccfc69a71b4838d40614a60154e9a151060147745834b38ba78035
                        • Opcode Fuzzy Hash: bc984c6dfd36d8514c51eed5a98c5365b51d515c78dd150647c9c747db631811
                        • Instruction Fuzzy Hash: B511C67124563DBAD7344B668C45EFBBEAEEF527B4F004226B20983180D7749841D6F0
                        APIs
                        • GetWindowTextLengthW.USER32(00000000), ref: 007134AB
                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 007134BA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: LengthMessageSendTextWindow
                        • String ID: edit
                        • API String ID: 2978978980-2167791130
                        • Opcode ID: e52094a261f27dc6bb00a4229023ba84f013b793918b8648d18bbe4987fc31ff
                        • Instruction ID: bf329229191e5724c86ad9dfe2237b93f89b956aa769eba45792eef183f67b96
                        • Opcode Fuzzy Hash: e52094a261f27dc6bb00a4229023ba84f013b793918b8648d18bbe4987fc31ff
                        • Instruction Fuzzy Hash: AD118F71100248AFEB228E68DC44AFB376AEB15774F508324FD65931D0C779EC919754
                        APIs
                          • Part of subcall function 00689CB3: _wcslen.LIBCMT ref: 00689CBD
                        • CharUpperBuffW.USER32(?,?,?), ref: 006E6CB6
                        • _wcslen.LIBCMT ref: 006E6CC2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _wcslen$BuffCharUpper
                        • String ID: STOP
                        • API String ID: 1256254125-2411985666
                        • Opcode ID: 7cc19f54e2ce38b25e507b51577733013e4328466822ef5873410a964696cb66
                        • Instruction ID: b615eea7c91ee704fcb82524d29b539a2d7aefb2016cc6ddbf611bfe33bfb998
                        • Opcode Fuzzy Hash: 7cc19f54e2ce38b25e507b51577733013e4328466822ef5873410a964696cb66
                        • Instruction Fuzzy Hash: C401E1326016668A8B20AEBECC818FF77A7EE71B907600928F85292291EA31D8008750
                        APIs
                          • Part of subcall function 00689CB3: _wcslen.LIBCMT ref: 00689CBD
                          • Part of subcall function 006E3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 006E3CCA
                        • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 006E1D4C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 624084870-1403004172
                        • Opcode ID: dd8504e6261762ced6945183226f69ba32aa9bceeb08b248853e04857d454f2f
                        • Instruction ID: fe5262c9b44dcad5eb1488bde4055023c1c8649fa058de3c7fe09388138fb022
                        • Opcode Fuzzy Hash: dd8504e6261762ced6945183226f69ba32aa9bceeb08b248853e04857d454f2f
                        • Instruction Fuzzy Hash: 8F01B5B1642358ABCB08FBA5CC55CFE736AEF47750B140A1DB8226B3C1EA3159099764
                        APIs
                          • Part of subcall function 00689CB3: _wcslen.LIBCMT ref: 00689CBD
                          • Part of subcall function 006E3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 006E3CCA
                        • SendMessageW.USER32(?,00000180,00000000,?), ref: 006E1C46
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 624084870-1403004172
                        • Opcode ID: aa68d74c10e3145b8c2f6fc9890115d66a04845c5dcf8d4abe7c93e69548a5ec
                        • Instruction ID: ef4c8a0303f69b95dfe047c99797c332228e8cfa1bf633f44b8f29e731e31e1d
                        • Opcode Fuzzy Hash: aa68d74c10e3145b8c2f6fc9890115d66a04845c5dcf8d4abe7c93e69548a5ec
                        • Instruction Fuzzy Hash: AF01A7B57822446BCB08FB91C955DFF77AA9B12740F24001DB416B72C2EA399E08D7B5
                        APIs
                          • Part of subcall function 00689CB3: _wcslen.LIBCMT ref: 00689CBD
                          • Part of subcall function 006E3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 006E3CCA
                        • SendMessageW.USER32(?,00000182,?,00000000), ref: 006E1CC8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 624084870-1403004172
                        • Opcode ID: 0ae1a61d27f07e39833a90de8b2e10958181c658b3d69930e743874c30be00dd
                        • Instruction ID: bb95d0ff44c034660ec9d0e42c2234f29be05c59e14fe1ff12ed721ca32b6bb2
                        • Opcode Fuzzy Hash: 0ae1a61d27f07e39833a90de8b2e10958181c658b3d69930e743874c30be00dd
                        • Instruction Fuzzy Hash: AB01DBB16C225467CB04F795CA15EFE73AA9B12740F240019B802B7381EA359F08D775
                        APIs
                        • __Init_thread_footer.LIBCMT ref: 0069A529
                          • Part of subcall function 00689CB3: _wcslen.LIBCMT ref: 00689CBD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Init_thread_footer_wcslen
                        • String ID: ,%u$3ym
                        • API String ID: 2551934079-933350230
                        • Opcode ID: a94c7fbe6a2add9b08dc93d7ff964073bcdc2d9444773fb1e1c9ba8e1f47ce1d
                        • Instruction ID: 19e7b1561203345458d86f18db9ec915cc77ef26d922711e76d4121bcbc803b1
                        • Opcode Fuzzy Hash: a94c7fbe6a2add9b08dc93d7ff964073bcdc2d9444773fb1e1c9ba8e1f47ce1d
                        • Instruction Fuzzy Hash: DA014232B002108BCA44F7A8D81BAFD33AADB06B11F41006CF902576C3EE549D028AEF
                        APIs
                          • Part of subcall function 00689CB3: _wcslen.LIBCMT ref: 00689CBD
                          • Part of subcall function 006E3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 006E3CCA
                        • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 006E1DD3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 624084870-1403004172
                        • Opcode ID: 82f61b68b8f32f7febdd1e40db9310dd843c2ce02152ba3ffb2a5888f16a2818
                        • Instruction ID: 45b34b487ae522913c7b3ba218c170873b1cf54cacdc1726d551716846b456af
                        • Opcode Fuzzy Hash: 82f61b68b8f32f7febdd1e40db9310dd843c2ce02152ba3ffb2a5888f16a2818
                        • Instruction Fuzzy Hash: D0F0F4B1A4231867CB08F7A5CC56EFE7379AF02740F080A19B822672C2EA7199088774
                        APIs
                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00753018,0075305C), ref: 007181BF
                        • CloseHandle.KERNEL32 ref: 007181D1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CloseCreateHandleProcess
                        • String ID: \0u
                        • API String ID: 3712363035-1708047750
                        • Opcode ID: e725d6cea646c78a91db4c5c407bf1cc6148d32a476713e54f6ddefa48a6a24b
                        • Instruction ID: 305b35d607d11636861279a11a4c1dd58f8328645d02ffa9ce6dea9405fdfdac
                        • Opcode Fuzzy Hash: e725d6cea646c78a91db4c5c407bf1cc6148d32a476713e54f6ddefa48a6a24b
                        • Instruction Fuzzy Hash: 89F09AB1680300BAE2216768AC05FF73A4EDB05792F008025BA0CD50F2E6AE8E0086ED
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: _wcslen
                        • String ID: 3, 3, 16, 1
                        • API String ID: 176396367-3042988571
                        • Opcode ID: bdbda8909cecf31b4f28240241f8714d5beef59d4a87b8b9cb9f50bd4a1f7a88
                        • Instruction ID: 9811a7b2509fe327e1fffa2109d0ce03a5464775ee2fead5448789a4cdcca5bf
                        • Opcode Fuzzy Hash: bdbda8909cecf31b4f28240241f8714d5beef59d4a87b8b9cb9f50bd4a1f7a88
                        • Instruction Fuzzy Hash: FEE02B02A042A090D27926799CC197F97CECFC6750710182FF981C22A6EFD89DA1D3E4
                        APIs
                        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 006E0B23
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Message
                        • String ID: AutoIt$Error allocating memory.
                        • API String ID: 2030045667-4017498283
                        • Opcode ID: ddc675e80bca7f91277bfc019159543074fed79547fee85e08ad1b1bb6408d43
                        • Instruction ID: 5eaa56d95b9e7b61c1a6e8eff16501ff1ceea618e05574a20ee0558408fd8774
                        • Opcode Fuzzy Hash: ddc675e80bca7f91277bfc019159543074fed79547fee85e08ad1b1bb6408d43
                        • Instruction Fuzzy Hash: 2AE0D83128430837D6513798BC03FC97A8A9F06F10F10442EF758955C38BD6289046ED
                        APIs
                          • Part of subcall function 0069F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,006A0D71,?,?,?,0068100A), ref: 0069F7CE
                        • IsDebuggerPresent.KERNEL32(?,?,?,0068100A), ref: 006A0D75
                        • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0068100A), ref: 006A0D84
                        Strings
                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 006A0D7F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                        • API String ID: 55579361-631824599
                        • Opcode ID: 152904382b5ef663f7ca59584964c391d8e6ceb554c56db5279aeacae53df60e
                        • Instruction ID: 1f3333efebfeb1cb5405b9d35855d6e646e0c0c31137a71ec1659ba74c3a1523
                        • Opcode Fuzzy Hash: 152904382b5ef663f7ca59584964c391d8e6ceb554c56db5279aeacae53df60e
                        • Instruction Fuzzy Hash: 51E065742007014BE760BFBCD8043827BE5BF01741F00892DE485C6691D7F8E4488F91
                        APIs
                        • __Init_thread_footer.LIBCMT ref: 0069E3D5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Init_thread_footer
                        • String ID: 0%u$8%u
                        • API String ID: 1385522511-2666027011
                        • Opcode ID: 4a63a69ac008a68e295adf3177d1e8bb6cb0722e5f8ea2957a6a2842221f8d86
                        • Instruction ID: f7384aa9336937fdeb71513cc2e864d8ad851ad887d536dbb0043944dbfb998f
                        • Opcode Fuzzy Hash: 4a63a69ac008a68e295adf3177d1e8bb6cb0722e5f8ea2957a6a2842221f8d86
                        • Instruction Fuzzy Hash: 05E0D835408A188BCE04EB18F454AC8335BAB1732171041F9E40147592EBB91C43854C
                        APIs
                        • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 006F302F
                        • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 006F3044
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: Temp$FileNamePath
                        • String ID: aut
                        • API String ID: 3285503233-3010740371
                        • Opcode ID: e195a337b1a4b058d85297be818be3ebc41beaa7d39ba2c18598113fc199272d
                        • Instruction ID: f23021ef4bf01749f8fd67a3d40b0c5cfffb3672d2fdaab7744c514e8a0f53d8
                        • Opcode Fuzzy Hash: e195a337b1a4b058d85297be818be3ebc41beaa7d39ba2c18598113fc199272d
                        • Instruction Fuzzy Hash: D3D05EB254032867DA20A7E8AC0EFCB3A6CEB05750F0082A1B655E60D1DAF89984CAD4
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: LocalTime
                        • String ID: %.3d$X64
                        • API String ID: 481472006-1077770165
                        • Opcode ID: f86dd0b336c5b243a4b56588c9644bdbe4fff4cea57b13000e37c1ba34aa3f33
                        • Instruction ID: 03c6b87efcda356eb64b8d4b65c0c801ecad833ca2d335811e58d52d095959da
                        • Opcode Fuzzy Hash: f86dd0b336c5b243a4b56588c9644bdbe4fff4cea57b13000e37c1ba34aa3f33
                        • Instruction Fuzzy Hash: 46D012A1C48108FACF90ABD0CC45CF9B37DBB18341F508463FA06D1140D738C60AA761
                        APIs
                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0071236C
                        • PostMessageW.USER32(00000000), ref: 00712373
                          • Part of subcall function 006EE97B: Sleep.KERNEL32 ref: 006EE9F3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: FindMessagePostSleepWindow
                        • String ID: Shell_TrayWnd
                        • API String ID: 529655941-2988720461
                        • Opcode ID: 30ad98d418fb271feb4b7e8bee9503f8853162435de500089f17081b4ecd587a
                        • Instruction ID: 0aed1d29f673c2123fc65fa40f82cf1b51db4416403a121c18f3d88029eef8f3
                        • Opcode Fuzzy Hash: 30ad98d418fb271feb4b7e8bee9503f8853162435de500089f17081b4ecd587a
                        • Instruction Fuzzy Hash: 03D0A9323C13007BE2A5A3B0DC0FFC6A6059B00B00F0089067201AA0D0C9A8A800CA08
                        APIs
                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0071232C
                        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0071233F
                          • Part of subcall function 006EE97B: Sleep.KERNEL32 ref: 006EE9F3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: FindMessagePostSleepWindow
                        • String ID: Shell_TrayWnd
                        • API String ID: 529655941-2988720461
                        • Opcode ID: 2abbd2e2bcf69a48a52744af586585aff3c616dfd992fda24f0524abdd848f5f
                        • Instruction ID: 7b26fc4b49d74d0bcb96432727665dc6a7e3f1e741403a96837c1b7806f35956
                        • Opcode Fuzzy Hash: 2abbd2e2bcf69a48a52744af586585aff3c616dfd992fda24f0524abdd848f5f
                        • Instruction Fuzzy Hash: 6DD022323C0300BBE2A4B3B0DC0FFC6BA059B00B00F00C9067305AA0D0C9F8A800CA08
                        APIs
                        • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 006BBE93
                        • GetLastError.KERNEL32 ref: 006BBEA1
                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 006BBEFC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2021244954.0000000000681000.00000020.00000001.01000000.00000003.sdmp, Offset: 00680000, based on PE: true
                        • Associated: 00000000.00000002.2021231418.0000000000680000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.000000000071C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021293704.0000000000742000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021363298.000000000074C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2021434838.0000000000754000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_680000_file.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$ErrorLast
                        • String ID:
                        • API String ID: 1717984340-0
                        • Opcode ID: ef9ab3fe1f4876b930dbc48316d9048e0a889606cd286809afc2c266f0d9a8f2
                        • Instruction ID: 44045072680f2b0c06b642b8aa56c2a9de662175b4009630a2927e66cde80c2e
                        • Opcode Fuzzy Hash: ef9ab3fe1f4876b930dbc48316d9048e0a889606cd286809afc2c266f0d9a8f2
                        • Instruction Fuzzy Hash: 434149B4600206AFCF218FA4CC44AFA7BAAEF02350F14916DF959972A1DBB08D81CF51