Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1523185
MD5:ae543423edfe9428f33208d64ae7c680
SHA1:612206a41dc3b1510f9faab1aae9b8a896145630
SHA256:f0a75b1a1253e778feb63f69402b3b0276b964470251dcc2160b90ba0868f57c
Tags:exeuser-Bitsight
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection

Classification

  • System is w10x64
  • file.exe (PID: 4788 cmdline: "C:\Users\user\Desktop\file.exe" MD5: AE543423EDFE9428F33208D64AE7C680)
    • chrome.exe (PID: 1876 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecovery MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 1560 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1980,i,8398794096650981881,14612666716366114694,262144 --disable-features=CrashRecovery /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 8100 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5660 --field-trial-handle=1980,i,8398794096650981881,14612666716366114694,262144 --disable-features=CrashRecovery /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 8108 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 --field-trial-handle=1980,i,8398794096650981881,14612666716366114694,262144 --disable-features=CrashRecovery /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: file.exeJoe Sandbox ML: detected
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49754 version: TLS 1.0
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.5:49717 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.5:49721 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.5:49747 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.5:49760 version: TLS 1.2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F0DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00F0DBBE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EDC2A2 FindFirstFileExW,0_2_00EDC2A2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F168EE FindFirstFileW,FindClose,0_2_00F168EE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F1698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00F1698F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F0D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F0D076
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F0D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F0D3A9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F19642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F19642
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F1979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F1979D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F19B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00F19B2B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F15C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00F15C97
Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
Source: Joe Sandbox ViewJA3 fingerprint: 1138de370e523e824bbca92d049a3777
Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49754 version: TLS 1.0
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F1CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_00F1CE44
Source: global trafficHTTP traffic detected: GET /account?=https://accounts.google.com/v3/signin/challenge/pwd HTTP/1.1Host: youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlKHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1Host: www.youtube.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlKHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentsec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: global trafficHTTP traffic detected: GET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=-598098695&timestamp=1727766004299 HTTP/1.1Host: accounts.youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-arch: "x86"sec-ch-ua-platform: "Windows"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-model: ""sec-ch-ua-bitness: "64"sec-ch-ua-wow64: ?0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlKHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: iframeReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: www.google.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlKHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=Sec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: NID=518=IdT-Qcmn7n5AOYo3UUgUPDOTcED57Yh4bNnRoWBBa3mvlmw6bPNd_uqFCH28ZWab_x83IbSIZRKK5TeGNrvRx5LQfZe6NGxExkt4eYunJrMdvakBVo-5s5kVe-gL2ei-QL8EDDj62Jkmov4gh_poOhblMjkzktrQQmiNbiiPwwOxrYtZvFQ
Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=vMVG9GWPLDo4GCK&MD=z5Ml3TX9 HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=vMVG9GWPLDo4GCK&MD=z5Ml3TX9 HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: chromecache_94.4.drString found in binary or memory: _.iq(p)+"/familylink/privacy/notice/embedded?langCountry="+_.iq(p);break;case "PuZJUb":a+="https://www.youtube.com/t/terms?chromeless=1&hl="+_.iq(m);break;case "fxTQxb":a+="https://youtube.com/t/terms?gl="+_.iq(_.rq(c))+"&hl="+_.iq(d)+"&override_hl=1"+(f?"&linkless=1":"");break;case "prAmvd":a+="https://www.google.com/intl/"+_.iq(m)+"/chromebook/termsofservice.html?languageCode="+_.iq(d)+"&regionCode="+_.iq(c);break;case "NfnTze":a+="https://policies.google.com/privacy/google-partners"+(f?"/embedded": equals www.youtube.com (Youtube)
Source: global trafficDNS traffic detected: DNS query: youtube.com
Source: global trafficDNS traffic detected: DNS query: www.youtube.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: accounts.youtube.com
Source: global trafficDNS traffic detected: DNS query: play.google.com
Source: unknownHTTP traffic detected: POST /log?format=json&hasfast=true&authuser=0 HTTP/1.1Host: play.google.comConnection: keep-aliveContent-Length: 519sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"Content-Type: application/x-www-form-urlencoded;charset=UTF-8sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-platform-version: "10.0.0"X-Goog-AuthUser: 0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: */*Origin: https://accounts.google.comX-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlKHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: chromecache_94.4.drString found in binary or memory: https://accounts.google.com
Source: chromecache_94.4.drString found in binary or memory: https://accounts.google.com/TOS?loc=
Source: file.exe, 00000000.00000003.2019644653.00000000008B1000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2020290352.00000000008B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/challenge/pwd
Source: chromecache_99.4.drString found in binary or memory: https://apis.google.com/js/api.js
Source: chromecache_94.4.drString found in binary or memory: https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage
Source: chromecache_94.4.drString found in binary or memory: https://families.google.com/intl/
Source: chromecache_99.4.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/drive_2020q4/v10/192px.svg
Source: chromecache_99.4.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/gmail_2020q4/v10/web-48dp/logo_gmail_2020q4_color_2x_web_
Source: chromecache_99.4.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/maps/v7/192px.svg
Source: chromecache_94.4.drString found in binary or memory: https://g.co/recover
Source: chromecache_94.4.drString found in binary or memory: https://play.google.com/log?format=json&hasfast=true
Source: chromecache_94.4.drString found in binary or memory: https://play.google.com/work/enroll?identifier=
Source: chromecache_94.4.drString found in binary or memory: https://play.google/intl/
Source: chromecache_94.4.drString found in binary or memory: https://policies.google.com/privacy
Source: chromecache_94.4.drString found in binary or memory: https://policies.google.com/privacy/additional
Source: chromecache_94.4.drString found in binary or memory: https://policies.google.com/privacy/google-partners
Source: chromecache_94.4.drString found in binary or memory: https://policies.google.com/technologies/cookies
Source: chromecache_94.4.drString found in binary or memory: https://policies.google.com/technologies/location-data
Source: chromecache_94.4.drString found in binary or memory: https://policies.google.com/terms
Source: chromecache_94.4.drString found in binary or memory: https://policies.google.com/terms/location
Source: chromecache_94.4.drString found in binary or memory: https://policies.google.com/terms/service-specific
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-email-pin.gif
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-password.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-or-voice-pin.gif
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-pin.gif
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-stop-go-landing-page_1x.png
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/animation/
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_device.png
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_pin.png
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync.png
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_1x.png
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_2x.png
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_darkmode_1x.png
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/continue_on_your_phone.png
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_phone_number_verification.png
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_silent_tap_yes_darkmode.gif
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes.gif
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes_darkmode.gif
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_dark_v2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_v2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_not_ready.png
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_1.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_dark_1.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_1.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_darkmode_1.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_1.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_darkmode_1.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_created.png
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_full_house.png
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_1.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_darkmode_1.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_1.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_darkmode_1.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_1.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_darkmode_1.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_stop.png
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/personalization_reminders.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/phone_number_sign_in_2x.png
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key.gif
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_ios_center.png
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_laptop.gif
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered.gif
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered_darkmode.gif
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_phone.gif
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_ios.gif
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_pulldown.gif
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_tapyes.gif
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/smart_lock_2x.png
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/usb_key.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/web_and_app_activity.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/who_will_be_using_this_device.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/you_tube_history.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/gmail_ios_authzen.gif
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/paaskey.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_light.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/screenlock.png
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_ipad.gif
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone.gif
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_nfc.gif
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_usb.gif
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_phone.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_keys.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/loading_spinner_gm.gif
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/progress_spinner_color_20dp_4x.gif
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/success-gm-default_2x.png
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/apps/signup/resources/custom-email-address.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/images/hpp/shield_security_checkup_green_2x_web_96dp.png
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_dark_1.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_v1.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_dark_v1.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_v1.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_dark_v1.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_v1.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_confirmation.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_0.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_dark_0.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_dark_2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_dark_2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_dark_2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_dark_2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_dark_3.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_1.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_dark_1.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_1.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_dark_1.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_dark_2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_1.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_dark_1.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_dark_2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_dark_v2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_v2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set_darkmode.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_v2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_dark_v2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_v2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space.png
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space_dark.png
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2_dark.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess.svg
Source: chromecache_99.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess_dark.svg
Source: chromecache_94.4.drString found in binary or memory: https://support.google.com/accounts?hl=
Source: chromecache_94.4.drString found in binary or memory: https://support.google.com/accounts?p=new-si-ui
Source: chromecache_94.4.drString found in binary or memory: https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072
Source: chromecache_99.4.drString found in binary or memory: https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=
Source: chromecache_94.4.drString found in binary or memory: https://www.google.com
Source: chromecache_94.4.drString found in binary or memory: https://www.google.com/intl/
Source: chromecache_99.4.drString found in binary or memory: https://www.gstatic.com/accounts/speedbump/authzen_optin_illustration.gif
Source: chromecache_99.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/chrome_48dp.png
Source: chromecache_99.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/googleg_48dp.png
Source: chromecache_99.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/gsa_48dp.png
Source: chromecache_99.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/play_prism_48dp.png
Source: chromecache_99.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/youtube_48dp.png
Source: chromecache_94.4.drString found in binary or memory: https://www.gstatic.com/images/branding/productlogos/googleg/v6/36px.svg
Source: chromecache_94.4.drString found in binary or memory: https://www.youtube.com/t/terms?chromeless=1&hl=
Source: file.exe, 00000000.00000003.2019627348.00000000008C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
Source: chromecache_94.4.drString found in binary or memory: https://youtube.com/t/terms?gl=
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.5:49717 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.5:49721 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.5:49747 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.5:49760 version: TLS 1.2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F1EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00F1EAFF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F1ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00F1ED6A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F1EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00F1EAFF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F0AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_00F0AA57
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F39576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00F39576

System Summary

barindex
Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
Source: file.exe, 00000000.00000000.2018353077.0000000000F62000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_8b76eb58-6
Source: file.exe, 00000000.00000000.2018353077.0000000000F62000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_24454b55-8
Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_a863ab79-1
Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_6a433769-1
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F0D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_00F0D5EB
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F01201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00F01201
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F0E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00F0E8F6
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EA80600_2_00EA8060
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F120460_2_00F12046
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F082980_2_00F08298
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EDE4FF0_2_00EDE4FF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ED676B0_2_00ED676B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F348730_2_00F34873
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EACAF00_2_00EACAF0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ECCAA00_2_00ECCAA0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EBCC390_2_00EBCC39
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ED6DD90_2_00ED6DD9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EA91C00_2_00EA91C0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EBB1190_2_00EBB119
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EC13940_2_00EC1394
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EC17060_2_00EC1706
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EC781B0_2_00EC781B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EC19B00_2_00EC19B0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EB997D0_2_00EB997D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EA79200_2_00EA7920
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EC7A4A0_2_00EC7A4A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF3CEB0_2_00EF3CEB
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EC7CA70_2_00EC7CA7
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EC1C770_2_00EC1C77
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ED9EEE0_2_00ED9EEE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F2BE440_2_00F2BE44
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EC1F320_2_00EC1F32
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00EC0A30 appears 46 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00EBF9F2 appears 40 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00EA9CB3 appears 31 times
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engineClassification label: mal56.evad.winEXE@31/36@12/8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F137B5 GetLastError,FormatMessageW,0_2_00F137B5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F010BF AdjustTokenPrivileges,CloseHandle,0_2_00F010BF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F016C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00F016C3
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F151CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00F151CD
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F0D4DC CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00F0D4DC
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F1648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00F1648E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EA42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00EA42A2
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecovery
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1980,i,8398794096650981881,14612666716366114694,262144 --disable-features=CrashRecovery /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5660 --field-trial-handle=1980,i,8398794096650981881,14612666716366114694,262144 --disable-features=CrashRecovery /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 --field-trial-handle=1980,i,8398794096650981881,14612666716366114694,262144 --disable-features=CrashRecovery /prefetch:8
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecoveryJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1980,i,8398794096650981881,14612666716366114694,262144 --disable-features=CrashRecovery /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5660 --field-trial-handle=1980,i,8398794096650981881,14612666716366114694,262144 --disable-features=CrashRecovery /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 --field-trial-handle=1980,i,8398794096650981881,14612666716366114694,262144 --disable-features=CrashRecovery /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: Google Drive.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EA42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00EA42DE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EC0A76 push ecx; ret 0_2_00EC0A89
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EBF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00EBF98E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F31C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00F31C41
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-95363
Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.2 %
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F0DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00F0DBBE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EDC2A2 FindFirstFileExW,0_2_00EDC2A2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F168EE FindFirstFileW,FindClose,0_2_00F168EE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F1698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00F1698F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F0D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F0D076
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F0D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F0D3A9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F19642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F19642
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F1979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F1979D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F19B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00F19B2B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F15C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00F15C97
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EA42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00EA42DE
Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F1EAA2 BlockInput,0_2_00F1EAA2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ED2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00ED2622
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EA42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00EA42DE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EC4CE8 mov eax, dword ptr fs:[00000030h]0_2_00EC4CE8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F00B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00F00B62
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ED2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00ED2622
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EC083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00EC083F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EC09D5 SetUnhandledExceptionFilter,0_2_00EC09D5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EC0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00EC0C21
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F01201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00F01201
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EE2BA5 KiUserCallbackDispatcher,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00EE2BA5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F0B226 SendInput,keybd_event,0_2_00F0B226
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F222DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_00F222DA
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F00B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00F00B62
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F01663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00F01663
Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: file.exeBinary or memory string: Shell_TrayWnd
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EC0698 cpuid 0_2_00EC0698
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F18195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00F18195
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EFD27A GetUserNameW,0_2_00EFD27A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EDB952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_00EDB952
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EA42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00EA42DE
Source: file.exeBinary or memory string: WIN_81
Source: file.exeBinary or memory string: WIN_XP
Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
Source: file.exeBinary or memory string: WIN_XPe
Source: file.exeBinary or memory string: WIN_VISTA
Source: file.exeBinary or memory string: WIN_7
Source: file.exeBinary or memory string: WIN_8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F21204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00F21204
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F21806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00F21806
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure2
Valid Accounts
1
Native API
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
21
Input Capture
2
System Time Discovery
Remote Services1
Archive Collected Data
2
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/Job2
Valid Accounts
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol21
Input Capture
11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Registry Run Keys / Startup Folder
2
Valid Accounts
2
Obfuscated Files or Information
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin Shares3
Clipboard Data
3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
Access Token Manipulation
1
DLL Side-Loading
NTDS15
System Information Discovery
Distributed Component Object ModelInput Capture4
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
Process Injection
1
Masquerading
LSA Secrets12
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
Registry Run Keys / Startup Folder
2
Valid Accounts
Cached Domain Credentials1
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Virtualization/Sandbox Evasion
DCSync3
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
Access Token Manipulation
Proc Filesystem1
Application Window Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
Process Injection
/etc/passwd and /etc/shadow1
System Owner/User Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
youtube.com0%VirustotalBrowse
youtube-ui.l.google.com0%VirustotalBrowse
www3.l.google.com0%VirustotalBrowse
www.youtube.com0%VirustotalBrowse
play.google.com0%VirustotalBrowse
accounts.youtube.com0%VirustotalBrowse
www.google.com0%VirustotalBrowse
SourceDetectionScannerLabelLink
https://play.google/intl/0%URL Reputationsafe
https://play.google/intl/0%URL Reputationsafe
https://families.google.com/intl/0%URL Reputationsafe
https://families.google.com/intl/0%URL Reputationsafe
https://policies.google.com/technologies/location-data0%URL Reputationsafe
https://policies.google.com/technologies/location-data0%URL Reputationsafe
https://apis.google.com/js/api.js0%URL Reputationsafe
https://policies.google.com/privacy/google-partners0%URL Reputationsafe
https://policies.google.com/terms/service-specific0%URL Reputationsafe
https://g.co/recover0%URL Reputationsafe
https://policies.google.com/privacy/additional0%URL Reputationsafe
https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=32850720%URL Reputationsafe
https://policies.google.com/technologies/cookies0%URL Reputationsafe
https://policies.google.com/terms0%URL Reputationsafe
https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=0%URL Reputationsafe
https://support.google.com/accounts?hl=0%URL Reputationsafe
https://policies.google.com/terms/location0%URL Reputationsafe
https://policies.google.com/privacy0%URL Reputationsafe
https://support.google.com/accounts?p=new-si-ui0%URL Reputationsafe
https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage0%URL Reputationsafe
https://www.google.com/intl/1%VirustotalBrowse
https://www.google.com/favicon.ico0%VirustotalBrowse
https://www.google.com0%VirustotalBrowse
https://youtube.com/t/terms?gl=0%VirustotalBrowse
https://play.google.com/log?hasfast=true&authuser=0&format=json0%VirustotalBrowse
https://play.google.com/work/enroll?identifier=0%VirustotalBrowse
https://www.youtube.com/t/terms?chromeless=1&hl=0%VirustotalBrowse
https://play.google.com/log?format=json&hasfast=true&authuser=00%VirustotalBrowse
https://play.google.com/log?format=json&hasfast=true0%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
youtube-ui.l.google.com
142.250.185.206
truefalseunknown
www3.l.google.com
142.250.186.174
truefalseunknown
play.google.com
142.250.186.110
truefalseunknown
www.google.com
142.250.185.100
truefalseunknown
youtube.com
142.250.185.110
truefalseunknown
accounts.youtube.com
unknown
unknownfalseunknown
www.youtube.com
unknown
unknownfalseunknown
NameMaliciousAntivirus DetectionReputation
https://play.google.com/log?format=json&hasfast=true&authuser=0falseunknown
https://www.google.com/favicon.icofalseunknown
https://play.google.com/log?hasfast=true&authuser=0&format=jsonfalseunknown
NameSourceMaliciousAntivirus DetectionReputation
https://play.google/intl/chromecache_94.4.drfalse
  • URL Reputation: safe
  • URL Reputation: safe
unknown
https://families.google.com/intl/chromecache_94.4.drfalse
  • URL Reputation: safe
  • URL Reputation: safe
unknown
https://youtube.com/t/terms?gl=chromecache_94.4.drfalseunknown
https://policies.google.com/technologies/location-datachromecache_94.4.drfalse
  • URL Reputation: safe
  • URL Reputation: safe
unknown
https://www.google.com/intl/chromecache_94.4.drfalseunknown
https://apis.google.com/js/api.jschromecache_99.4.drfalse
  • URL Reputation: safe
unknown
https://policies.google.com/privacy/google-partnerschromecache_94.4.drfalse
  • URL Reputation: safe
unknown
https://play.google.com/work/enroll?identifier=chromecache_94.4.drfalseunknown
https://policies.google.com/terms/service-specificchromecache_94.4.drfalse
  • URL Reputation: safe
unknown
https://g.co/recoverchromecache_94.4.drfalse
  • URL Reputation: safe
unknown
https://policies.google.com/privacy/additionalchromecache_94.4.drfalse
  • URL Reputation: safe
unknown
https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072chromecache_94.4.drfalse
  • URL Reputation: safe
unknown
https://policies.google.com/technologies/cookieschromecache_94.4.drfalse
  • URL Reputation: safe
unknown
https://policies.google.com/termschromecache_94.4.drfalse
  • URL Reputation: safe
unknown
https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=chromecache_99.4.drfalse
  • URL Reputation: safe
unknown
https://www.google.comchromecache_94.4.drfalseunknown
https://play.google.com/log?format=json&hasfast=truechromecache_94.4.drfalseunknown
https://www.youtube.com/t/terms?chromeless=1&hl=chromecache_94.4.drfalseunknown
https://support.google.com/accounts?hl=chromecache_94.4.drfalse
  • URL Reputation: safe
unknown
https://policies.google.com/terms/locationchromecache_94.4.drfalse
  • URL Reputation: safe
unknown
https://policies.google.com/privacychromecache_94.4.drfalse
  • URL Reputation: safe
unknown
https://support.google.com/accounts?p=new-si-uichromecache_94.4.drfalse
  • URL Reputation: safe
unknown
https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessagechromecache_94.4.drfalse
  • URL Reputation: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
142.250.185.206
youtube-ui.l.google.comUnited States
15169GOOGLEUSfalse
142.250.186.174
www3.l.google.comUnited States
15169GOOGLEUSfalse
142.250.185.110
youtube.comUnited States
15169GOOGLEUSfalse
142.250.185.100
www.google.comUnited States
15169GOOGLEUSfalse
239.255.255.250
unknownReserved
unknownunknownfalse
142.250.186.110
play.google.comUnited States
15169GOOGLEUSfalse
172.217.16.142
unknownUnited States
15169GOOGLEUSfalse
IP
192.168.2.5
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1523185
Start date and time:2024-10-01 08:59:05 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 45s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:10
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:file.exe
Detection:MAL
Classification:mal56.evad.winEXE@31/36@12/8
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 96%
  • Number of executed functions: 35
  • Number of non-executed functions: 315
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 142.250.186.163, 142.251.173.84, 172.217.16.206, 34.104.35.123, 142.250.185.138, 172.217.23.106, 216.58.212.170, 142.250.186.106, 142.250.186.138, 172.217.16.202, 172.217.18.10, 142.250.185.74, 142.250.185.202, 142.250.185.170, 216.58.212.138, 216.58.206.74, 142.250.74.202, 142.250.186.42, 142.250.185.106, 142.250.186.170, 142.250.185.227, 142.250.74.195, 142.250.186.74, 142.250.184.234, 172.217.16.138, 216.58.206.42, 142.250.181.234, 142.250.184.202, 142.250.185.234, 93.184.221.240, 192.229.221.95, 64.233.184.84, 142.250.186.78
  • Excluded domains from analysis (whitelisted): clients1.google.com, fs.microsoft.com, accounts.google.com, content-autofill.googleapis.com, slscr.update.microsoft.com, fonts.gstatic.com, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, ocsp.digicert.com, edgedl.me.gvt1.com, update.googleapis.com, clients.l.google.com, www.gstatic.com, optimizationguide-pa.googleapis.com
  • Not all processes where analyzed, report is missing behavior information
  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
No simulations
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
239.255.255.250https://abby-gatenby.com/m/?c3Y9bzM2NV8xX29uZSZyYW5kPVNucEJVREU9JnVpZD1VU0VSMDMwOTIwMjRVNDYwOTAzMDE=N0123NGet hashmaliciousUnknownBrowse
    http://www.aieov.com/setup.exeGet hashmaliciousUnknownBrowse
      http://assets.watchasync.comGet hashmaliciousUnknownBrowse
        https://docs.zoom.us/doc/qMqlDrh-RUWwdmI-mAClTgGet hashmaliciousHTMLPhisherBrowse
          file.exeGet hashmaliciousUnknownBrowse
            https://www.afghanhayatrestaurant.com.au/Get hashmaliciousUnknownBrowse
              file.exeGet hashmaliciousUnknownBrowse
                https://u47113775.ct.sendgrid.net/ls/click?upn=u001.NLjCc2NrF5-2Fl1RHefgLH74dDCI-2FlQUMQCuknF0akr34-3DPZ74_Bz-2FoIC9YMuvgy8ZsoekpZ-2Fn96y0OCAueT5LjwQn-2FX25AbFWdd2iGOJMfOUDymLwSDnjLWUuKOfyExMHrLPQc6sWuvBEF4PT9PwlcB-2BK9NQmoQucfLOeGSzPQg4J-2Bvn2C-2FT7DBGI3L6HQml9TPdefbzANw58o8IwtiN3AMNw21dRhcIy1JE5InQL6ZhzyniB-2FPrKB2Vn9uUJ7Mm1QrvUZh95-2FIqg1tkHnn-2FLCgLCOHUCdp1zwu5x-2Fprfv3kPHwI33RA9-2FJGY9xYPl-2BGH4uHP30vXeaFOwuVkWjx1bpQcAiato1uxhbL8AJAqpgT-2Bg5yQp7xXBACsCORIJr0VehkYFdFdFkgZPx7KSQblwloMm5OUc-2B9bb1d0siCBq5u36Pp2iCgmhq5PmipxmWr1HvrLZkdUUXJjpaRdjjEopb-2Fhw3b-2BUOpmNbUIJywjWyMBcUA9ScKtkpotTga2qo5ZaX-2B7AVyqz8KXtUfTb8SopobzuOWPiU-2BhBa8i7lRIGGQBQZmYU1TWv5mQ8uRPPf-2FWdH9RREF8cMLDET4k24yu8dJdqteeATx8Jfw8MWOWehX6ZTxJWGswooAVOvW116fDJmFNO-2F-2BecR-2Fd9NmRwCYnnK4Bh3IM-3DGet hashmaliciousHTMLPhisherBrowse
                  file.exeGet hashmaliciousUnknownBrowse
                    file.exeGet hashmaliciousUnknownBrowse
                      No context
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      1138de370e523e824bbca92d049a3777file.exeGet hashmaliciousUnknownBrowse
                      • 23.1.237.91
                      file.exeGet hashmaliciousUnknownBrowse
                      • 23.1.237.91
                      http://customervoice.microsoft.com/Pages/ResponsePage.aspx?id=rCxHFZLdZUGNvhn9cgWChLhuCDtpfZJDs2F6orjCzx1UQTZXSUlaNE5INzZVSkgxRlBKR1RMSTVRTi4uGet hashmaliciousHTMLPhisherBrowse
                      • 23.1.237.91
                      file.exeGet hashmaliciousUnknownBrowse
                      • 23.1.237.91
                      https://taplink.cc/universalgrcGet hashmaliciousUnknownBrowse
                      • 23.1.237.91
                      file.exeGet hashmaliciousUnknownBrowse
                      • 23.1.237.91
                      American-equity Updated Employee sheet .odtGet hashmaliciousHTMLPhisherBrowse
                      • 23.1.237.91
                      jKSjtQ8W7O.lnkGet hashmaliciousPureLog Stealer, zgRATBrowse
                      • 23.1.237.91
                      https://formacionadieste.com.de/Vrvz/Get hashmaliciousHTMLPhisherBrowse
                      • 23.1.237.91
                      https://vh.gskoffihoura.com/okta.vailhealth.org/oauth2/v1/authorize&client_id=okta-2b1959c8-bcc0-56ebGet hashmaliciousUnknownBrowse
                      • 23.1.237.91
                      28a2c9bd18a11de089ef85a160da29e4https://abby-gatenby.com/m/?c3Y9bzM2NV8xX29uZSZyYW5kPVNucEJVREU9JnVpZD1VU0VSMDMwOTIwMjRVNDYwOTAzMDE=N0123NGet hashmaliciousUnknownBrowse
                      • 184.28.90.27
                      • 20.114.59.183
                      file.exeGet hashmaliciousUnknownBrowse
                      • 184.28.90.27
                      • 20.114.59.183
                      https://www.afghanhayatrestaurant.com.au/Get hashmaliciousUnknownBrowse
                      • 184.28.90.27
                      • 20.114.59.183
                      file.exeGet hashmaliciousUnknownBrowse
                      • 184.28.90.27
                      • 20.114.59.183
                      https://u47113775.ct.sendgrid.net/ls/click?upn=u001.NLjCc2NrF5-2Fl1RHefgLH74dDCI-2FlQUMQCuknF0akr34-3DPZ74_Bz-2FoIC9YMuvgy8ZsoekpZ-2Fn96y0OCAueT5LjwQn-2FX25AbFWdd2iGOJMfOUDymLwSDnjLWUuKOfyExMHrLPQc6sWuvBEF4PT9PwlcB-2BK9NQmoQucfLOeGSzPQg4J-2Bvn2C-2FT7DBGI3L6HQml9TPdefbzANw58o8IwtiN3AMNw21dRhcIy1JE5InQL6ZhzyniB-2FPrKB2Vn9uUJ7Mm1QrvUZh95-2FIqg1tkHnn-2FLCgLCOHUCdp1zwu5x-2Fprfv3kPHwI33RA9-2FJGY9xYPl-2BGH4uHP30vXeaFOwuVkWjx1bpQcAiato1uxhbL8AJAqpgT-2Bg5yQp7xXBACsCORIJr0VehkYFdFdFkgZPx7KSQblwloMm5OUc-2B9bb1d0siCBq5u36Pp2iCgmhq5PmipxmWr1HvrLZkdUUXJjpaRdjjEopb-2Fhw3b-2BUOpmNbUIJywjWyMBcUA9ScKtkpotTga2qo5ZaX-2B7AVyqz8KXtUfTb8SopobzuOWPiU-2BhBa8i7lRIGGQBQZmYU1TWv5mQ8uRPPf-2FWdH9RREF8cMLDET4k24yu8dJdqteeATx8Jfw8MWOWehX6ZTxJWGswooAVOvW116fDJmFNO-2F-2BecR-2Fd9NmRwCYnnK4Bh3IM-3DGet hashmaliciousHTMLPhisherBrowse
                      • 184.28.90.27
                      • 20.114.59.183
                      file.exeGet hashmaliciousUnknownBrowse
                      • 184.28.90.27
                      • 20.114.59.183
                      file.exeGet hashmaliciousUnknownBrowse
                      • 184.28.90.27
                      • 20.114.59.183
                      https://booking.com-partners.one/confirm/login/qAlElVVFGet hashmaliciousUnknownBrowse
                      • 184.28.90.27
                      • 20.114.59.183
                      https://www.polorestobar.com/Get hashmaliciousUnknownBrowse
                      • 184.28.90.27
                      • 20.114.59.183
                      https://jv.prenticeu.com/SAFlSIeECgRZt_tUKXhAOQHYyqb5e4/Get hashmaliciousHTMLPhisherBrowse
                      • 184.28.90.27
                      • 20.114.59.183
                      No context
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 1 05:59:57 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                      Category:dropped
                      Size (bytes):2677
                      Entropy (8bit):3.979476293556402
                      Encrypted:false
                      SSDEEP:48:8f8dnT/zPHV0idAKZdA19ehwiZUklqehly+3:8f8H9S+y
                      MD5:9A1A5A0E61F7FC358FF016B5458F7DF6
                      SHA1:35824FF6777D0188337010D5FB004A8F791D1278
                      SHA-256:C6555D50D82AC60534963F3989B698B2EDB1F9A1531CED759BD6B7724F8AA7EE
                      SHA-512:666411E0F2FA05936250845101D9899D84E43D43E506AD340178E201EB47D18685EB96A8307993039BD17FDDC8849D94A643F4E2B7C53483D23F0C12A8BF6757
                      Malicious:false
                      Reputation:low
                      Preview:L..................F.@.. ...$+.,....w.......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IAY{7....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VAY{7....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VAY{7....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VAY{7..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VAY}7...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............../.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 1 05:59:57 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                      Category:dropped
                      Size (bytes):2679
                      Entropy (8bit):3.995317166397845
                      Encrypted:false
                      SSDEEP:48:8FdnT/zPHV0idAKZdA1weh/iZUkAQkqehuy+2:8vH9I9QXy
                      MD5:D9891C5320F299AE92556EC2E895EC2B
                      SHA1:8D30F6B6017BFC324C271D7319A0C64E0F4A8B36
                      SHA-256:66C375D7530EA177039899C8AFB661A31400E08689A71C742D56FB7F3651149C
                      SHA-512:E2E77A4E08D2F317B3CFCFD33E999AEC99CA04E6A48217874EB7C986A4DE7C62D1F95050D26E425F16D76BE203567CEDE199B35E69D948966FBA00C0CAE8191F
                      Malicious:false
                      Reputation:low
                      Preview:L..................F.@.. ...$+.,......|.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IAY{7....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VAY{7....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VAY{7....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VAY{7..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VAY}7...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............../.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                      Category:dropped
                      Size (bytes):2693
                      Entropy (8bit):4.00466009092683
                      Encrypted:false
                      SSDEEP:48:8x8dnT/zsHV0idAKZdA14tseh7sFiZUkmgqeh7sYy+BX:8x8H6gnSy
                      MD5:A7F48AFC193918B62240BF8BD885BB3D
                      SHA1:1CDA6D7B1BFCFE8F74CA63D2FA523EFE8203EDDC
                      SHA-256:7CFF47F0EAC452D92E88632235D41D7E89A9C88EAFF2962037930DC4285DE939
                      SHA-512:AB1B8DAA74CB4869DCA482B2213C53A15947BA4A1C958697ED564627982B53A9B846519BAF5C2149462FA999A217BCA66045EE18582455CF5381E3102D1A8218
                      Malicious:false
                      Reputation:low
                      Preview:L..................F.@.. ...$+.,......e>....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IAY{7....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VAY{7....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VAY{7....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VAY{7..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VDW.n...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............../.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 1 05:59:57 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                      Category:dropped
                      Size (bytes):2681
                      Entropy (8bit):3.9927773742553865
                      Encrypted:false
                      SSDEEP:48:8AdnT/zPHV0idAKZdA1vehDiZUkwqeh6y+R:8YH9Tgy
                      MD5:08E304785A0B5BF12A60C16399BC39D6
                      SHA1:F01C78A8A37946DF5CF4BE27A7C74137919A94D6
                      SHA-256:0D60B67B8CE295BE0E72EBAF28698DC4D2D2F0673EB977FC69CCD6E1A96ACF17
                      SHA-512:89F8F8E8F4B3AFC3A8C6CB0B41023A7D8E0BE67451575CD84C7C036E0C8AB1FB9EB36F36441BF640F538D6BF58FF9B64C6A30C7A812CF1D52B9E61CB8357BC2C
                      Malicious:false
                      Reputation:low
                      Preview:L..................F.@.. ...$+.,.....su.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IAY{7....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VAY{7....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VAY{7....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VAY{7..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VAY}7...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............../.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 1 05:59:57 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                      Category:dropped
                      Size (bytes):2681
                      Entropy (8bit):3.981854887717069
                      Encrypted:false
                      SSDEEP:48:8vdnT/zPHV0idAKZdA1hehBiZUk1W1qehsy+C:8hH9D9My
                      MD5:458A23F0C7404E7A3E53B06EBE14BB0A
                      SHA1:7F0AF99A88B02F20A2042E4B6CAFA9B52AB06A56
                      SHA-256:B6D256D33C3BC9AF8314E695989334B12F10EF7448E5B40AC833A393174CC060
                      SHA-512:EED80CF25CFDCE59B965488254B89F6A3989E1532580AD0E518BAD7CB41B8060494B7278C753DCC2D2D1EFF0EBEF2E56AF97ACC4E99A30B7D527CC99D1B74259
                      Malicious:false
                      Reputation:low
                      Preview:L..................F.@.. ...$+.,....X_......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IAY{7....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VAY{7....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VAY{7....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VAY{7..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VAY}7...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............../.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 1 05:59:57 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                      Category:dropped
                      Size (bytes):2683
                      Entropy (8bit):3.9909999860841308
                      Encrypted:false
                      SSDEEP:48:8QdnT/zPHV0idAKZdA1duT+ehOuTbbiZUk5OjqehOuTbSy+yT+:8IH9zT/TbxWOvTbSy7T
                      MD5:2C48FBCEBD45C0F6A54DAA9781CD73C6
                      SHA1:27A4737D350ECD48D7C9D6C1311F3B23838DC7DD
                      SHA-256:12E3388B9F31366A535C3A584999573C83976531E662BA826F0D4B3A4AA8AC2B
                      SHA-512:A74FEA52EAAF1793A9E5870E1CCB25B4BF0700B104D36BB0CC53DB8807FB33AC8224831B985746882C896472F27810381B611B0001FE3DF1FB26068E412089E3
                      Malicious:false
                      Reputation:low
                      Preview:L..................F.@.. ...$+.,....8.k.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IAY{7....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VAY{7....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VAY{7....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VAY{7..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VAY}7...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............../.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (533)
                      Category:downloaded
                      Size (bytes):9210
                      Entropy (8bit):5.3872171131917925
                      Encrypted:false
                      SSDEEP:192:FK/pAzN7GZ068Hqhqu6DQaVapzYjgKItwdiwUsYRTi1j1t9bRl9:FqI7GZ04dRYjghtgisYYbt9ll9
                      MD5:AB70454DE18E1CE16E61EAC290FC304D
                      SHA1:68532B5E8B262D7E14B8F4507AA69A61146B3C18
                      SHA-256:B32D746867CC4FA21FD39437502F401D952D0A3E8DC708DFB7D58B85F256C0F1
                      SHA-512:A123C517380BEF0B47F23A5A6E1D16650FE39D9C701F9FA5ADD79294973C118E8EA3A7BA32CB63C3DFC0CE0F843FB86BFFCAA2AAE987629E7DFF84F176DEBB98
                      Malicious:false
                      Reputation:moderate, very likely benign file
                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PrPYRd,Rkm0ef,SCuOPb,STuCOe,SpsfSb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,byfTOb,cYShmd,eVCnO,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,qPfo0c,qmdT9,rCcCxc,siKnQd,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ltDFwf,SD8Jgb,rmumx,E87wgc,qPYxq,Tbb4sb,pxq3x,f8Gu1e,soHxf,YgOFye,yRXbo,bTi8wc,ywOR5c,PHUIyb"
                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.gNa=_.y("SD8Jgb",[]);._.QX=function(a,b){if(typeof b==="string")a.Nc(b);else if(b instanceof _.Ip&&b.ia&&b.ia===_.B)b=_.$a(b.ww()),a.empty().append(b);else if(b instanceof _.Wa)b=_.$a(b),a.empty().append(b);else if(b instanceof Node)a.empty().append(b);else throw Error("Vf");};_.RX=function(a){var b=_.Lo(a,"[jsslot]");if(b.size()>0)return b;b=new _.Jo([_.Qk("span")]);_.Mo(b,"jsslot","");a.empty().append(b);return b};_.TKb=function(a){return a===null||typeof a==="string"&&_.Ki(a)};._.k("SD8Jgb");._.WX=function(a){_.Y.call(this,a.Fa);this.Ua=a.controller.Ua;this.kd=a.controllers.kd[0]||null;this.header=a.controller.header;this.nav=a.controller.nav;var b;(b=this.oa().find("button:not([type])").el())==null||b.setAttribute("type","button")};_.J(_.WX,_.Y);_.WX.Ba=function(){return{controller:{Ua:{jsname:"n7vHCb",ctor:_.hv},header:{jsname:"tJHJj",ctor:_.hv},nav:{jsname:"DH6Rkf",ct
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
                      Category:downloaded
                      Size (bytes):52280
                      Entropy (8bit):7.995413196679271
                      Encrypted:true
                      SSDEEP:1536:1rvqtK8DZilXxwJ8mMwAZy7phqsFLdG3B4d:xytBZits8bw4wzbFxG3B4d
                      MD5:F61F0D4D0F968D5BBA39A84C76277E1A
                      SHA1:AA3693EA140ECA418B4B2A30F6A68F6F43B4BEB2
                      SHA-256:57147F08949ABABE7DEEF611435AE418475A693E3823769A25C2A39B6EAD9CCC
                      SHA-512:6C3BD90F709BCF9151C9ED9FFEA55C4F6883E7FDA2A4E26BF018C83FE1CFBE4F4AA0DB080D6D024070D53B2257472C399C8AC44EEFD38B9445640EFA85D5C487
                      Malicious:false
                      URL:https://fonts.gstatic.com/s/googlesans/v58/4UaRrENHsxJlGDuGo1OIlJfC6l_24rlCK1Yo_Iq2vgCI.woff2
                      Preview:wOF2.......8.....................................^...$..4?HVAR..?MVAR9.`?STAT.*',..J/.......`..(..Z.0..R.6.$.... .....K..[..q..c..T.....>.P.j.`.w..#...%......N.".....$..3.0.6......... .L.rX/r[j.y.|*(.4.%#.....2.v.m..-..%.....;-.Y.{..&..O=#l@...k..7g..ZI...#.Z./+T..r7...M..3).Z%.x....s..sL..[A!.5*1w'/.8V..2Z..%.X.h.o.).]..9..Q`.$.....7..kZ.~O........d..g.n.d.Rw+&....Cz..uy#..fz,(.J....v.%..`..9.....h...?O..:...c%.....6s....xl..#...5..._......1.>.)"U.4 W....?%......6//!$...!.n9C@n...........!""^.....W..Z<.7.x.."UT.T....E.."R>.R..t.....H d..e_.K../.+8.Q.P.ZQ....;...U....]......._.e*......71.?.7.ORv.?...l...G|.P...|:...I.X..2.,.L........d.g.]}W#uW]QnuP-s.;.-Y.....].......C..j_.M0...y.......J..........NY..@A...,....-.F......'..w./j5g.vUS...U..0.&...y7.LP.....%.....Y......Y..D. e.A..G.?.$.......6...eaK.n5.m...N...,...+BCl..L> .E9~.b[.w.x....6<...}.e...%V....O.......*.?...a..#[eE.4..p..$...].....%......o._......N.._~..El....b..A.0.r8.....|..D.d..
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (1694)
                      Category:downloaded
                      Size (bytes):32499
                      Entropy (8bit):5.361345284201954
                      Encrypted:false
                      SSDEEP:768:mLX1O+aL6fgyIiREM4RKmh90toLoTswtF3ATcbDR6kIsnJd9DPyMv/FI:U2M4oltoLoTswtFoc/tIsnXFLI
                      MD5:D5C3FB8EAE24AB7E40009338B5078496
                      SHA1:5638BF5986A6445A88CD79A9B690B744B126BEC2
                      SHA-256:597C14D360D690BCFDC2B8D315E6BB8879AEF33DE6C30D274743079BDB63C6B0
                      SHA-512:6AE434850D473BEF15AA694AB4862596982CDDA6BD3991991D3ADD8F4A5F61DFBF8756D0DA98B72EF083909D68CF7B6B148A6488E9381F92FBF15CCB20176A0E
                      Malicious:false
                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=_b,_tp/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=byfTOb,lsjVmc,LEikZe"
                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{.var qua=function(a,b){this.da=a;this.ea=b;if(!c){var c=new _.gp("//www.google.com/images/cleardot.gif");_.rp(c)}this.ka=c};_.h=qua.prototype;_.h.Vc=null;_.h.QY=1E4;_.h.Iz=!1;_.h.TP=0;_.h.qJ=null;_.h.DU=null;_.h.setTimeout=function(a){this.QY=a};_.h.start=function(){if(this.Iz)throw Error("dc");this.Iz=!0;this.TP=0;rua(this)};_.h.stop=function(){sua(this);this.Iz=!1};.var rua=function(a){a.TP++;navigator!==null&&"onLine"in navigator&&!navigator.onLine?_.om((0,_.eg)(a.JG,a,!1),0):(a.aa=new Image,a.aa.onload=(0,_.eg)(a.Xia,a),a.aa.onerror=(0,_.eg)(a.Wia,a),a.aa.onabort=(0,_.eg)(a.Via,a),a.qJ=_.om(a.Yia,a.QY,a),a.aa.src=String(a.ka))};_.h=qua.prototype;_.h.Xia=function(){this.JG(!0)};_.h.Wia=function(){this.JG(!1)};_.h.Via=function(){this.JG(!1)};_.h.Yia=function(){this.JG(!1)};._.h.JG=function(a){sua(this);a?(this.Iz=!1,this.da.call(this.ea,!0)):this.TP<=0?rua(this):(this.Iz=!1,
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (683)
                      Category:downloaded
                      Size (bytes):3131
                      Entropy (8bit):5.3750044852869046
                      Encrypted:false
                      SSDEEP:48:o7zfN/cD498xdg+Y5jNQ8js6npwk0OmNAEZbpMzR4EQBcW5QcHj9KWfGAeFKRrw:oCD9dA5jOEGh+EFqR4rhqUhzff9w
                      MD5:39693D34EE3D1829DBB1627C4FC6687B
                      SHA1:A03303C2F027F3749B48D5134D1F8FB3E495C6E9
                      SHA-256:03B0C1B4E402E0BCF75D530DD9085B25357EEFD09E238453DE1F3A042542C076
                      SHA-512:AC0749EDC33DA0EC0E40470388DD797B6528AD08B8FAC1C2AC42F85198131052BA1B533E90409D35DA237607E8B07D591FA6BA580B6A90B0D0AB2282A01F7585
                      Malicious:false
                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ZwDk9d,RMhBfe"
                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("ZwDk9d");.var bA=function(a){_.X.call(this,a.Fa)};_.J(bA,_.X);bA.Ba=_.X.Ba;bA.prototype.wR=function(a){return _.af(this,{Wa:{HS:_.ol}}).then(function(b){var c=window._wjdd,d=window._wjdc;return!c&&d?new _.oi(function(e){window._wjdc=function(f){d(f);e(PJa(f,b,a))}}):PJa(c,b,a)})};var PJa=function(a,b,c){return(a=a&&a[c])?a:b.Wa.HS.wR(c)};.bA.prototype.aa=function(a,b){var c=_.csa(b).Gj;if(c.startsWith("$")){var d=_.jm.get(a);_.xq[b]&&(d||(d={},_.jm.set(a,d)),d[c]=_.xq[b],delete _.xq[b],_.yq--);if(d)if(a=d[c])b=_.ef(a);else throw Error("Jb`"+b);else b=null}else b=null;return b};_.iu(_.Mfa,bA);._.l();._.k("SNUn3");._.OJa=new _.uf(_.Ag);._.l();._.k("RMhBfe");.var QJa=function(a){var b=_.wq(a);return b?new _.oi(function(c,d){var e=function(){b=_.wq(a);var f=_.Tfa(a,b);f?c(f.getAttribute("jsdata")):window.document.readyState=="complete"?(f=["Unable to find deferred jsdata wit
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (569)
                      Category:downloaded
                      Size (bytes):3471
                      Entropy (8bit):5.5174491302699495
                      Encrypted:false
                      SSDEEP:96:ojAmjTJ/fJgpIcB7Fd2tilGBEMO/A6VxV08w:vUTJpgDJXM0ApJ
                      MD5:2D999C87DD54C7FE6400D267C33FBB23
                      SHA1:414C3A329C2760325EDBACBD7A221D7F8DBFEEE8
                      SHA-256:76D55A1AFC1D39CB04D60EB04E45A538A0E75EE2871561C84CC89B1C13596BCC
                      SHA-512:72D923BB71DD147139962FF8E2BD0E336E0F6409C212AC2F25387D0F3B4FC9365F5A6D40E2980BB1065534888362C97D6B7663E362D29166B5915D2A9DA7D238
                      Malicious:false
                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,iAskyc,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,wg1P6b,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=Wt6vjf,hhhU8,FCpbqb,WhJNk"
                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("Wt6vjf");.var Txa=function(){var a=_.Ke();return _.L(a,1)},Tt=function(a){this.Da=_.t(a,0,Tt.messageId)};_.J(Tt,_.w);Tt.prototype.Ha=function(){return _.Hj(this,1)};Tt.prototype.Va=function(a){return _.Yj(this,1,a)};Tt.messageId="f.bo";var Ut=function(){_.km.call(this)};_.J(Ut,_.km);Ut.prototype.ud=function(){this.jT=!1;Uxa(this);_.km.prototype.ud.call(this)};Ut.prototype.aa=function(){Vxa(this);if(this.hC)return Wxa(this),!1;if(!this.sV)return Vt(this),!0;this.dispatchEvent("p");if(!this.fP)return Vt(this),!0;this.jM?(this.dispatchEvent("r"),Vt(this)):Wxa(this);return!1};.var Xxa=function(a){var b=new _.gp(a.z4);a.WP!=null&&_.Mn(b,"authuser",a.WP);return b},Wxa=function(a){a.hC=!0;var b=Xxa(a),c="rt=r&f_uid="+_.sk(a.fP);_.fn(b,(0,_.eg)(a.ea,a),"POST",c)};.Ut.prototype.ea=function(a){a=a.target;Vxa(this);if(_.jn(a)){this.RJ=0;if(this.jM)this.hC=!1,this.dispatchEvent("r")
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (395)
                      Category:downloaded
                      Size (bytes):1608
                      Entropy (8bit):5.280977407061266
                      Encrypted:false
                      SSDEEP:48:o7YNJvl3WlENrpB3stYCIgMxILNH/wf7DVTBpdQrw:oApB8iDwYlGw
                      MD5:4FB66582D37D04933F00E49C2FBA34D4
                      SHA1:3DB09C53BBEB1EEB045A001356E498D8EF30915D
                      SHA-256:A97DAC01ABFE3EB75C7C97D504E21BDDDADDB6EBE0B56B6A9A10CD3700CAB41B
                      SHA-512:2AEB3A6CFFBF6EFA626EBDC9E11ACBAC04BFE986F98FBC050B2501898B289C67D392ED195D16ACC9565EF8784401ADA1E88188CDE3A7AB12D98BB5ED7D8A5711
                      Malicious:false
                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=w9hDv,ZDZcre,A7fCU"
                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("w9hDv");._.zg(_.Kla);_.$z=function(a){_.X.call(this,a.Fa);this.aa=a.Wa.cache};_.J(_.$z,_.X);_.$z.Ba=function(){return{Wa:{cache:_.Zs}}};_.$z.prototype.execute=function(a){_.Gb(a,function(b){var c;_.df(b)&&(c=b.eb.jc(b.jb));c&&this.aa.oG(c)},this);return{}};_.iu(_.Qla,_.$z);._.l();._.k("ZDZcre");.var ZG=function(a){_.X.call(this,a.Fa);this.Nl=a.Ea.Nl;this.G3=a.Ea.metadata;this.aa=a.Ea.Ws};_.J(ZG,_.X);ZG.Ba=function(){return{Ea:{Nl:_.DG,metadata:_.HZa,Ws:_.AG}}};ZG.prototype.execute=function(a){var b=this;a=this.aa.create(a);return _.Gb(a,function(c){var d=b.G3.getType(c.Md())===2?b.Nl.Pb(c):b.Nl.fetch(c);return _.Jl(c,_.EG)?d.then(function(e){return _.Jd(e)}):d},this)};_.iu(_.Vla,ZG);._.l();._.k("K5nYTd");._.GZa=new _.uf(_.Rla);._.l();._.k("sP4Vbe");.._.l();._.k("kMFpHd");.._.l();._.k("A7fCU");.var GG=function(a){_.X.call(this,a.Fa);this.aa=a.Ea.ZP};_.J(GG,_.X);GG.Ba=func
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with no line terminators
                      Category:downloaded
                      Size (bytes):84
                      Entropy (8bit):4.875266466142591
                      Encrypted:false
                      SSDEEP:3:DZFJu0+WVTBCq2Bjdw2KsJJuYHSKnZ:lFJuuVTBudw29nu4SKZ
                      MD5:87B6333E98B7620EA1FF98D1A837A39E
                      SHA1:105DE6815B0885357DE1414BFC0D77FCC9E924EF
                      SHA-256:DCD3C133C5C40BECD4100BBE6EDAE84C9735E778E4234A5E8395C56FF8A733BA
                      SHA-512:867D7943D813685FAA76394E53199750C55817E836FD19C933F74D11E9657CE66719A6D6B2E39EE1DE62358BCE364E38A55F4E138DF92337DE6985DDCD5D0994
                      Malicious:false
                      URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISHgmA6QC9dWevzxIFDRkBE_oSBQ3oIX6GEgUN05ioBw==?alt=proto
                      Preview:Cj0KBw0ZARP6GgAKKQ3oIX6GGgQISxgCKhwIClIYCg5AIS4jJF8qLSY/Ky8lLBABGP////8PCgcN05ioBxoA
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (755)
                      Category:downloaded
                      Size (bytes):1460
                      Entropy (8bit):5.316515499943097
                      Encrypted:false
                      SSDEEP:24:kMYD7DduJqrxsNL90YIzFK/Hb5eNhz1uktdDuvKKKGbLZ99GbSSF/ZR8OkdnprGJ:o7DQJopFN+ASCKKGbF99GbSS3RY7rw
                      MD5:D97AB4594FC610665FF2763A650EE6A8
                      SHA1:5C7459CA838D27BE45745571D8D96D156F4B9F8D
                      SHA-256:767D778369623FD8F5FB98D3BCC3130D05D02CBE0B9B88DD226F43281B14E9AF
                      SHA-512:CE4941B41C3A8CC983C1BBCC87EF682823CB9DB24EA7A570E35BBF832046340D433F7D47211384B61FA38F3527CC35C195A6068CCB24B48E1F492C5B4D4192A1
                      Malicious:false
                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=P6sQOc"
                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("lOO0Vd");._.HZa=new _.uf(_.Km);._.l();._.k("P6sQOc");.var MZa=!!(_.Nh[1]&16);var OZa=function(a,b,c,d,e){this.ea=a;this.ta=b;this.ka=c;this.Ca=d;this.Ga=e;this.aa=0;this.da=NZa(this)},PZa=function(a){var b={};_.Ma(a.hS(),function(e){b[e]=!0});var c=a.WR(),d=a.cS();return new OZa(a.XO(),c.aa()*1E3,a.oR(),d.aa()*1E3,b)},NZa=function(a){return Math.random()*Math.min(a.ta*Math.pow(a.ka,a.aa),a.Ca)},HG=function(a,b){return a.aa>=a.ea?!1:b!=null?!!a.Ga[b]:!0};var IG=function(a){_.X.call(this,a.Fa);this.da=a.Ea.mV;this.ea=a.Ea.metadata;a=a.Ea.lga;this.fetch=a.fetch.bind(a)};_.J(IG,_.X);IG.Ba=function(){return{Ea:{mV:_.KZa,metadata:_.HZa,lga:_.AZa}}};IG.prototype.aa=function(a,b){if(this.ea.getType(a.Md())!==1)return _.Vm(a);var c=this.da.JU;return(c=c?PZa(c):null)&&HG(c)?_.mya(a,QZa(this,a,b,c)):_.Vm(a)};.var QZa=function(a,b,c,d){return c.then(function(e){return e},function(e)
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (522)
                      Category:downloaded
                      Size (bytes):5049
                      Entropy (8bit):5.317800104741948
                      Encrypted:false
                      SSDEEP:96:oHX9gPiPrfnHhsB0TR6kg1oDPJzLmM18Vh1z2fEZ54TZtnqj6w:EtEAr6BmPZtOeEvW/ncP
                      MD5:CE53EF566B68CCF2D62FA044CFB0D138
                      SHA1:F48EC60289F2B55E8B388601206888F8295B1EB1
                      SHA-256:E6CC5114D92811D5DE0663266D4B63F367834AFA0FC3BAFA54F707038C59D010
                      SHA-512:20B434881DE971E263669E6096C01665D4D35B0FBFF47D312A4A442645EE962A8CE6AD7E68246D4EE9691BD30D9B1DDCF7059226492E1B58CD3191B63B001E4D
                      Malicious:false
                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,iAskyc,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=wg1P6b"
                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.$Ma=_.y("wg1P6b",[_.OA,_.Fn,_.Rn]);._.k("wg1P6b");.var M5a;M5a=_.oh(["aria-"]);._.mJ=function(a){_.Y.call(this,a.Fa);this.Ja=this.ta=this.aa=this.viewportElement=this.La=null;this.Tc=a.Ea.qf;this.ab=a.Ea.focus;this.Lc=a.Ea.Lc;this.ea=this.Ei();a=-1*parseInt(_.Fo(this.Ei().el(),"marginTop")||"0",10);var b=parseInt(_.Fo(this.Ei().el(),"marginBottom")||"0",10);this.Ta={top:a,right:0,bottom:b,left:0};a=_.gf(this.getData("isMenuDynamic"),!1);b=_.gf(this.getData("isMenuHoisted"),!1);this.Ga=a?1:b?2:0;this.ka=!1;this.Ca=1;this.Ga!==1&&(this.aa=this.Sa("U0exHf").children().Sc(0),_.fu(this,.N5a(this,this.aa.el())));_.mF(this.oa())&&(a=this.oa().el(),b=this.De.bind(this),a.__soy_skip_handler=b)};_.J(_.mJ,_.Y);_.mJ.Ba=function(){return{Ea:{qf:_.SE,focus:_.BE,Lc:_.mu}}};_.mJ.prototype.pF=function(a){var b=a.source;this.La=b;var c;((c=a.data)==null?0:c.Jy)?(a=a.data.Jy,this.Ca=a==="MOUS
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (5693)
                      Category:downloaded
                      Size (bytes):697429
                      Entropy (8bit):5.593310312179182
                      Encrypted:false
                      SSDEEP:6144:TYNlxfbDTYDhzCTNoygVWyJb5eGpbL2Mp15gI8seqfh53p+rrvV7i:T25bDTYB+qeGB+Nu
                      MD5:92F0F5E28355D863ACB77313F1E675DE
                      SHA1:8AD6F9B535D5B8952A4ADCCC57E4A4E0723F1E8D
                      SHA-256:F903AE346609A2872554A3D8FFBDB1836CB5C8B7AAAED4C3F8296B887E03D833
                      SHA-512:0C81A6CD850C6ACDBE9CCCBA00BBA34CDE1E09E8572814AE8E55DBED3C2B56F0B020359841F8217843B3403847DF46FA1C82229684F762A73C8110CE45898DAF
                      Malicious:false
                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=LEikZe,_b,_tp,byfTOb,lsjVmc/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=n73qwf,SCuOPb,IZT63,vfuNJf,UUJqVe,ws9Tlc,siKnQd,XVq9Qb,STuCOe,njlZCf,m9oV,vjKJJ,y5vRwf,iyZMqd,NTMZac,mzzZzc,rCcCxc,vvMGie,K1ZKnb,ziZ8Mc,b3kMqb,mvkUhe,CMcBD,Fndnac,t2srLd,EN3i8d,z0u0L,xiZRqc,NOeYWe,O6y8ed,L9OGUe,PrPYRd,MpJwZc,qPfo0c,cYShmd,hc6Ubd,Rkm0ef,KUM7Z,oLggrd,inNHtf,L1AAkb,WpP9Yc,lwddkf,gJzDyc,SpsfSb,aC1iue,tUnxGc,aW3pY,ZakeSe,EFQ78c,xQtZb,I6YDgd,zbML3c,zr1jrb,vHEMJe,YHI3We,YTxL4,bSspM,Uas9Hd,zy0vNb,K0PMbc,AvtSve,qmdT9,MY7mZe,xBaz7b,GwYlN,eVCnO,EIOG1e,LDQI"
                      Preview:"use strict";_F_installCss(".r4WGQb{position:relative}.Dl08I>:first-child{margin-top:0}.Dl08I>:last-child{margin-bottom:0}.IzwVE{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-family:\"Google Sans\",roboto,\"Noto Sans Myanmar UI\",arial,sans-serif;font-size:1.25rem;font-weight:400;letter-spacing:0rem;line-height:1.2}.l5PPKe{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-size:1rem}.l5PPKe .dMNVAe{margin:0;padding:0}.l5PPKe>:first-child{margin-top:0;padding-top:0}.l5PPKe>:last-child{margin-bottom:0;padding-bottom:0}.Dl08I{margin:0;padding:0;position:relative}.Dl08I>.SmR8:only-child{padding-top:1px}.Dl08I>.SmR8:only-child::before{top:0}.Dl08I>.SmR8:not(first-child){padding-bottom:1px}.Dl08I>.SmR8::after{bottom:0}.Dl08I>.SmR8:only-child::before,.Dl08I>.SmR8::after{border-bottom:1px solid #c4c7c5;border-bottom:1px solid var(--gm3-sys-color-outline-variant,#c4c7c5);content:\"\";height:0;left:0;position:absolute;width:100%}.aZvCDf{margin-top:8px;margin-left
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (468)
                      Category:downloaded
                      Size (bytes):1858
                      Entropy (8bit):5.253939888205379
                      Encrypted:false
                      SSDEEP:48:o7BNJfeFb8L3A6FHqIy5Z+d70OCzSfvi/3fM/r8ZQzRrw:oFuILhFHrVCz0vLZz9w
                      MD5:10FF6F99E3228E96AFD6E2C30EF97C0A
                      SHA1:4AE3DCB8D1F5A0C302D5BAD9DFF5050A7A5E8130
                      SHA-256:95E5546E1C7F311D07BB5050CC456A973E43BCC4777BA6014757376016537679
                      SHA-512:116C0B1CAC98A27044100005545AB66BE5F4801D75DC259093A9F145B3A4ACD8DC1C360AF525F6DC8421CD54B675A78023D2ED8B57F5946A3969543758C673C9
                      Malicious:false
                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=iAskyc,ziXSP"
                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("iAskyc");._.$Z=function(a){_.X.call(this,a.Fa);this.window=a.Ea.window.get();this.Mc=a.Ea.Mc};_.J(_.$Z,_.X);_.$Z.Ba=function(){return{Ea:{window:_.lu,Mc:_.vE}}};_.$Z.prototype.Mo=function(){};_.$Z.prototype.addEncryptionRecoveryMethod=function(){};_.a_=function(a){return(a==null?void 0:a.Go)||function(){}};_.b_=function(a){return(a==null?void 0:a.N2)||function(){}};_.OOb=function(a){return(a==null?void 0:a.Mp)||function(){}};._.POb=function(a){return new Map(Array.from(a,function(b){var c=_.n(b);b=c.next().value;c=c.next().value;return[b,c.map(function(d){return{epoch:d.epoch,key:new Uint8Array(d.key)}})]}))};_.QOb=function(a){setTimeout(function(){throw a;},0)};_.$Z.prototype.WN=function(){return!0};_.iu(_.Dn,_.$Z);._.l();._.k("ziXSP");.var t_=function(a){_.$Z.call(this,a.Fa)};_.J(t_,_.$Z);t_.Ba=_.$Z.Ba;t_.prototype.Mo=function(a,b,c){var d;if((d=this.window.chrome)==nu
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (3346)
                      Category:downloaded
                      Size (bytes):22827
                      Entropy (8bit):5.420322672717721
                      Encrypted:false
                      SSDEEP:384:/jqdWXWfyA20UUjDE8BSUxDJs16KHvSN34kaHaN+587SaXD2mLR0H:/jqdWXAUUjDE84Wi6KPSKjHaN+58+0J2
                      MD5:2B29741A316862EE788996DD29116DD5
                      SHA1:9D5551916D4452E977C39B8D69CF88DF2AAA462B
                      SHA-256:62955C853976B722EFBB4C116A10DB3FF54580EDD7495D280177550B8F4289AB
                      SHA-512:6E37C3258F07F29909763728DADE0CD40A3602D55D9099F78B37756926FCF2A50008B82876B518FEAF3E56617F0F7D1D37A73C346A99A58E6AD8BCD6689E9B15
                      Malicious:false
                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=RqjULd"
                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.pu.prototype.da=_.ca(38,function(){return _.vj(this,3)});_.Vy=function(a,b){this.key=a;this.defaultValue=!1;this.flagName=b};_.Vy.prototype.ctor=function(a){return typeof a==="boolean"?a:this.defaultValue};_.Wy=function(){this.ka=!0;var a=_.Bj(_.jk(_.Fe("TSDtV",window),_.pya),_.pu,1,_.uj())[0];if(a){var b={};for(var c=_.n(_.Bj(a,_.qya,2,_.uj())),d=c.next();!d.done;d=c.next()){d=d.value;var e=_.Nj(d,1).toString();switch(_.xj(d,_.qu)){case 3:b[e]=_.Lj(d,_.pj(d,_.qu,3));break;case 2:b[e]=_.Nj(d,_.pj(d,_.qu,2));break;case 4:b[e]=_.Oj(d,_.pj(d,_.qu,4));break;case 5:b[e]=_.L(d,_.pj(d,_.qu,5));break;case 6:b[e]=_.Sj(d,_.kf,6,_.qu);break;default:throw Error("id`"+_.xj(d,_.qu));}}}else b={};this.ea=b;this.token=.a?a.da():null};_.Wy.prototype.aa=function(a){if(!this.ka||a.key in this.ea)a=a.ctor(this.ea[a.key]);else if(_.Fe("nQyAE",window)){var b=_.sya(a.flagName);if(b===null)a=a.def
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:HTML document, ASCII text, with very long lines (681)
                      Category:downloaded
                      Size (bytes):4070
                      Entropy (8bit):5.362700670482359
                      Encrypted:false
                      SSDEEP:96:GUpT+TmXtdW1qsHFcn7t7CnyWYvNTcLaQOw:lpT+qXW1PFcn7tGnyWY1TGb
                      MD5:ED368A20CB303C0E7C6A3E6E43C2E14F
                      SHA1:429A5C538B45221F80405163D1F87912DD73C05A
                      SHA-256:93BA77AD4B11E0A70C0D36576F0DF24E27F50001EA02BAA6D357E034532D97F2
                      SHA-512:DE74BBADE910475DD245FFEFD4E1FD10137DE710B1C920D33BA52554911496E1339EF3C1F6D9D315CBC98A60ABE5687A3E7D8BEE483708E18D25722E794BDBE9
                      Malicious:false
                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=sOXFj,q0xTif,ZZ4WUe"
                      Preview:"use strict";_F_installCss(".N7rBcd{overflow-x:auto}sentinel{}");.this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.zg(_.dqa);._.k("sOXFj");.var ou=function(a){_.X.call(this,a.Fa)};_.J(ou,_.X);ou.Ba=_.X.Ba;ou.prototype.aa=function(a){return a()};_.iu(_.cqa,ou);._.l();._.k("oGtAuc");._.oya=new _.uf(_.dqa);._.l();._.k("q0xTif");.var iza=function(a){var b=function(d){_.Zn(d)&&(_.Zn(d).Gc=null,_.yu(d,null));d.XyHi9&&(d.XyHi9=null)};b(a);a=a.querySelectorAll("[c-wiz]");for(var c=0;c<a.length;c++)b(a[c])},Ku=function(a){_.et.call(this,a.Fa);this.Qa=this.dom=null;if(this.Vk()){var b=_.Jm(this.Mg(),[_.Om,_.Nm]);b=_.ri([b[_.Om],b[_.Nm]]).then(function(c){this.Qa=c[0];this.dom=c[1]},null,this);_.cu(this,b)}this.Ra=a.Xl.Hda};_.J(Ku,_.et);Ku.Ba=function(){return{Xl:{Hda:function(a){return _.Ye(a)}}}};Ku.prototype.yp=function(a){return this.Ra.yp(a)};.Ku.prototype.getData=function(a){return this.Ra.getData(a)};Ku.prototype.vp=function(){_.Ft(this.d
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                      Category:downloaded
                      Size (bytes):5430
                      Entropy (8bit):3.6534652184263736
                      Encrypted:false
                      SSDEEP:48:wIJct3xIAxG/7nvWDtZcdYLtX7B6QXL3aqG8Q:wIJct+A47v+rcqlBPG9B
                      MD5:F3418A443E7D841097C714D69EC4BCB8
                      SHA1:49263695F6B0CDD72F45CF1B775E660FDC36C606
                      SHA-256:6DA5620880159634213E197FAFCA1DDE0272153BE3E4590818533FAB8D040770
                      SHA-512:82D017C4B7EC8E0C46E8B75DA0CA6A52FD8BCE7FCF4E556CBDF16B49FC81BE9953FE7E25A05F63ECD41C7272E8BB0A9FD9AEDF0AC06CB6032330B096B3702563
                      Malicious:false
                      URL:https://www.google.com/favicon.ico
                      Preview:............ .h...&... .... .........(....... ..... ............................................0...................................................................................................................................v.].X.:.X.:.r.Y........................................q.X.S.4.S.4.S.4.S.4.S.4.S.4...X....................0........q.W.S.4.X.:.................J...A...g.........................K.H.V.8..........................F..B.....................,.......................................B..............................................B..B..B..B..B...u..........................................B..B..B..B..B...{.................5.......k...........................................................7R..8F.................................................2........Vb..5C..;I..................R^.....................0................Xc..5C..5C..5C..5C..5C..5C..lv..........................................]i..<J..:G..Zf....................................................
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (553)
                      Category:downloaded
                      Size (bytes):603951
                      Entropy (8bit):5.789948381047936
                      Encrypted:false
                      SSDEEP:3072:W0pApkygA62bwwdnO2YflNYhFGOizdGj008PpVVM96C5bMEPQUhts6FV8eKqtVAT:WlgNmwwdnOsF98oNGuQRAYqXsI1+
                      MD5:A97373CC3F8795654F3C8C6B57066AE7
                      SHA1:F7BECFDDE230EF537E8745B598DCED737C490C3C
                      SHA-256:A1B0568D555DC4B4AF4CC5A6C41E838B702816445C04FF002C8A13058387F311
                      SHA-512:47C76D26F4F9F206F93186800E06D3DBE1FDD0A1BA23FB9A3556390DE7F86C1FFB2C78FE307FB944C690475BFBAE9738C38233E00FDDFA9775A3B2030081D7F1
                      Malicious:false
                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/excm=_b,_tp,identifierview/ed=1/dg=0/wt=2/ujg=1/rs=AOaEmlEQAz5EZnBR6fK6LIn1v8ILsATM3g/m=_b,_tp"
                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._._F_toggles_initialize=function(a){(typeof globalThis!=="undefined"?globalThis:typeof self!=="undefined"?self:this)._F_toggles=a||[]};(0,_._F_toggles_initialize)([0x286081c4, 0x2046d860, 0x1ce13c40, 0x51407a0, 0x1908, 0x0, 0x1b400000, 0x19a00000, 0x0, ]);./*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright Google LLC. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright 2024 Google, Inc. SPDX-License-Identifier: MIT.*/./*. SPDX-License-Identifier: Apache-2.0.*/./*. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/.var baa,daa,Na,Ua,gaa,iaa,lb,qaa,xaa,Daa,Iaa,Laa,Mb,Maa,Rb,Vb,Wb,Naa,Oaa,Xb,Paa,Qaa,Raa,ac,Waa,Yaa,ic,jc,kc,cba,dba,hba,kba,mba,nba,rba,uba,oba,tba,sba,qba,pba,vba,zba,Dba,Eba,Bba,Kc,Lc,Hba,Jba,Nba,Oba,Pba,Qba,Mba,Rba,Tba,gd,Vba,Wba,Yba,$ba,Zba,bca,cca,dca,eca,gca,fca,ica,jca,kca,lca,oca,r
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):6.579760881033184
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:file.exe
                      File size:917'504 bytes
                      MD5:ae543423edfe9428f33208d64ae7c680
                      SHA1:612206a41dc3b1510f9faab1aae9b8a896145630
                      SHA256:f0a75b1a1253e778feb63f69402b3b0276b964470251dcc2160b90ba0868f57c
                      SHA512:0fc2bca7b018cfa855ac5bbcbb255d402e08b33941055d463c0d4a8d68247202155d7b6a9c1415f3334c7b6310d132a558c8d170db82f4080839481082143c71
                      SSDEEP:12288:7qDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgagT4:7qDEvCTbMWu7rQYlBQcBiT6rprG8a44
                      TLSH:28159E0273D1C062FFAB92334B5AF6515BBC69260123E61F13981DB9BE701B1563E7A3
                      File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                      Icon Hash:aaf3e3e3938382a0
                      Entrypoint:0x420577
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                      Time Stamp:0x66FB998A [Tue Oct 1 06:41:14 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:5
                      OS Version Minor:1
                      File Version Major:5
                      File Version Minor:1
                      Subsystem Version Major:5
                      Subsystem Version Minor:1
                      Import Hash:948cc502fe9226992dce9417f952fce3
                      Instruction
                      call 00007F54F4B25CC3h
                      jmp 00007F54F4B255CFh
                      push ebp
                      mov ebp, esp
                      push esi
                      push dword ptr [ebp+08h]
                      mov esi, ecx
                      call 00007F54F4B257ADh
                      mov dword ptr [esi], 0049FDF0h
                      mov eax, esi
                      pop esi
                      pop ebp
                      retn 0004h
                      and dword ptr [ecx+04h], 00000000h
                      mov eax, ecx
                      and dword ptr [ecx+08h], 00000000h
                      mov dword ptr [ecx+04h], 0049FDF8h
                      mov dword ptr [ecx], 0049FDF0h
                      ret
                      push ebp
                      mov ebp, esp
                      push esi
                      push dword ptr [ebp+08h]
                      mov esi, ecx
                      call 00007F54F4B2577Ah
                      mov dword ptr [esi], 0049FE0Ch
                      mov eax, esi
                      pop esi
                      pop ebp
                      retn 0004h
                      and dword ptr [ecx+04h], 00000000h
                      mov eax, ecx
                      and dword ptr [ecx+08h], 00000000h
                      mov dword ptr [ecx+04h], 0049FE14h
                      mov dword ptr [ecx], 0049FE0Ch
                      ret
                      push ebp
                      mov ebp, esp
                      push esi
                      mov esi, ecx
                      lea eax, dword ptr [esi+04h]
                      mov dword ptr [esi], 0049FDD0h
                      and dword ptr [eax], 00000000h
                      and dword ptr [eax+04h], 00000000h
                      push eax
                      mov eax, dword ptr [ebp+08h]
                      add eax, 04h
                      push eax
                      call 00007F54F4B2836Dh
                      pop ecx
                      pop ecx
                      mov eax, esi
                      pop esi
                      pop ebp
                      retn 0004h
                      lea eax, dword ptr [ecx+04h]
                      mov dword ptr [ecx], 0049FDD0h
                      push eax
                      call 00007F54F4B283B8h
                      pop ecx
                      ret
                      push ebp
                      mov ebp, esp
                      push esi
                      mov esi, ecx
                      lea eax, dword ptr [esi+04h]
                      mov dword ptr [esi], 0049FDD0h
                      push eax
                      call 00007F54F4B283A1h
                      test byte ptr [ebp+08h], 00000001h
                      pop ecx
                      Programming Language:
                      • [ C ] VS2008 SP1 build 30729
                      • [IMP] VS2008 SP1 build 30729
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x95ac.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xde0000x7594.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0xd40000x95ac0x960051b7293c9ab480202e2cfce5e01e05cdFalse0.2860416666666667data5.1634365561619004IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0xde0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                      RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                      RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                      RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                      RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                      RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                      RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                      RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                      RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                      RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                      RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                      RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                      RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                      RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                      RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                      RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                      RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                      RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                      RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                      RT_RCDATA0xdc7b80x874data1.005083179297597
                      RT_GROUP_ICON0xdd02c0x76dataEnglishGreat Britain0.6610169491525424
                      RT_GROUP_ICON0xdd0a40x14dataEnglishGreat Britain1.25
                      RT_GROUP_ICON0xdd0b80x14dataEnglishGreat Britain1.15
                      RT_GROUP_ICON0xdd0cc0x14dataEnglishGreat Britain1.25
                      RT_VERSION0xdd0e00xdcdataEnglishGreat Britain0.6181818181818182
                      RT_MANIFEST0xdd1bc0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                      DLLImport
                      WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                      VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                      COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                      MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                      WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                      PSAPI.DLLGetProcessMemoryInfo
                      IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                      USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                      UxTheme.dllIsThemeActive
                      KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                      USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                      GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                      COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                      ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                      SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                      ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                      OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                      Language of compilation systemCountry where language is spokenMap
                      EnglishGreat Britain
                      TimestampSource PortDest PortSource IPDest IP
                      Oct 1, 2024 08:59:52.116360903 CEST49675443192.168.2.523.1.237.91
                      Oct 1, 2024 08:59:52.116369009 CEST49674443192.168.2.523.1.237.91
                      Oct 1, 2024 08:59:52.241311073 CEST49673443192.168.2.523.1.237.91
                      Oct 1, 2024 08:59:56.089720964 CEST49706443192.168.2.5142.250.185.110
                      Oct 1, 2024 08:59:56.089776039 CEST44349706142.250.185.110192.168.2.5
                      Oct 1, 2024 08:59:56.089844942 CEST49706443192.168.2.5142.250.185.110
                      Oct 1, 2024 08:59:56.093400955 CEST49706443192.168.2.5142.250.185.110
                      Oct 1, 2024 08:59:56.093417883 CEST44349706142.250.185.110192.168.2.5
                      Oct 1, 2024 08:59:56.748182058 CEST44349706142.250.185.110192.168.2.5
                      Oct 1, 2024 08:59:56.789412022 CEST49706443192.168.2.5142.250.185.110
                      Oct 1, 2024 08:59:56.801703930 CEST49706443192.168.2.5142.250.185.110
                      Oct 1, 2024 08:59:56.801714897 CEST44349706142.250.185.110192.168.2.5
                      Oct 1, 2024 08:59:56.802186966 CEST44349706142.250.185.110192.168.2.5
                      Oct 1, 2024 08:59:56.802237988 CEST49706443192.168.2.5142.250.185.110
                      Oct 1, 2024 08:59:56.803248882 CEST44349706142.250.185.110192.168.2.5
                      Oct 1, 2024 08:59:56.803297997 CEST49706443192.168.2.5142.250.185.110
                      Oct 1, 2024 08:59:56.813951969 CEST49706443192.168.2.5142.250.185.110
                      Oct 1, 2024 08:59:56.814016104 CEST44349706142.250.185.110192.168.2.5
                      Oct 1, 2024 08:59:56.814306974 CEST49706443192.168.2.5142.250.185.110
                      Oct 1, 2024 08:59:56.814315081 CEST44349706142.250.185.110192.168.2.5
                      Oct 1, 2024 08:59:56.866480112 CEST49706443192.168.2.5142.250.185.110
                      Oct 1, 2024 08:59:57.167310953 CEST44349706142.250.185.110192.168.2.5
                      Oct 1, 2024 08:59:57.167368889 CEST44349706142.250.185.110192.168.2.5
                      Oct 1, 2024 08:59:57.167416096 CEST49706443192.168.2.5142.250.185.110
                      Oct 1, 2024 08:59:57.171258926 CEST49706443192.168.2.5142.250.185.110
                      Oct 1, 2024 08:59:57.171288013 CEST44349706142.250.185.110192.168.2.5
                      Oct 1, 2024 08:59:57.182636976 CEST49710443192.168.2.5142.250.185.206
                      Oct 1, 2024 08:59:57.182687044 CEST44349710142.250.185.206192.168.2.5
                      Oct 1, 2024 08:59:57.182746887 CEST49710443192.168.2.5142.250.185.206
                      Oct 1, 2024 08:59:57.183209896 CEST49710443192.168.2.5142.250.185.206
                      Oct 1, 2024 08:59:57.183226109 CEST44349710142.250.185.206192.168.2.5
                      Oct 1, 2024 08:59:57.814449072 CEST44349710142.250.185.206192.168.2.5
                      Oct 1, 2024 08:59:57.814802885 CEST49710443192.168.2.5142.250.185.206
                      Oct 1, 2024 08:59:57.814840078 CEST44349710142.250.185.206192.168.2.5
                      Oct 1, 2024 08:59:57.815407991 CEST44349710142.250.185.206192.168.2.5
                      Oct 1, 2024 08:59:57.815474987 CEST49710443192.168.2.5142.250.185.206
                      Oct 1, 2024 08:59:57.816401958 CEST44349710142.250.185.206192.168.2.5
                      Oct 1, 2024 08:59:57.816451073 CEST49710443192.168.2.5142.250.185.206
                      Oct 1, 2024 08:59:57.817581892 CEST49710443192.168.2.5142.250.185.206
                      Oct 1, 2024 08:59:57.817677975 CEST44349710142.250.185.206192.168.2.5
                      Oct 1, 2024 08:59:57.817828894 CEST49710443192.168.2.5142.250.185.206
                      Oct 1, 2024 08:59:57.817850113 CEST44349710142.250.185.206192.168.2.5
                      Oct 1, 2024 08:59:57.866045952 CEST49710443192.168.2.5142.250.185.206
                      Oct 1, 2024 08:59:58.283468962 CEST44349710142.250.185.206192.168.2.5
                      Oct 1, 2024 08:59:58.283493042 CEST44349710142.250.185.206192.168.2.5
                      Oct 1, 2024 08:59:58.283565044 CEST49710443192.168.2.5142.250.185.206
                      Oct 1, 2024 08:59:58.283591986 CEST44349710142.250.185.206192.168.2.5
                      Oct 1, 2024 08:59:58.283735037 CEST49710443192.168.2.5142.250.185.206
                      Oct 1, 2024 08:59:58.286772013 CEST49710443192.168.2.5142.250.185.206
                      Oct 1, 2024 08:59:58.286794901 CEST44349710142.250.185.206192.168.2.5
                      Oct 1, 2024 09:00:00.488671064 CEST49715443192.168.2.5142.250.185.100
                      Oct 1, 2024 09:00:00.488753080 CEST44349715142.250.185.100192.168.2.5
                      Oct 1, 2024 09:00:00.488843918 CEST49715443192.168.2.5142.250.185.100
                      Oct 1, 2024 09:00:00.489051104 CEST49715443192.168.2.5142.250.185.100
                      Oct 1, 2024 09:00:00.489075899 CEST44349715142.250.185.100192.168.2.5
                      Oct 1, 2024 09:00:00.567441940 CEST49717443192.168.2.5184.28.90.27
                      Oct 1, 2024 09:00:00.567467928 CEST44349717184.28.90.27192.168.2.5
                      Oct 1, 2024 09:00:00.567538023 CEST49717443192.168.2.5184.28.90.27
                      Oct 1, 2024 09:00:00.569021940 CEST49717443192.168.2.5184.28.90.27
                      Oct 1, 2024 09:00:00.569031954 CEST44349717184.28.90.27192.168.2.5
                      Oct 1, 2024 09:00:01.136804104 CEST44349715142.250.185.100192.168.2.5
                      Oct 1, 2024 09:00:01.138530016 CEST49715443192.168.2.5142.250.185.100
                      Oct 1, 2024 09:00:01.138575077 CEST44349715142.250.185.100192.168.2.5
                      Oct 1, 2024 09:00:01.139472008 CEST44349715142.250.185.100192.168.2.5
                      Oct 1, 2024 09:00:01.139545918 CEST49715443192.168.2.5142.250.185.100
                      Oct 1, 2024 09:00:01.140551090 CEST49715443192.168.2.5142.250.185.100
                      Oct 1, 2024 09:00:01.140613079 CEST44349715142.250.185.100192.168.2.5
                      Oct 1, 2024 09:00:01.189465046 CEST49715443192.168.2.5142.250.185.100
                      Oct 1, 2024 09:00:01.189491034 CEST44349715142.250.185.100192.168.2.5
                      Oct 1, 2024 09:00:01.216824055 CEST44349717184.28.90.27192.168.2.5
                      Oct 1, 2024 09:00:01.216913939 CEST49717443192.168.2.5184.28.90.27
                      Oct 1, 2024 09:00:01.219914913 CEST49717443192.168.2.5184.28.90.27
                      Oct 1, 2024 09:00:01.219922066 CEST44349717184.28.90.27192.168.2.5
                      Oct 1, 2024 09:00:01.220314026 CEST44349717184.28.90.27192.168.2.5
                      Oct 1, 2024 09:00:01.240598917 CEST49715443192.168.2.5142.250.185.100
                      Oct 1, 2024 09:00:01.256877899 CEST49717443192.168.2.5184.28.90.27
                      Oct 1, 2024 09:00:01.303404093 CEST44349717184.28.90.27192.168.2.5
                      Oct 1, 2024 09:00:01.483715057 CEST44349717184.28.90.27192.168.2.5
                      Oct 1, 2024 09:00:01.483854055 CEST44349717184.28.90.27192.168.2.5
                      Oct 1, 2024 09:00:01.483911037 CEST49717443192.168.2.5184.28.90.27
                      Oct 1, 2024 09:00:01.558239937 CEST49717443192.168.2.5184.28.90.27
                      Oct 1, 2024 09:00:01.558262110 CEST44349717184.28.90.27192.168.2.5
                      Oct 1, 2024 09:00:01.558273077 CEST49717443192.168.2.5184.28.90.27
                      Oct 1, 2024 09:00:01.558278084 CEST44349717184.28.90.27192.168.2.5
                      Oct 1, 2024 09:00:01.722615957 CEST49674443192.168.2.523.1.237.91
                      Oct 1, 2024 09:00:01.722820044 CEST49675443192.168.2.523.1.237.91
                      Oct 1, 2024 09:00:01.777323961 CEST49721443192.168.2.5184.28.90.27
                      Oct 1, 2024 09:00:01.777373075 CEST44349721184.28.90.27192.168.2.5
                      Oct 1, 2024 09:00:01.777436018 CEST49721443192.168.2.5184.28.90.27
                      Oct 1, 2024 09:00:01.777873039 CEST49721443192.168.2.5184.28.90.27
                      Oct 1, 2024 09:00:01.777887106 CEST44349721184.28.90.27192.168.2.5
                      Oct 1, 2024 09:00:01.848790884 CEST49673443192.168.2.523.1.237.91
                      Oct 1, 2024 09:00:02.414010048 CEST44349721184.28.90.27192.168.2.5
                      Oct 1, 2024 09:00:02.414072990 CEST49721443192.168.2.5184.28.90.27
                      Oct 1, 2024 09:00:02.416205883 CEST49721443192.168.2.5184.28.90.27
                      Oct 1, 2024 09:00:02.416218996 CEST44349721184.28.90.27192.168.2.5
                      Oct 1, 2024 09:00:02.416690111 CEST44349721184.28.90.27192.168.2.5
                      Oct 1, 2024 09:00:02.417787075 CEST49721443192.168.2.5184.28.90.27
                      Oct 1, 2024 09:00:02.463401079 CEST44349721184.28.90.27192.168.2.5
                      Oct 1, 2024 09:00:02.689539909 CEST44349721184.28.90.27192.168.2.5
                      Oct 1, 2024 09:00:02.689582109 CEST44349721184.28.90.27192.168.2.5
                      Oct 1, 2024 09:00:02.689894915 CEST49721443192.168.2.5184.28.90.27
                      Oct 1, 2024 09:00:02.691080093 CEST49721443192.168.2.5184.28.90.27
                      Oct 1, 2024 09:00:02.691101074 CEST44349721184.28.90.27192.168.2.5
                      Oct 1, 2024 09:00:02.691114902 CEST49721443192.168.2.5184.28.90.27
                      Oct 1, 2024 09:00:02.691121101 CEST44349721184.28.90.27192.168.2.5
                      Oct 1, 2024 09:00:03.481139898 CEST4434970323.1.237.91192.168.2.5
                      Oct 1, 2024 09:00:03.481226921 CEST49703443192.168.2.523.1.237.91
                      Oct 1, 2024 09:00:05.268002987 CEST49732443192.168.2.5142.250.186.174
                      Oct 1, 2024 09:00:05.268022060 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:05.268326998 CEST49732443192.168.2.5142.250.186.174
                      Oct 1, 2024 09:00:05.268984079 CEST49732443192.168.2.5142.250.186.174
                      Oct 1, 2024 09:00:05.268996000 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:05.988617897 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:05.989489079 CEST49732443192.168.2.5142.250.186.174
                      Oct 1, 2024 09:00:05.989506960 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:05.989839077 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:05.989907980 CEST49732443192.168.2.5142.250.186.174
                      Oct 1, 2024 09:00:05.990468025 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:05.990521908 CEST49732443192.168.2.5142.250.186.174
                      Oct 1, 2024 09:00:05.991605043 CEST49732443192.168.2.5142.250.186.174
                      Oct 1, 2024 09:00:05.991655111 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:05.991975069 CEST49732443192.168.2.5142.250.186.174
                      Oct 1, 2024 09:00:05.991981030 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:06.038316965 CEST49732443192.168.2.5142.250.186.174
                      Oct 1, 2024 09:00:06.307327032 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:06.307373047 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:06.307415962 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:06.307455063 CEST49732443192.168.2.5142.250.186.174
                      Oct 1, 2024 09:00:06.307475090 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:06.307502985 CEST49732443192.168.2.5142.250.186.174
                      Oct 1, 2024 09:00:06.313277006 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:06.319499016 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:06.319531918 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:06.319631100 CEST49732443192.168.2.5142.250.186.174
                      Oct 1, 2024 09:00:06.319631100 CEST49732443192.168.2.5142.250.186.174
                      Oct 1, 2024 09:00:06.319638968 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:06.321367025 CEST49732443192.168.2.5142.250.186.174
                      Oct 1, 2024 09:00:06.326173067 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:06.326255083 CEST49732443192.168.2.5142.250.186.174
                      Oct 1, 2024 09:00:06.332062960 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:06.332093954 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:06.332159042 CEST49732443192.168.2.5142.250.186.174
                      Oct 1, 2024 09:00:06.332168102 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:06.332211971 CEST49732443192.168.2.5142.250.186.174
                      Oct 1, 2024 09:00:06.396595955 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:06.396859884 CEST49732443192.168.2.5142.250.186.174
                      Oct 1, 2024 09:00:06.397073984 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:06.397131920 CEST49732443192.168.2.5142.250.186.174
                      Oct 1, 2024 09:00:06.397430897 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:06.397481918 CEST49732443192.168.2.5142.250.186.174
                      Oct 1, 2024 09:00:06.403665066 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:06.403703928 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:06.403754950 CEST49732443192.168.2.5142.250.186.174
                      Oct 1, 2024 09:00:06.403762102 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:06.403815985 CEST49732443192.168.2.5142.250.186.174
                      Oct 1, 2024 09:00:06.410089970 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:06.410278082 CEST49732443192.168.2.5142.250.186.174
                      Oct 1, 2024 09:00:06.416002989 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:06.416068077 CEST49732443192.168.2.5142.250.186.174
                      Oct 1, 2024 09:00:06.416146994 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:06.421246052 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:06.425163984 CEST49732443192.168.2.5142.250.186.174
                      Oct 1, 2024 09:00:06.425169945 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:06.427571058 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:06.427695036 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:06.427757978 CEST49732443192.168.2.5142.250.186.174
                      Oct 1, 2024 09:00:06.667144060 CEST49732443192.168.2.5142.250.186.174
                      Oct 1, 2024 09:00:06.667172909 CEST44349732142.250.186.174192.168.2.5
                      Oct 1, 2024 09:00:06.705183029 CEST49735443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:06.705214977 CEST44349735142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:06.705394030 CEST49735443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:06.706197977 CEST49735443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:06.706209898 CEST44349735142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:06.744441032 CEST49736443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:06.744488001 CEST44349736142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:06.744573116 CEST49736443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:06.744908094 CEST49736443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:06.744920969 CEST44349736142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:07.342426062 CEST44349735142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:07.342823029 CEST49735443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:07.342842102 CEST44349735142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:07.343173027 CEST44349735142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:07.343242884 CEST49735443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:07.343803883 CEST44349735142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:07.343853951 CEST49735443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:07.344866037 CEST49735443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:07.344918013 CEST44349735142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:07.345180988 CEST49735443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:07.345186949 CEST44349735142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:07.393533945 CEST44349736142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:07.393698931 CEST49736443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:07.393704891 CEST44349736142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:07.394057035 CEST44349736142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:07.394126892 CEST49736443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:07.394746065 CEST44349736142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:07.394797087 CEST49736443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:07.394906998 CEST49736443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:07.394963026 CEST44349736142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:07.395064116 CEST49736443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:07.395070076 CEST44349736142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:07.398590088 CEST49735443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:07.445471048 CEST49736443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:07.643604994 CEST44349735142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:07.644084930 CEST44349735142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:07.644165039 CEST49735443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:07.644345999 CEST49735443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:07.644361973 CEST44349735142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:07.644372940 CEST49735443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:07.644407034 CEST49735443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:07.645381927 CEST49740443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:07.645463943 CEST44349740142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:07.645544052 CEST49740443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:07.645874023 CEST49740443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:07.645905972 CEST44349740142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:07.698529005 CEST44349736142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:07.698781013 CEST44349736142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:07.698849916 CEST49736443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:07.698929071 CEST49736443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:07.698934078 CEST44349736142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:07.698961020 CEST49736443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:07.698977947 CEST49736443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:07.699620008 CEST49741443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:07.699656963 CEST44349741142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:07.699719906 CEST49741443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:07.699963093 CEST49741443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:07.699979067 CEST44349741142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:08.326884031 CEST44349741142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:08.327152014 CEST49741443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:08.327172995 CEST44349741142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:08.327534914 CEST44349741142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:08.327605009 CEST49741443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:08.328217030 CEST44349741142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:08.328279018 CEST49741443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:08.328423023 CEST49741443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:08.328481913 CEST44349741142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:08.328562021 CEST49741443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:08.328572035 CEST44349741142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:08.328586102 CEST49741443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:08.371026993 CEST44349740142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:08.371287107 CEST49740443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:08.371330023 CEST44349740142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:08.371807098 CEST44349740142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:08.371881962 CEST49740443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:08.372512102 CEST44349740142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:08.372574091 CEST49740443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:08.372698069 CEST49740443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:08.372766018 CEST44349740142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:08.372838974 CEST49740443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:08.372862101 CEST44349740142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:08.372898102 CEST49740443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:08.375397921 CEST44349741142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:08.382203102 CEST49741443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:08.412992001 CEST49740443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:08.413008928 CEST44349740142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:08.545718908 CEST44349741142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:08.546422958 CEST44349741142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:08.546567917 CEST49741443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:08.546986103 CEST49741443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:08.547002077 CEST44349741142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:08.599299908 CEST44349740142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:08.599767923 CEST44349740142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:08.599906921 CEST49740443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:08.600367069 CEST49740443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:08.600378990 CEST44349740142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:09.039953947 CEST49715443192.168.2.5142.250.185.100
                      Oct 1, 2024 09:00:09.083432913 CEST44349715142.250.185.100192.168.2.5
                      Oct 1, 2024 09:00:09.400038958 CEST44349715142.250.185.100192.168.2.5
                      Oct 1, 2024 09:00:09.400079012 CEST44349715142.250.185.100192.168.2.5
                      Oct 1, 2024 09:00:09.400106907 CEST44349715142.250.185.100192.168.2.5
                      Oct 1, 2024 09:00:09.400140047 CEST44349715142.250.185.100192.168.2.5
                      Oct 1, 2024 09:00:09.400139093 CEST49715443192.168.2.5142.250.185.100
                      Oct 1, 2024 09:00:09.400171995 CEST44349715142.250.185.100192.168.2.5
                      Oct 1, 2024 09:00:09.400202990 CEST49715443192.168.2.5142.250.185.100
                      Oct 1, 2024 09:00:09.400247097 CEST44349715142.250.185.100192.168.2.5
                      Oct 1, 2024 09:00:09.400300980 CEST49715443192.168.2.5142.250.185.100
                      Oct 1, 2024 09:00:09.414117098 CEST49715443192.168.2.5142.250.185.100
                      Oct 1, 2024 09:00:09.414139986 CEST44349715142.250.185.100192.168.2.5
                      Oct 1, 2024 09:00:12.364765882 CEST49747443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:12.364801884 CEST4434974720.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:12.364871025 CEST49747443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:12.369091034 CEST49747443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:12.369106054 CEST4434974720.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:13.156553030 CEST4434974720.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:13.156625032 CEST49747443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:13.165412903 CEST49747443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:13.165421009 CEST4434974720.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:13.165802002 CEST4434974720.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:13.210046053 CEST49747443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:13.990952969 CEST49747443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:14.035408974 CEST4434974720.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:14.246778965 CEST4434974720.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:14.246810913 CEST4434974720.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:14.246820927 CEST4434974720.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:14.246838093 CEST4434974720.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:14.246897936 CEST4434974720.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:14.246913910 CEST49747443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:14.246939898 CEST4434974720.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:14.246954918 CEST49747443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:14.246984959 CEST49747443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:14.247565031 CEST4434974720.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:14.247644901 CEST49747443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:14.247651100 CEST4434974720.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:14.247714996 CEST4434974720.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:14.247770071 CEST49747443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:14.303734064 CEST49703443192.168.2.523.1.237.91
                      Oct 1, 2024 09:00:14.303850889 CEST49703443192.168.2.523.1.237.91
                      Oct 1, 2024 09:00:14.306337118 CEST49754443192.168.2.523.1.237.91
                      Oct 1, 2024 09:00:14.306411028 CEST4434975423.1.237.91192.168.2.5
                      Oct 1, 2024 09:00:14.306502104 CEST49754443192.168.2.523.1.237.91
                      Oct 1, 2024 09:00:14.307029009 CEST49754443192.168.2.523.1.237.91
                      Oct 1, 2024 09:00:14.307068110 CEST4434975423.1.237.91192.168.2.5
                      Oct 1, 2024 09:00:14.308504105 CEST4434970323.1.237.91192.168.2.5
                      Oct 1, 2024 09:00:14.308604002 CEST4434970323.1.237.91192.168.2.5
                      Oct 1, 2024 09:00:14.393959045 CEST49755443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:14.394009113 CEST44349755142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:14.394067049 CEST49755443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:14.394464016 CEST49755443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:14.394490957 CEST44349755142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:14.896106958 CEST49747443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:14.896133900 CEST4434974720.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:14.896145105 CEST49747443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:14.896155119 CEST4434974720.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:14.900437117 CEST4434975423.1.237.91192.168.2.5
                      Oct 1, 2024 09:00:14.900513887 CEST49754443192.168.2.523.1.237.91
                      Oct 1, 2024 09:00:15.043663025 CEST44349755142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:15.043937922 CEST49755443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:15.043963909 CEST44349755142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:15.044348001 CEST44349755142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:15.044706106 CEST49755443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:15.044787884 CEST44349755142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:15.044907093 CEST49755443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:15.044944048 CEST49755443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:15.044956923 CEST44349755142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:15.375485897 CEST44349755142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:15.376472950 CEST44349755142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:15.376550913 CEST49755443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:15.377585888 CEST49755443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:15.377619028 CEST44349755142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:34.050168991 CEST4434975423.1.237.91192.168.2.5
                      Oct 1, 2024 09:00:34.050262928 CEST49754443192.168.2.523.1.237.91
                      Oct 1, 2024 09:00:37.041346073 CEST49757443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:37.041438103 CEST44349757142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:37.041538954 CEST49757443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:37.041937113 CEST49757443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:37.041971922 CEST44349757142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:37.322407961 CEST49758443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:37.322472095 CEST44349758142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:37.322545052 CEST49758443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:37.322845936 CEST49758443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:37.322859049 CEST44349758142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:37.846482038 CEST49759443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:37.846529007 CEST44349759142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:37.846606016 CEST49759443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:37.847148895 CEST49759443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:37.847162962 CEST44349759142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:37.867568016 CEST44349757142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:37.867850065 CEST49757443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:37.867913008 CEST44349757142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:37.868444920 CEST44349757142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:37.868825912 CEST49757443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:37.868921041 CEST44349757142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:37.868985891 CEST49757443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:37.869045973 CEST49757443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:37.869059086 CEST44349757142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:37.951617002 CEST44349758142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:37.990746021 CEST49758443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:37.990786076 CEST44349758142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:37.991271973 CEST44349758142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:37.993073940 CEST49758443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:37.993146896 CEST44349758142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:37.993268967 CEST49758443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:37.993321896 CEST49758443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:37.993334055 CEST44349758142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:38.170589924 CEST44349757142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:38.170905113 CEST44349757142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:38.171005011 CEST49757443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:38.171518087 CEST49757443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:38.171565056 CEST44349757142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:38.252679110 CEST44349758142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:38.252986908 CEST44349758142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:38.253045082 CEST49758443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:38.253267050 CEST49758443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:38.253287077 CEST44349758142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:38.494940996 CEST44349759142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:38.495294094 CEST49759443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:38.495311022 CEST44349759142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:38.495662928 CEST44349759142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:38.495723009 CEST49759443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:38.496355057 CEST44349759142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:38.496403933 CEST49759443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:38.496547937 CEST49759443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:38.496604919 CEST44349759142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:38.496715069 CEST49759443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:38.496726990 CEST44349759142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:38.496747971 CEST49759443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:38.541316986 CEST49759443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:38.541325092 CEST44349759142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:38.715455055 CEST44349759142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:38.715903997 CEST44349759142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:38.716068029 CEST49759443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:38.716100931 CEST49759443192.168.2.5142.250.186.110
                      Oct 1, 2024 09:00:38.716120005 CEST44349759142.250.186.110192.168.2.5
                      Oct 1, 2024 09:00:51.286542892 CEST49760443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:51.286617994 CEST4434976020.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:51.286705971 CEST49760443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:51.287209988 CEST49760443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:51.287245035 CEST4434976020.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:52.070998907 CEST4434976020.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:52.071157932 CEST49760443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:52.075431108 CEST49760443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:52.075459957 CEST4434976020.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:52.075702906 CEST4434976020.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:52.084405899 CEST49760443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:52.131413937 CEST4434976020.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:52.405895948 CEST4434976020.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:52.405922890 CEST4434976020.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:52.405976057 CEST4434976020.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:52.406004906 CEST49760443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:52.406058073 CEST4434976020.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:52.406092882 CEST49760443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:52.406119108 CEST49760443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:52.407350063 CEST4434976020.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:52.407418013 CEST4434976020.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:52.407440901 CEST49760443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:52.407474995 CEST4434976020.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:52.407502890 CEST49760443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:52.408473969 CEST4434976020.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:52.408544064 CEST49760443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:52.426121950 CEST49760443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:52.426177025 CEST4434976020.114.59.183192.168.2.5
                      Oct 1, 2024 09:00:52.426206112 CEST49760443192.168.2.520.114.59.183
                      Oct 1, 2024 09:00:52.426220894 CEST4434976020.114.59.183192.168.2.5
                      Oct 1, 2024 09:01:00.539063931 CEST49762443192.168.2.5142.250.185.100
                      Oct 1, 2024 09:01:00.539180994 CEST44349762142.250.185.100192.168.2.5
                      Oct 1, 2024 09:01:00.539284945 CEST49762443192.168.2.5142.250.185.100
                      Oct 1, 2024 09:01:00.539521933 CEST49762443192.168.2.5142.250.185.100
                      Oct 1, 2024 09:01:00.539556980 CEST44349762142.250.185.100192.168.2.5
                      Oct 1, 2024 09:01:01.187791109 CEST44349762142.250.185.100192.168.2.5
                      Oct 1, 2024 09:01:01.188483953 CEST49762443192.168.2.5142.250.185.100
                      Oct 1, 2024 09:01:01.188520908 CEST44349762142.250.185.100192.168.2.5
                      Oct 1, 2024 09:01:01.188882113 CEST44349762142.250.185.100192.168.2.5
                      Oct 1, 2024 09:01:01.189306021 CEST49762443192.168.2.5142.250.185.100
                      Oct 1, 2024 09:01:01.189382076 CEST44349762142.250.185.100192.168.2.5
                      Oct 1, 2024 09:01:01.240953922 CEST49762443192.168.2.5142.250.185.100
                      Oct 1, 2024 09:01:07.908778906 CEST49764443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:07.908821106 CEST44349764172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:07.908902884 CEST49764443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:07.909171104 CEST49764443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:07.909188032 CEST44349764172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:08.540930033 CEST44349764172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:08.541316986 CEST49764443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:08.541380882 CEST44349764172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:08.541802883 CEST44349764172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:08.542124987 CEST49764443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:08.542200089 CEST44349764172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:08.542310953 CEST49764443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:08.542346954 CEST49764443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:08.542360067 CEST44349764172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:08.587960005 CEST49765443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:08.588016987 CEST44349765172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:08.588145018 CEST49765443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:08.588485003 CEST49765443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:08.588500023 CEST44349765172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:08.840400934 CEST44349764172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:08.840673923 CEST44349764172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:08.840749025 CEST49764443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:08.840980053 CEST49764443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:08.841017008 CEST44349764172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:09.218574047 CEST44349765172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:09.218894005 CEST49765443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:09.218914032 CEST44349765172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:09.219288111 CEST44349765172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:09.219793081 CEST49765443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:09.219877005 CEST44349765172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:09.220010042 CEST49765443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:09.220027924 CEST49765443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:09.220038891 CEST44349765172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:09.434302092 CEST44349765172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:09.434425116 CEST44349765172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:09.434499025 CEST49765443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:09.435066938 CEST49765443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:09.435091019 CEST44349765172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:11.112323046 CEST44349762142.250.185.100192.168.2.5
                      Oct 1, 2024 09:01:11.112397909 CEST44349762142.250.185.100192.168.2.5
                      Oct 1, 2024 09:01:11.112592936 CEST49762443192.168.2.5142.250.185.100
                      Oct 1, 2024 09:01:24.633595943 CEST49762443192.168.2.5142.250.185.100
                      Oct 1, 2024 09:01:24.633666039 CEST44349762142.250.185.100192.168.2.5
                      Oct 1, 2024 09:01:38.104806900 CEST49768443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:38.104871035 CEST44349768172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:38.104990005 CEST49768443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:38.105232000 CEST49768443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:38.105248928 CEST44349768172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:38.752257109 CEST44349768172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:38.752562046 CEST49768443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:38.752582073 CEST44349768172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:38.753853083 CEST44349768172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:38.754170895 CEST49768443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:38.754339933 CEST44349768172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:38.754342079 CEST49768443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:38.754379034 CEST49768443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:38.754462004 CEST44349768172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:38.803987980 CEST49768443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:39.051987886 CEST44349768172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:39.052495956 CEST44349768172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:39.052604914 CEST49768443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:39.052836895 CEST49768443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:39.052866936 CEST44349768172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:39.136440992 CEST49769443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:39.136486053 CEST44349769172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:39.136626959 CEST49769443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:39.137120008 CEST49769443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:39.137130976 CEST44349769172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:39.809524059 CEST44349769172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:39.832849026 CEST49769443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:39.832892895 CEST44349769172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:39.834391117 CEST44349769172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:39.841762066 CEST49769443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:39.841949940 CEST49769443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:39.841955900 CEST44349769172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:39.841969013 CEST49769443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:39.842008114 CEST44349769172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:39.883167028 CEST49769443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:40.113981009 CEST44349769172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:40.114685059 CEST44349769172.217.16.142192.168.2.5
                      Oct 1, 2024 09:01:40.114757061 CEST49769443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:40.115008116 CEST49769443192.168.2.5172.217.16.142
                      Oct 1, 2024 09:01:40.115029097 CEST44349769172.217.16.142192.168.2.5
                      TimestampSource PortDest PortSource IPDest IP
                      Oct 1, 2024 08:59:56.037740946 CEST53598431.1.1.1192.168.2.5
                      Oct 1, 2024 08:59:56.046153069 CEST6231153192.168.2.51.1.1.1
                      Oct 1, 2024 08:59:56.046726942 CEST5106753192.168.2.51.1.1.1
                      Oct 1, 2024 08:59:56.052706957 CEST53623111.1.1.1192.168.2.5
                      Oct 1, 2024 08:59:56.053276062 CEST53510671.1.1.1192.168.2.5
                      Oct 1, 2024 08:59:56.054043055 CEST53618851.1.1.1192.168.2.5
                      Oct 1, 2024 08:59:57.174525976 CEST5911153192.168.2.51.1.1.1
                      Oct 1, 2024 08:59:57.174961090 CEST5598353192.168.2.51.1.1.1
                      Oct 1, 2024 08:59:57.181317091 CEST53591111.1.1.1192.168.2.5
                      Oct 1, 2024 08:59:57.182132959 CEST53559831.1.1.1192.168.2.5
                      Oct 1, 2024 08:59:57.226317883 CEST53525611.1.1.1192.168.2.5
                      Oct 1, 2024 09:00:00.479229927 CEST6418253192.168.2.51.1.1.1
                      Oct 1, 2024 09:00:00.479378939 CEST5163653192.168.2.51.1.1.1
                      Oct 1, 2024 09:00:00.486032009 CEST53641821.1.1.1192.168.2.5
                      Oct 1, 2024 09:00:00.487680912 CEST53516361.1.1.1192.168.2.5
                      Oct 1, 2024 09:00:00.562933922 CEST53616561.1.1.1192.168.2.5
                      Oct 1, 2024 09:00:02.773972988 CEST53544751.1.1.1192.168.2.5
                      Oct 1, 2024 09:00:05.256084919 CEST5366453192.168.2.51.1.1.1
                      Oct 1, 2024 09:00:05.256449938 CEST6505853192.168.2.51.1.1.1
                      Oct 1, 2024 09:00:05.262600899 CEST53536641.1.1.1192.168.2.5
                      Oct 1, 2024 09:00:05.263534069 CEST53650581.1.1.1192.168.2.5
                      Oct 1, 2024 09:00:06.686295033 CEST5586753192.168.2.51.1.1.1
                      Oct 1, 2024 09:00:06.688724995 CEST6016353192.168.2.51.1.1.1
                      Oct 1, 2024 09:00:06.693706989 CEST53558671.1.1.1192.168.2.5
                      Oct 1, 2024 09:00:06.695404053 CEST53601631.1.1.1192.168.2.5
                      Oct 1, 2024 09:00:14.323210001 CEST53536881.1.1.1192.168.2.5
                      Oct 1, 2024 09:00:33.073771000 CEST53603821.1.1.1192.168.2.5
                      Oct 1, 2024 09:00:55.735680103 CEST53506731.1.1.1192.168.2.5
                      Oct 1, 2024 09:00:55.918127060 CEST53525411.1.1.1192.168.2.5
                      Oct 1, 2024 09:01:07.426738024 CEST53616481.1.1.1192.168.2.5
                      Oct 1, 2024 09:01:07.901170969 CEST4967353192.168.2.51.1.1.1
                      Oct 1, 2024 09:01:07.901571035 CEST6049253192.168.2.51.1.1.1
                      Oct 1, 2024 09:01:07.907818079 CEST53496731.1.1.1192.168.2.5
                      Oct 1, 2024 09:01:07.908380032 CEST53604921.1.1.1192.168.2.5
                      Oct 1, 2024 09:01:24.640881062 CEST53609151.1.1.1192.168.2.5
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Oct 1, 2024 08:59:56.046153069 CEST192.168.2.51.1.1.10x331Standard query (0)youtube.comA (IP address)IN (0x0001)false
                      Oct 1, 2024 08:59:56.046726942 CEST192.168.2.51.1.1.10x86b3Standard query (0)youtube.com65IN (0x0001)false
                      Oct 1, 2024 08:59:57.174525976 CEST192.168.2.51.1.1.10xba5cStandard query (0)www.youtube.comA (IP address)IN (0x0001)false
                      Oct 1, 2024 08:59:57.174961090 CEST192.168.2.51.1.1.10x456Standard query (0)www.youtube.com65IN (0x0001)false
                      Oct 1, 2024 09:00:00.479229927 CEST192.168.2.51.1.1.10x60d1Standard query (0)www.google.comA (IP address)IN (0x0001)false
                      Oct 1, 2024 09:00:00.479378939 CEST192.168.2.51.1.1.10x702eStandard query (0)www.google.com65IN (0x0001)false
                      Oct 1, 2024 09:00:05.256084919 CEST192.168.2.51.1.1.10xf10bStandard query (0)accounts.youtube.comA (IP address)IN (0x0001)false
                      Oct 1, 2024 09:00:05.256449938 CEST192.168.2.51.1.1.10x3fc1Standard query (0)accounts.youtube.com65IN (0x0001)false
                      Oct 1, 2024 09:00:06.686295033 CEST192.168.2.51.1.1.10xa65aStandard query (0)play.google.comA (IP address)IN (0x0001)false
                      Oct 1, 2024 09:00:06.688724995 CEST192.168.2.51.1.1.10xdc2Standard query (0)play.google.com65IN (0x0001)false
                      Oct 1, 2024 09:01:07.901170969 CEST192.168.2.51.1.1.10xac52Standard query (0)play.google.comA (IP address)IN (0x0001)false
                      Oct 1, 2024 09:01:07.901571035 CEST192.168.2.51.1.1.10xb71eStandard query (0)play.google.com65IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Oct 1, 2024 08:59:56.052706957 CEST1.1.1.1192.168.2.50x331No error (0)youtube.com142.250.185.110A (IP address)IN (0x0001)false
                      Oct 1, 2024 08:59:56.053276062 CEST1.1.1.1192.168.2.50x86b3No error (0)youtube.com65IN (0x0001)false
                      Oct 1, 2024 08:59:57.181317091 CEST1.1.1.1192.168.2.50xba5cNo error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                      Oct 1, 2024 08:59:57.181317091 CEST1.1.1.1192.168.2.50xba5cNo error (0)youtube-ui.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                      Oct 1, 2024 08:59:57.181317091 CEST1.1.1.1192.168.2.50xba5cNo error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                      Oct 1, 2024 08:59:57.181317091 CEST1.1.1.1192.168.2.50xba5cNo error (0)youtube-ui.l.google.com216.58.206.46A (IP address)IN (0x0001)false
                      Oct 1, 2024 08:59:57.181317091 CEST1.1.1.1192.168.2.50xba5cNo error (0)youtube-ui.l.google.com216.58.206.78A (IP address)IN (0x0001)false
                      Oct 1, 2024 08:59:57.181317091 CEST1.1.1.1192.168.2.50xba5cNo error (0)youtube-ui.l.google.com142.250.185.78A (IP address)IN (0x0001)false
                      Oct 1, 2024 08:59:57.181317091 CEST1.1.1.1192.168.2.50xba5cNo error (0)youtube-ui.l.google.com216.58.212.142A (IP address)IN (0x0001)false
                      Oct 1, 2024 08:59:57.181317091 CEST1.1.1.1192.168.2.50xba5cNo error (0)youtube-ui.l.google.com142.250.185.238A (IP address)IN (0x0001)false
                      Oct 1, 2024 08:59:57.181317091 CEST1.1.1.1192.168.2.50xba5cNo error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                      Oct 1, 2024 08:59:57.181317091 CEST1.1.1.1192.168.2.50xba5cNo error (0)youtube-ui.l.google.com142.250.181.238A (IP address)IN (0x0001)false
                      Oct 1, 2024 08:59:57.181317091 CEST1.1.1.1192.168.2.50xba5cNo error (0)youtube-ui.l.google.com142.250.185.110A (IP address)IN (0x0001)false
                      Oct 1, 2024 08:59:57.181317091 CEST1.1.1.1192.168.2.50xba5cNo error (0)youtube-ui.l.google.com142.250.184.206A (IP address)IN (0x0001)false
                      Oct 1, 2024 08:59:57.181317091 CEST1.1.1.1192.168.2.50xba5cNo error (0)youtube-ui.l.google.com172.217.16.142A (IP address)IN (0x0001)false
                      Oct 1, 2024 08:59:57.181317091 CEST1.1.1.1192.168.2.50xba5cNo error (0)youtube-ui.l.google.com142.250.186.142A (IP address)IN (0x0001)false
                      Oct 1, 2024 08:59:57.181317091 CEST1.1.1.1192.168.2.50xba5cNo error (0)youtube-ui.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                      Oct 1, 2024 08:59:57.181317091 CEST1.1.1.1192.168.2.50xba5cNo error (0)youtube-ui.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                      Oct 1, 2024 08:59:57.181317091 CEST1.1.1.1192.168.2.50xba5cNo error (0)youtube-ui.l.google.com142.250.186.78A (IP address)IN (0x0001)false
                      Oct 1, 2024 08:59:57.182132959 CEST1.1.1.1192.168.2.50x456No error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                      Oct 1, 2024 08:59:57.182132959 CEST1.1.1.1192.168.2.50x456No error (0)youtube-ui.l.google.com65IN (0x0001)false
                      Oct 1, 2024 09:00:00.486032009 CEST1.1.1.1192.168.2.50x60d1No error (0)www.google.com142.250.185.100A (IP address)IN (0x0001)false
                      Oct 1, 2024 09:00:00.487680912 CEST1.1.1.1192.168.2.50x702eNo error (0)www.google.com65IN (0x0001)false
                      Oct 1, 2024 09:00:05.262600899 CEST1.1.1.1192.168.2.50xf10bNo error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                      Oct 1, 2024 09:00:05.262600899 CEST1.1.1.1192.168.2.50xf10bNo error (0)www3.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                      Oct 1, 2024 09:00:05.263534069 CEST1.1.1.1192.168.2.50x3fc1No error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                      Oct 1, 2024 09:00:06.693706989 CEST1.1.1.1192.168.2.50xa65aNo error (0)play.google.com142.250.186.110A (IP address)IN (0x0001)false
                      Oct 1, 2024 09:01:07.907818079 CEST1.1.1.1192.168.2.50xac52No error (0)play.google.com172.217.16.142A (IP address)IN (0x0001)false
                      • youtube.com
                      • www.youtube.com
                      • fs.microsoft.com
                      • https:
                        • accounts.youtube.com
                        • play.google.com
                        • www.google.com
                      • slscr.update.microsoft.com
                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.549706142.250.185.1104431560C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 06:59:56 UTC859OUTGET /account?=https://accounts.google.com/v3/signin/challenge/pwd HTTP/1.1
                      Host: youtube.com
                      Connection: keep-alive
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      sec-ch-ua-platform: "Windows"
                      Upgrade-Insecure-Requests: 1
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlKHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: none
                      Sec-Fetch-Mode: navigate
                      Sec-Fetch-User: ?1
                      Sec-Fetch-Dest: document
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      2024-10-01 06:59:57 UTC1704INHTTP/1.1 301 Moved Permanently
                      Content-Type: application/binary
                      X-Content-Type-Options: nosniff
                      Expires: Tue, 01 Oct 2024 06:59:57 GMT
                      Date: Tue, 01 Oct 2024 06:59:57 GMT
                      Cache-Control: private, max-age=31536000
                      Location: https://www.youtube.com/account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd
                      X-Frame-Options: SAMEORIGIN
                      Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                      Origin-Trial: AmhMBR6zCLzDDxpW+HfpP67BqwIknWnyMOXOQGfzYswFmJe+fgaI6XZgAzcxOrzNtP7hEDsOo1jdjFnVr2IdxQ4AAAB4eyJvcmlnaW4iOiJodHRwczovL3lvdXR1YmUuY29tOjQ0MyIsImZlYXR1cmUiOiJXZWJWaWV3WFJlcXVlc3RlZFdpdGhEZXByZWNhdGlvbiIsImV4cGlyeSI6MTc1ODA2NzE5OSwiaXNTdWJkb21haW4iOnRydWV9
                      Report-To: {"group":"youtube_main","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/youtube_main"}]}
                      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                      Vary: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                      Content-Security-Policy: require-trusted-types-for 'script'
                      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                      Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="youtube_main"
                      Server: ESF
                      Content-Length: 0
                      X-XSS-Protection: 0
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Connection: close


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      1192.168.2.549710142.250.185.2064431560C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 06:59:57 UTC877OUTGET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1
                      Host: www.youtube.com
                      Connection: keep-alive
                      Upgrade-Insecure-Requests: 1
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlKHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: none
                      Sec-Fetch-Mode: navigate
                      Sec-Fetch-User: ?1
                      Sec-Fetch-Dest: document
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      sec-ch-ua-platform: "Windows"
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      2024-10-01 06:59:58 UTC2634INHTTP/1.1 303 See Other
                      Content-Type: application/binary
                      X-Content-Type-Options: nosniff
                      Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                      Pragma: no-cache
                      Expires: Mon, 01 Jan 1990 00:00:00 GMT
                      Date: Tue, 01 Oct 2024 06:59:58 GMT
                      Location: https://accounts.google.com/ServiceLogin?service=youtube&uilel=3&passive=true&continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%253F%253Dhttps%25253A%25252F%25252Faccounts.google.com%25252Fv3%25252Fsignin%25252Fchallenge%25252Fpwd%26feature%3Dredirect_login&hl=en
                      X-Frame-Options: SAMEORIGIN
                      Strict-Transport-Security: max-age=31536000
                      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                      Content-Security-Policy: require-trusted-types-for 'script'
                      Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="youtube_main"
                      Origin-Trial: AmhMBR6zCLzDDxpW+HfpP67BqwIknWnyMOXOQGfzYswFmJe+fgaI6XZgAzcxOrzNtP7hEDsOo1jdjFnVr2IdxQ4AAAB4eyJvcmlnaW4iOiJodHRwczovL3lvdXR1YmUuY29tOjQ0MyIsImZlYXR1cmUiOiJXZWJWaWV3WFJlcXVlc3RlZFdpdGhEZXByZWNhdGlvbiIsImV4cGlyeSI6MTc1ODA2NzE5OSwiaXNTdWJkb21haW4iOnRydWV9
                      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                      Vary: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                      Report-To: {"group":"youtube_main","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/youtube_main"}]}
                      P3P: CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657?hl=en for more info."
                      Server: ESF
                      Content-Length: 0
                      X-XSS-Protection: 0
                      Set-Cookie: GPS=1; Domain=.youtube.com; Expires=Tue, 01-Oct-2024 07:29:58 GMT; Path=/; Secure; HttpOnly
                      Set-Cookie: YSC=8PWZxBsFcjw; Domain=.youtube.com; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                      Set-Cookie: VISITOR_INFO1_LIVE=aBE41Ct7SQE; Domain=.youtube.com; Expires=Sun, 30-Mar-2025 06:59:58 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                      Set-Cookie: VISITOR_PRIVACY_METADATA=CgJVUxIEGgAgGA%3D%3D; Domain=.youtube.com; Expires=Sun, 30-Mar-2025 06:59:58 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Connection: close


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      2192.168.2.549717184.28.90.27443
                      TimestampBytes transferredDirectionData
                      2024-10-01 07:00:01 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
                      Connection: Keep-Alive
                      Accept: */*
                      Accept-Encoding: identity
                      User-Agent: Microsoft BITS/7.8
                      Host: fs.microsoft.com
                      2024-10-01 07:00:01 UTC467INHTTP/1.1 200 OK
                      Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                      Content-Type: application/octet-stream
                      ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                      Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                      Server: ECAcc (lpl/EF06)
                      X-CID: 11
                      X-Ms-ApiVersion: Distribute 1.2
                      X-Ms-Region: prod-neu-z1
                      Cache-Control: public, max-age=207949
                      Date: Tue, 01 Oct 2024 07:00:01 GMT
                      Connection: close
                      X-CID: 2


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      3192.168.2.549721184.28.90.27443
                      TimestampBytes transferredDirectionData
                      2024-10-01 07:00:02 UTC239OUTGET /fs/windows/config.json HTTP/1.1
                      Connection: Keep-Alive
                      Accept: */*
                      Accept-Encoding: identity
                      If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
                      Range: bytes=0-2147483646
                      User-Agent: Microsoft BITS/7.8
                      Host: fs.microsoft.com
                      2024-10-01 07:00:02 UTC515INHTTP/1.1 200 OK
                      ApiVersion: Distribute 1.1
                      Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                      Content-Type: application/octet-stream
                      ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                      Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                      Server: ECAcc (lpl/EF06)
                      X-CID: 11
                      X-Ms-ApiVersion: Distribute 1.2
                      X-Ms-Region: prod-weu-z1
                      Cache-Control: public, max-age=207892
                      Date: Tue, 01 Oct 2024 07:00:02 GMT
                      Content-Length: 55
                      Connection: close
                      X-CID: 2
                      2024-10-01 07:00:02 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
                      Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      4192.168.2.549732142.250.186.1744431560C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 07:00:05 UTC1244OUTGET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=-598098695&timestamp=1727766004299 HTTP/1.1
                      Host: accounts.youtube.com
                      Connection: keep-alive
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      sec-ch-ua-full-version: "117.0.5938.132"
                      sec-ch-ua-arch: "x86"
                      sec-ch-ua-platform: "Windows"
                      sec-ch-ua-platform-version: "10.0.0"
                      sec-ch-ua-model: ""
                      sec-ch-ua-bitness: "64"
                      sec-ch-ua-wow64: ?0
                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                      Upgrade-Insecure-Requests: 1
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlKHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: cross-site
                      Sec-Fetch-Mode: navigate
                      Sec-Fetch-User: ?1
                      Sec-Fetch-Dest: iframe
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      2024-10-01 07:00:06 UTC1958INHTTP/1.1 200 OK
                      Content-Type: text/html; charset=utf-8
                      X-Frame-Options: ALLOW-FROM https://accounts.google.com
                      Content-Security-Policy: frame-ancestors https://accounts.google.com
                      Content-Security-Policy: script-src 'report-sample' 'nonce-kpMmwSYpmBAIvPgTBH4nHA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport;worker-src 'self'
                      Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport/allowlist
                      Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport
                      Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                      Pragma: no-cache
                      Expires: Mon, 01 Jan 1990 00:00:00 GMT
                      Date: Tue, 01 Oct 2024 07:00:06 GMT
                      Cross-Origin-Opener-Policy: same-origin
                      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                      Cross-Origin-Resource-Policy: cross-origin
                      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                      reporting-endpoints: default="/_/AccountsDomainCookiesCheckConnectionHttp/web-reports?context=eJzjMtDikmLw0ZBikPj6kkkLiJ3SZ7CGAHHSv_OsJUB8ufsS63UgLpK4wtoCxELcHN92v9vOJnDif3uMkl5SfmF8ZkpqXklmSWVKfm5iZl5yfn52ZmpxcWpRWWpRvJGBkYmBpZGRnoFFfIEBAGTHKpI"
                      Server: ESF
                      X-XSS-Protection: 0
                      X-Content-Type-Options: nosniff
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Accept-Ranges: none
                      Vary: Accept-Encoding
                      Connection: close
                      Transfer-Encoding: chunked
                      2024-10-01 07:00:06 UTC1958INData Raw: 37 36 31 39 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 20 6e 6f 6e 63 65 3d 22 6b 70 4d 6d 77 53 59 70 6d 42 41 49 76 50 67 54 42 48 34 6e 48 41 22 3e 22 75 73 65 20 73 74 72 69 63 74 22 3b 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 3d 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 7c 7c 7b 7d 3b 28 66 75 6e 63 74 69 6f 6e 28 5f 29 7b 76 61 72 20 77 69 6e 64 6f 77 3d 74 68 69 73 3b 0a 74 72 79 7b 0a 5f 2e 5f 46 5f 74 6f 67 67 6c 65 73 5f 69 6e 69 74 69 61 6c 69 7a 65 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 28 74 79 70 65 6f
                      Data Ascii: 7619<html><head><script nonce="kpMmwSYpmBAIvPgTBH4nHA">"use strict";this.default_AccountsDomaincookiesCheckconnectionJs=this.default_AccountsDomaincookiesCheckconnectionJs||{};(function(_){var window=this;try{_._F_toggles_initialize=function(a){(typeo
                      2024-10-01 07:00:06 UTC1958INData Raw: 63 5b 31 5d 29 69 66 28 62 3d 2f 54 72 69 64 65 6e 74 5c 2f 28 5c 64 2e 5c 64 29 2f 2e 65 78 65 63 28 62 29 2c 0a 63 5b 31 5d 3d 3d 22 37 2e 30 22 29 69 66 28 62 26 26 62 5b 31 5d 29 73 77 69 74 63 68 28 62 5b 31 5d 29 7b 63 61 73 65 20 22 34 2e 30 22 3a 61 3d 22 38 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 35 2e 30 22 3a 61 3d 22 39 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 36 2e 30 22 3a 61 3d 22 31 30 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 37 2e 30 22 3a 61 3d 22 31 31 2e 30 22 7d 65 6c 73 65 20 61 3d 22 37 2e 30 22 3b 65 6c 73 65 20 61 3d 63 5b 31 5d 3b 62 3d 61 7d 65 6c 73 65 20 62 3d 22 22 3b 72 65 74 75 72 6e 20 62 7d 76 61 72 20 64 3d 52 65 67 45 78 70 28 22 28 5b 41 2d 5a 5d 5b 5c 5c 77 20 5d 2b 29 2f 28 5b 5e 5c 5c 73 5d 2b
                      Data Ascii: c[1])if(b=/Trident\/(\d.\d)/.exec(b),c[1]=="7.0")if(b&&b[1])switch(b[1]){case "4.0":a="8.0";break;case "5.0":a="9.0";break;case "6.0":a="10.0";break;case "7.0":a="11.0"}else a="7.0";else a=c[1];b=a}else b="";return b}var d=RegExp("([A-Z][\\w ]+)/([^\\s]+
                      2024-10-01 07:00:06 UTC1958INData Raw: 61 29 7d 2c 49 61 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 73 77 69 74 63 68 28 74 79 70 65 6f 66 20 61 29 7b 63 61 73 65 20 22 6e 75 6d 62 65 72 22 3a 72 65 74 75 72 6e 20 69 73 46 69 6e 69 74 65 28 61 29 3f 61 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 69 67 69 6e 74 22 3a 72 65 74 75 72 6e 28 41 61 3f 0a 61 3e 3d 42 61 26 26 61 3c 3d 43 61 3a 61 5b 30 5d 3d 3d 3d 22 2d 22 3f 75 61 28 61 2c 44 61 29 3a 75 61 28 61 2c 45 61 29 29 3f 4e 75 6d 62 65 72 28 61 29 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 72 65 74 75 72 6e 20 61 3f 31 3a 30 3b 63 61 73 65 20 22 6f 62 6a 65 63 74 22 3a 69 66 28 61 29 69 66 28 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 61 29 29 7b 69 66 28 43 28 61 29 29 72 65 74 75 72 6e 7d 65 6c 73
                      Data Ascii: a)},Ia=function(a){switch(typeof a){case "number":return isFinite(a)?a:String(a);case "bigint":return(Aa?a>=Ba&&a<=Ca:a[0]==="-"?ua(a,Da):ua(a,Ea))?Number(a):String(a);case "boolean":return a?1:0;case "object":if(a)if(Array.isArray(a)){if(C(a))return}els
                      2024-10-01 07:00:06 UTC1958INData Raw: 3f 61 2e 74 6f 4a 53 4f 4e 28 29 3a 49 61 28 61 29 7d 2c 53 61 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 76 61 72 20 62 3b 69 66 28 61 26 26 28 62 3d 51 61 29 21 3d 6e 75 6c 6c 26 26 62 2e 68 61 73 28 61 29 26 26 28 62 3d 61 2e 43 29 29 66 6f 72 28 76 61 72 20 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 62 5b 63 5d 3b 69 66 28 63 3d 3d 3d 62 2e 6c 65 6e 67 74 68 2d 31 26 26 41 28 64 29 29 66 6f 72 28 76 61 72 20 65 20 69 6e 20 64 29 7b 76 61 72 20 66 3d 64 5b 65 5d 3b 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 66 29 26 26 0a 52 61 28 66 2c 61 29 7d 65 6c 73 65 20 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 64 29 26 26 52 61 28 64 2c 61 29 7d 61 3d 45 3f 61 2e 43 3a 4d 61 28 61 2e 43 2c 50 61 2c 76 6f 69 64 20 30 2c 76 6f 69 64
                      Data Ascii: ?a.toJSON():Ia(a)},Sa=function(a){var b;if(a&&(b=Qa)!=null&&b.has(a)&&(b=a.C))for(var c=0;c<b.length;c++){var d=b[c];if(c===b.length-1&&A(d))for(var e in d){var f=d[e];Array.isArray(f)&&Ra(f,a)}else Array.isArray(d)&&Ra(d,a)}a=E?a.C:Ma(a.C,Pa,void 0,void
                      2024-10-01 07:00:06 UTC1958INData Raw: 20 62 28 63 2b 28 66 7c 7c 22 22 29 2b 22 5f 22 2b 64 2b 2b 2c 66 29 7d 3b 72 65 74 75 72 6e 20 65 7d 29 3b 0a 47 28 22 53 79 6d 62 6f 6c 2e 69 74 65 72 61 74 6f 72 22 2c 66 75 6e 63 74 69 6f 6e 28 61 29 7b 69 66 28 61 29 72 65 74 75 72 6e 20 61 3b 61 3d 53 79 6d 62 6f 6c 28 22 63 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 22 41 72 72 61 79 20 49 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 43 6c 61 6d 70 65 64 41 72 72 61 79 20 49 6e 74 31 36 41 72 72 61 79 20 55 69 6e 74 31 36 41 72 72 61 79 20 49 6e 74 33 32 41 72 72 61 79 20 55 69 6e 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 36 34 41 72 72 61 79 22 2e 73 70 6c 69 74 28 22 20 22 29 2c 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b
                      Data Ascii: b(c+(f||"")+"_"+d++,f)};return e});G("Symbol.iterator",function(a){if(a)return a;a=Symbol("c");for(var b="Array Int8Array Uint8Array Uint8ClampedArray Int16Array Uint16Array Int32Array Uint32Array Float32Array Float64Array".split(" "),c=0;c<b.length;c++
                      2024-10-01 07:00:06 UTC1958INData Raw: 72 6e 21 31 7d 7d 28 29 29 72 65 74 75 72 6e 20 61 3b 0a 76 61 72 20 66 3d 22 24 6a 73 63 6f 6d 70 5f 68 69 64 64 65 6e 5f 22 2b 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 3b 65 28 22 66 72 65 65 7a 65 22 29 3b 65 28 22 70 72 65 76 65 6e 74 45 78 74 65 6e 73 69 6f 6e 73 22 29 3b 65 28 22 73 65 61 6c 22 29 3b 76 61 72 20 68 3d 30 2c 67 3d 66 75 6e 63 74 69 6f 6e 28 6b 29 7b 74 68 69 73 2e 67 3d 28 68 2b 3d 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2b 31 29 2e 74 6f 53 74 72 69 6e 67 28 29 3b 69 66 28 6b 29 7b 6b 3d 48 28 6b 29 3b 66 6f 72 28 76 61 72 20 6c 3b 21 28 6c 3d 6b 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6c 3d 6c 2e 76 61 6c 75 65 2c 74 68 69 73 2e 73 65 74 28 6c 5b 30 5d 2c 6c 5b 31 5d 29 7d 7d 3b 67 2e 70 72 6f 74 6f 74 79 70 65 2e 73 65 74 3d 66
                      Data Ascii: rn!1}}())return a;var f="$jscomp_hidden_"+Math.random();e("freeze");e("preventExtensions");e("seal");var h=0,g=function(k){this.g=(h+=Math.random()+1).toString();if(k){k=H(k);for(var l;!(l=k.next()).done;)l=l.value,this.set(l[0],l[1])}};g.prototype.set=f
                      2024-10-01 07:00:06 UTC1958INData Raw: 6b 65 79 7d 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 2e 76 61 6c 75 65 73 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 72 65 74 75 72 6e 20 65 28 74 68 69 73 2c 66 75 6e 63 74 69 6f 6e 28 67 29 7b 72 65 74 75 72 6e 20 67 2e 76 61 6c 75 65 7d 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 2e 66 6f 72 45 61 63 68 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 66 6f 72 28 76 61 72 20 6c 3d 74 68 69 73 2e 65 6e 74 72 69 65 73 28 29 2c 6d 3b 21 28 6d 3d 6c 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6d 3d 0a 6d 2e 76 61 6c 75 65 2c 67 2e 63 61 6c 6c 28 6b 2c 6d 5b 31 5d 2c 6d 5b 30 5d 2c 74 68 69 73 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 5b 53 79 6d 62 6f 6c 2e 69 74 65 72 61 74 6f 72 5d 3d 63 2e 70 72 6f 74 6f 74 79 70 65 2e 65 6e 74 72 69 65 73 3b 76 61 72 20 64 3d 66
                      Data Ascii: key})};c.prototype.values=function(){return e(this,function(g){return g.value})};c.prototype.forEach=function(g,k){for(var l=this.entries(),m;!(m=l.next()).done;)m=m.value,g.call(k,m[1],m[0],this)};c.prototype[Symbol.iterator]=c.prototype.entries;var d=f
                      2024-10-01 07:00:06 UTC1958INData Raw: 28 62 29 7b 72 65 74 75 72 6e 20 4e 75 6d 62 65 72 2e 69 73 46 69 6e 69 74 65 28 62 29 3f 62 3d 3d 3d 4d 61 74 68 2e 66 6c 6f 6f 72 28 62 29 3a 21 31 7d 7d 29 3b 47 28 22 4e 75 6d 62 65 72 2e 69 73 4e 61 4e 22 2c 66 75 6e 63 74 69 6f 6e 28 61 29 7b 72 65 74 75 72 6e 20 61 3f 61 3a 66 75 6e 63 74 69 6f 6e 28 62 29 7b 72 65 74 75 72 6e 20 74 79 70 65 6f 66 20 62 3d 3d 3d 22 6e 75 6d 62 65 72 22 26 26 69 73 4e 61 4e 28 62 29 7d 7d 29 3b 76 61 72 20 66 62 3d 66 62 7c 7c 7b 7d 2c 71 3d 74 68 69 73 7c 7c 73 65 6c 66 2c 67 62 3d 71 2e 5f 46 5f 74 6f 67 67 6c 65 73 7c 7c 5b 5d 2c 68 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 61 3d 61 2e 73 70 6c 69 74 28 22 2e 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 71 2c 63 3d 30 3b 63 3c 61 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 69
                      Data Ascii: (b){return Number.isFinite(b)?b===Math.floor(b):!1}});G("Number.isNaN",function(a){return a?a:function(b){return typeof b==="number"&&isNaN(b)}});var fb=fb||{},q=this||self,gb=q._F_toggles||[],hb=function(a){a=a.split(".");for(var b=q,c=0;c<a.length;c++)i
                      2024-10-01 07:00:06 UTC1958INData Raw: 66 2c 61 29 7d 3b 76 61 72 20 78 61 3d 66 75 6e 63 74 69 6f 6e 28 61 2c 62 29 7b 61 2e 5f 5f 63 6c 6f 73 75 72 65 5f 5f 65 72 72 6f 72 5f 5f 63 6f 6e 74 65 78 74 5f 5f 39 38 34 33 38 32 7c 7c 28 61 2e 5f 5f 63 6c 6f 73 75 72 65 5f 5f 65 72 72 6f 72 5f 5f 63 6f 6e 74 65 78 74 5f 5f 39 38 34 33 38 32 3d 7b 7d 29 3b 61 2e 5f 5f 63 6c 6f 73 75 72 65 5f 5f 65 72 72 6f 72 5f 5f 63 6f 6e 74 65 78 74 5f 5f 39 38 34 33 38 32 2e 73 65 76 65 72 69 74 79 3d 62 7d 3b 76 61 72 20 71 62 3d 66 75 6e 63 74 69 6f 6e 28 61 2c 62 2c 63 29 7b 63 3d 63 7c 7c 71 3b 76 61 72 20 64 3d 63 2e 6f 6e 65 72 72 6f 72 2c 65 3d 21 21 62 3b 63 2e 6f 6e 65 72 72 6f 72 3d 66 75 6e 63 74 69 6f 6e 28 66 2c 68 2c 67 2c 6b 2c 6c 29 7b 64 26 26 64 28 66 2c 68 2c 67 2c 6b 2c 6c 29 3b 61 28 7b 6d
                      Data Ascii: f,a)};var xa=function(a,b){a.__closure__error__context__984382||(a.__closure__error__context__984382={});a.__closure__error__context__984382.severity=b};var qb=function(a,b,c){c=c||q;var d=c.onerror,e=!!b;c.onerror=function(f,h,g,k,l){d&&d(f,h,g,k,l);a({m
                      2024-10-01 07:00:06 UTC1958INData Raw: 22 2c 20 22 29 3b 76 61 72 20 66 3d 64 5b 65 5d 3b 73 77 69 74 63 68 28 74 79 70 65 6f 66 20 66 29 7b 63 61 73 65 20 22 6f 62 6a 65 63 74 22 3a 66 3d 66 3f 22 6f 62 6a 65 63 74 22 3a 22 6e 75 6c 6c 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 73 74 72 69 6e 67 22 3a 62 72 65 61 6b 3b 63 61 73 65 20 22 6e 75 6d 62 65 72 22 3a 66 3d 53 74 72 69 6e 67 28 66 29 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 66 3d 66 3f 22 74 72 75 65 22 3a 22 66 61 6c 73 65 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 66 75 6e 63 74 69 6f 6e 22 3a 66 3d 28 66 3d 73 62 28 66 29 29 3f 66 3a 22 5b 66 6e 5d 22 3b 62 72 65 61 6b 3b 64 65 66 61 75 6c 74 3a 66 3d 0a 74 79 70 65 6f 66 20 66 7d 66 2e 6c 65 6e 67 74 68 3e 34 30 26 26 28 66 3d 66 2e 73 6c 69 63 65 28 30 2c
                      Data Ascii: ", ");var f=d[e];switch(typeof f){case "object":f=f?"object":"null";break;case "string":break;case "number":f=String(f);break;case "boolean":f=f?"true":"false";break;case "function":f=(f=sb(f))?f:"[fn]";break;default:f=typeof f}f.length>40&&(f=f.slice(0,


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      5192.168.2.549735142.250.186.1104431560C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 07:00:07 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                      Host: play.google.com
                      Connection: keep-alive
                      Accept: */*
                      Access-Control-Request-Method: POST
                      Access-Control-Request-Headers: x-goog-authuser
                      Origin: https://accounts.google.com
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      Sec-Fetch-Mode: cors
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Dest: empty
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      2024-10-01 07:00:07 UTC520INHTTP/1.1 200 OK
                      Access-Control-Allow-Origin: https://accounts.google.com
                      Access-Control-Allow-Methods: GET, POST, OPTIONS
                      Access-Control-Max-Age: 86400
                      Access-Control-Allow-Credentials: true
                      Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                      Content-Type: text/plain; charset=UTF-8
                      Date: Tue, 01 Oct 2024 07:00:07 GMT
                      Server: Playlog
                      Content-Length: 0
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Connection: close


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      6192.168.2.549736142.250.186.1104431560C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 07:00:07 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                      Host: play.google.com
                      Connection: keep-alive
                      Accept: */*
                      Access-Control-Request-Method: POST
                      Access-Control-Request-Headers: x-goog-authuser
                      Origin: https://accounts.google.com
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      Sec-Fetch-Mode: cors
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Dest: empty
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      2024-10-01 07:00:07 UTC520INHTTP/1.1 200 OK
                      Access-Control-Allow-Origin: https://accounts.google.com
                      Access-Control-Allow-Methods: GET, POST, OPTIONS
                      Access-Control-Max-Age: 86400
                      Access-Control-Allow-Credentials: true
                      Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                      Content-Type: text/plain; charset=UTF-8
                      Date: Tue, 01 Oct 2024 07:00:07 GMT
                      Server: Playlog
                      Content-Length: 0
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Connection: close


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      7192.168.2.549741142.250.186.1104431560C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 07:00:08 UTC1132OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                      Host: play.google.com
                      Connection: keep-alive
                      Content-Length: 519
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      sec-ch-ua-arch: "x86"
                      Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                      sec-ch-ua-full-version: "117.0.5938.132"
                      sec-ch-ua-platform-version: "10.0.0"
                      X-Goog-AuthUser: 0
                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                      sec-ch-ua-bitness: "64"
                      sec-ch-ua-model: ""
                      sec-ch-ua-wow64: ?0
                      sec-ch-ua-platform: "Windows"
                      Accept: */*
                      Origin: https://accounts.google.com
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlKHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Mode: cors
                      Sec-Fetch-Dest: empty
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      2024-10-01 07:00:08 UTC519OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 36 36 30 30 35 37 33 36 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727766005736",null,null,null
                      2024-10-01 07:00:08 UTC933INHTTP/1.1 200 OK
                      Access-Control-Allow-Origin: https://accounts.google.com
                      Cross-Origin-Resource-Policy: cross-origin
                      Access-Control-Allow-Credentials: true
                      Access-Control-Allow-Headers: X-Playlog-Web
                      Set-Cookie: NID=518=emDD-wE7c6-ILxiszgU9P7_CxVRCRG8mZ1ndBaD3cVEUH-CGyGjWvUULJaYXGKkfzgMCflLcEvsHAtXXTXvpjf_5-UKVFro1rRwY8kik71_CGD6NlRW7oTnlU1OJS0G4L9XjfL-VCmzklKqBwiH0bsBYQszQSe_q717zZW-t8WDqpN9SUuY; expires=Wed, 02-Apr-2025 07:00:08 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                      P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                      Content-Type: text/plain; charset=UTF-8
                      Date: Tue, 01 Oct 2024 07:00:08 GMT
                      Server: Playlog
                      Cache-Control: private
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Accept-Ranges: none
                      Vary: Accept-Encoding
                      Expires: Tue, 01 Oct 2024 07:00:08 GMT
                      Connection: close
                      Transfer-Encoding: chunked
                      2024-10-01 07:00:08 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                      2024-10-01 07:00:08 UTC5INData Raw: 30 0d 0a 0d 0a
                      Data Ascii: 0


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      8192.168.2.549740142.250.186.1104431560C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 07:00:08 UTC1132OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                      Host: play.google.com
                      Connection: keep-alive
                      Content-Length: 519
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      sec-ch-ua-arch: "x86"
                      Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                      sec-ch-ua-full-version: "117.0.5938.132"
                      sec-ch-ua-platform-version: "10.0.0"
                      X-Goog-AuthUser: 0
                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                      sec-ch-ua-bitness: "64"
                      sec-ch-ua-model: ""
                      sec-ch-ua-wow64: ?0
                      sec-ch-ua-platform: "Windows"
                      Accept: */*
                      Origin: https://accounts.google.com
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlKHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Mode: cors
                      Sec-Fetch-Dest: empty
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      2024-10-01 07:00:08 UTC519OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 36 36 30 30 35 38 30 34 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727766005804",null,null,null
                      2024-10-01 07:00:08 UTC933INHTTP/1.1 200 OK
                      Access-Control-Allow-Origin: https://accounts.google.com
                      Cross-Origin-Resource-Policy: cross-origin
                      Access-Control-Allow-Credentials: true
                      Access-Control-Allow-Headers: X-Playlog-Web
                      Set-Cookie: NID=518=IdT-Qcmn7n5AOYo3UUgUPDOTcED57Yh4bNnRoWBBa3mvlmw6bPNd_uqFCH28ZWab_x83IbSIZRKK5TeGNrvRx5LQfZe6NGxExkt4eYunJrMdvakBVo-5s5kVe-gL2ei-QL8EDDj62Jkmov4gh_poOhblMjkzktrQQmiNbiiPwwOxrYtZvFQ; expires=Wed, 02-Apr-2025 07:00:08 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                      P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                      Content-Type: text/plain; charset=UTF-8
                      Date: Tue, 01 Oct 2024 07:00:08 GMT
                      Server: Playlog
                      Cache-Control: private
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Accept-Ranges: none
                      Vary: Accept-Encoding
                      Expires: Tue, 01 Oct 2024 07:00:08 GMT
                      Connection: close
                      Transfer-Encoding: chunked
                      2024-10-01 07:00:08 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                      2024-10-01 07:00:08 UTC5INData Raw: 30 0d 0a 0d 0a
                      Data Ascii: 0


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      9192.168.2.549715142.250.185.1004431560C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 07:00:09 UTC1222OUTGET /favicon.ico HTTP/1.1
                      Host: www.google.com
                      Connection: keep-alive
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      sec-ch-ua-arch: "x86"
                      sec-ch-ua-full-version: "117.0.5938.132"
                      sec-ch-ua-platform-version: "10.0.0"
                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                      sec-ch-ua-bitness: "64"
                      sec-ch-ua-model: ""
                      sec-ch-ua-wow64: ?0
                      sec-ch-ua-platform: "Windows"
                      Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlKHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Mode: no-cors
                      Sec-Fetch-Dest: image
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      Cookie: NID=518=IdT-Qcmn7n5AOYo3UUgUPDOTcED57Yh4bNnRoWBBa3mvlmw6bPNd_uqFCH28ZWab_x83IbSIZRKK5TeGNrvRx5LQfZe6NGxExkt4eYunJrMdvakBVo-5s5kVe-gL2ei-QL8EDDj62Jkmov4gh_poOhblMjkzktrQQmiNbiiPwwOxrYtZvFQ
                      2024-10-01 07:00:09 UTC705INHTTP/1.1 200 OK
                      Accept-Ranges: bytes
                      Cross-Origin-Resource-Policy: cross-origin
                      Cross-Origin-Opener-Policy-Report-Only: same-origin; report-to="static-on-bigtable"
                      Report-To: {"group":"static-on-bigtable","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/static-on-bigtable"}]}
                      Content-Length: 5430
                      X-Content-Type-Options: nosniff
                      Server: sffe
                      X-XSS-Protection: 0
                      Date: Tue, 01 Oct 2024 04:26:33 GMT
                      Expires: Wed, 09 Oct 2024 04:26:33 GMT
                      Cache-Control: public, max-age=691200
                      Last-Modified: Tue, 22 Oct 2019 18:30:00 GMT
                      Content-Type: image/x-icon
                      Vary: Accept-Encoding
                      Age: 9216
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Connection: close
                      2024-10-01 07:00:09 UTC685INData Raw: 00 00 01 00 02 00 10 10 00 00 01 00 20 00 68 04 00 00 26 00 00 00 20 20 00 00 01 00 20 00 a8 10 00 00 8e 04 00 00 28 00 00 00 10 00 00 00 20 00 00 00 01 00 20 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 30 fd fd fd 96 fd fd fd d8 fd fd fd f9 fd fd fd f9 fd fd fd d7 fd fd fd 94 fe fe fe 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd 99 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 95 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd c1 ff ff ff ff fa fd f9 ff b4 d9 a7 ff 76 ba 5d ff 58 ab 3a ff 58 aa 3a ff 72 b8 59 ff ac d5 9d ff f8 fb f6 ff ff
                      Data Ascii: h& ( 0.v]X:X:rY
                      2024-10-01 07:00:09 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d8 fd fd fd 99 ff ff ff ff 92 cf fb ff 37 52 ec ff 38 46 ea ff d0 d4 fa ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 96 fe fe fe 32 ff ff ff ff f9 f9 fe ff 56 62 ed ff 35 43 ea ff 3b 49 eb ff 95 9c f4 ff cf d2 fa ff d1 d4 fa ff 96 9d f4 ff 52 5e ed ff e1 e3 fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 30 00 00 00 00 fd fd fd 9d ff ff ff ff e8 ea fd ff 58 63 ee ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 6c 76 f0 ff ff ff ff ff ff ff ff ff fd fd fd 98 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd c3 ff ff ff ff f9 f9 fe ff a5 ac f6 ff 5d 69 ee ff 3c 4a
                      Data Ascii: 7R8F2Vb5C;IR^0Xc5C5C5C5C5C5Clv]i<J
                      2024-10-01 07:00:09 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff fd fd fd d0 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fd fd fd 8b ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff b1 d8 a3 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 60 a5 35 ff ca 8e 3e ff f9 c1 9f ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 87 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 25 fd fd fd fb ff ff ff ff ff ff ff ff ff ff ff ff c2 e0 b7 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 6e b6 54 ff 9f ce 8d ff b7 da aa ff b8 db ab ff a5 d2 95 ff 7b bc 64 ff 54 a8 35 ff 53 a8 34 ff 77 a0 37 ff e3 89 41 ff f4 85 42 ff f4 85 42 ff
                      Data Ascii: S4S4S4S4S4S4S4S4S4S4S4S4S4S4`5>%S4S4S4S4S4S4nT{dT5S4w7ABB
                      2024-10-01 07:00:09 UTC1390INData Raw: ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff fb d5 bf ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd ea fd fd fd cb ff ff ff ff ff ff ff ff ff ff ff ff 46 cd fc ff 05 bc fb ff 05 bc fb ff 05 bc fb ff 21 ae f9 ff fb fb ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd c8 fd fd fd 9c ff ff ff ff ff ff ff ff ff ff ff ff 86 df fd ff 05 bc fb ff 05 bc fb ff 15 93 f5 ff 34 49 eb ff b3 b8 f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                      Data Ascii: BBBBBBF!4I
                      2024-10-01 07:00:09 UTC575INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d2 fe fe fe 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd 8d fd fd fd fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd fb fd fd fd 8b fe fe fe 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 27 fd fd fd 9f fd fd fd f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                      Data Ascii: $'


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      10192.168.2.54974720.114.59.183443
                      TimestampBytes transferredDirectionData
                      2024-10-01 07:00:13 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=vMVG9GWPLDo4GCK&MD=z5Ml3TX9 HTTP/1.1
                      Connection: Keep-Alive
                      Accept: */*
                      User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                      Host: slscr.update.microsoft.com
                      2024-10-01 07:00:14 UTC560INHTTP/1.1 200 OK
                      Cache-Control: no-cache
                      Pragma: no-cache
                      Content-Type: application/octet-stream
                      Expires: -1
                      Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                      ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                      MS-CorrelationId: f3033310-29dc-4e67-99b0-23535bdeb425
                      MS-RequestId: fc97c744-cb23-4bd0-907c-68bdfe161a7b
                      MS-CV: QvJ9c5bVfkKeub8D.0
                      X-Microsoft-SLSClientCache: 2880
                      Content-Disposition: attachment; filename=environment.cab
                      X-Content-Type-Options: nosniff
                      Date: Tue, 01 Oct 2024 07:00:13 GMT
                      Connection: close
                      Content-Length: 24490
                      2024-10-01 07:00:14 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                      Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                      2024-10-01 07:00:14 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                      Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      11192.168.2.549755142.250.186.1104431560C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 07:00:15 UTC1307OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                      Host: play.google.com
                      Connection: keep-alive
                      Content-Length: 1218
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      sec-ch-ua-arch: "x86"
                      Content-Type: text/plain;charset=UTF-8
                      sec-ch-ua-full-version: "117.0.5938.132"
                      sec-ch-ua-platform-version: "10.0.0"
                      X-Goog-AuthUser: 0
                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                      sec-ch-ua-bitness: "64"
                      sec-ch-ua-model: ""
                      sec-ch-ua-wow64: ?0
                      sec-ch-ua-platform: "Windows"
                      Accept: */*
                      Origin: https://accounts.google.com
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlKHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Mode: cors
                      Sec-Fetch-Dest: empty
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      Cookie: NID=518=IdT-Qcmn7n5AOYo3UUgUPDOTcED57Yh4bNnRoWBBa3mvlmw6bPNd_uqFCH28ZWab_x83IbSIZRKK5TeGNrvRx5LQfZe6NGxExkt4eYunJrMdvakBVo-5s5kVe-gL2ei-QL8EDDj62Jkmov4gh_poOhblMjkzktrQQmiNbiiPwwOxrYtZvFQ
                      2024-10-01 07:00:15 UTC1218OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 34 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 35 35 38 2c 5b 5b 22 31 37 32 37 37 36 36 30 30 33 30 30 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c
                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,null,null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[4,0,0,0,0]]],558,[["1727766003000",null,null,null,
                      2024-10-01 07:00:15 UTC941INHTTP/1.1 200 OK
                      Access-Control-Allow-Origin: https://accounts.google.com
                      Cross-Origin-Resource-Policy: cross-origin
                      Access-Control-Allow-Credentials: true
                      Access-Control-Allow-Headers: X-Playlog-Web
                      Set-Cookie: NID=518=Yo6rtBTGP1NJZmkv8pCi1MxVRFkxyY_s5W5UIR4kqGbNTG8HIPT9gzaBbricaH69AC3kaA9t78n83pjgPzjQgSm8jSYrT3lRpvSPQ2GHiwYORe6cpK7JFhyh7ffZGrWy2JxaOFkMXe4SbE41Fyfj67YNawA67XtnnzigElT0t6Vk6If7OekLg9FBBBo; expires=Wed, 02-Apr-2025 07:00:15 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                      P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                      Content-Type: text/plain; charset=UTF-8
                      Date: Tue, 01 Oct 2024 07:00:15 GMT
                      Server: Playlog
                      Cache-Control: private
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Accept-Ranges: none
                      Vary: Accept-Encoding
                      Expires: Tue, 01 Oct 2024 07:00:15 GMT
                      Connection: close
                      Transfer-Encoding: chunked
                      2024-10-01 07:00:15 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                      2024-10-01 07:00:15 UTC5INData Raw: 30 0d 0a 0d 0a
                      Data Ascii: 0


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      12192.168.2.549757142.250.186.1104431560C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 07:00:37 UTC1338OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                      Host: play.google.com
                      Connection: keep-alive
                      Content-Length: 1361
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      sec-ch-ua-arch: "x86"
                      Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                      sec-ch-ua-full-version: "117.0.5938.132"
                      sec-ch-ua-platform-version: "10.0.0"
                      X-Goog-AuthUser: 0
                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                      sec-ch-ua-bitness: "64"
                      sec-ch-ua-model: ""
                      sec-ch-ua-wow64: ?0
                      sec-ch-ua-platform: "Windows"
                      Accept: */*
                      Origin: https://accounts.google.com
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlKHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Mode: cors
                      Sec-Fetch-Dest: empty
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      Cookie: NID=518=Yo6rtBTGP1NJZmkv8pCi1MxVRFkxyY_s5W5UIR4kqGbNTG8HIPT9gzaBbricaH69AC3kaA9t78n83pjgPzjQgSm8jSYrT3lRpvSPQ2GHiwYORe6cpK7JFhyh7ffZGrWy2JxaOFkMXe4SbE41Fyfj67YNawA67XtnnzigElT0t6Vk6If7OekLg9FBBBo
                      2024-10-01 07:00:37 UTC1361OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 36 36 30 33 36 31 30 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727766036100",null,null,null
                      2024-10-01 07:00:38 UTC523INHTTP/1.1 200 OK
                      Access-Control-Allow-Origin: https://accounts.google.com
                      Cross-Origin-Resource-Policy: cross-origin
                      Access-Control-Allow-Credentials: true
                      Access-Control-Allow-Headers: X-Playlog-Web
                      Content-Type: text/plain; charset=UTF-8
                      Date: Tue, 01 Oct 2024 07:00:38 GMT
                      Server: Playlog
                      Cache-Control: private
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Accept-Ranges: none
                      Vary: Accept-Encoding
                      Connection: close
                      Transfer-Encoding: chunked
                      2024-10-01 07:00:38 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                      2024-10-01 07:00:38 UTC5INData Raw: 30 0d 0a 0d 0a
                      Data Ascii: 0


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      13192.168.2.549758142.250.186.1104431560C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 07:00:37 UTC1338OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                      Host: play.google.com
                      Connection: keep-alive
                      Content-Length: 1227
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      sec-ch-ua-arch: "x86"
                      Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                      sec-ch-ua-full-version: "117.0.5938.132"
                      sec-ch-ua-platform-version: "10.0.0"
                      X-Goog-AuthUser: 0
                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                      sec-ch-ua-bitness: "64"
                      sec-ch-ua-model: ""
                      sec-ch-ua-wow64: ?0
                      sec-ch-ua-platform: "Windows"
                      Accept: */*
                      Origin: https://accounts.google.com
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlKHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Mode: cors
                      Sec-Fetch-Dest: empty
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      Cookie: NID=518=Yo6rtBTGP1NJZmkv8pCi1MxVRFkxyY_s5W5UIR4kqGbNTG8HIPT9gzaBbricaH69AC3kaA9t78n83pjgPzjQgSm8jSYrT3lRpvSPQ2GHiwYORe6cpK7JFhyh7ffZGrWy2JxaOFkMXe4SbE41Fyfj67YNawA67XtnnzigElT0t6Vk6If7OekLg9FBBBo
                      2024-10-01 07:00:37 UTC1227OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 36 36 30 33 36 33 38 31 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727766036381",null,null,null
                      2024-10-01 07:00:38 UTC523INHTTP/1.1 200 OK
                      Access-Control-Allow-Origin: https://accounts.google.com
                      Cross-Origin-Resource-Policy: cross-origin
                      Access-Control-Allow-Credentials: true
                      Access-Control-Allow-Headers: X-Playlog-Web
                      Content-Type: text/plain; charset=UTF-8
                      Date: Tue, 01 Oct 2024 07:00:38 GMT
                      Server: Playlog
                      Cache-Control: private
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Accept-Ranges: none
                      Vary: Accept-Encoding
                      Connection: close
                      Transfer-Encoding: chunked
                      2024-10-01 07:00:38 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                      2024-10-01 07:00:38 UTC5INData Raw: 30 0d 0a 0d 0a
                      Data Ascii: 0


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      14192.168.2.549759142.250.186.1104431560C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 07:00:38 UTC1298OUTPOST /log?hasfast=true&authuser=0&format=json HTTP/1.1
                      Host: play.google.com
                      Connection: keep-alive
                      Content-Length: 1036
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      sec-ch-ua-arch: "x86"
                      sec-ch-ua-full-version: "117.0.5938.132"
                      Content-Type: text/plain;charset=UTF-8
                      sec-ch-ua-platform-version: "10.0.0"
                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                      sec-ch-ua-bitness: "64"
                      sec-ch-ua-model: ""
                      sec-ch-ua-wow64: ?0
                      sec-ch-ua-platform: "Windows"
                      Accept: */*
                      Origin: https://accounts.google.com
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlKHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Mode: no-cors
                      Sec-Fetch-Dest: empty
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      Cookie: NID=518=Yo6rtBTGP1NJZmkv8pCi1MxVRFkxyY_s5W5UIR4kqGbNTG8HIPT9gzaBbricaH69AC3kaA9t78n83pjgPzjQgSm8jSYrT3lRpvSPQ2GHiwYORe6cpK7JFhyh7ffZGrWy2JxaOFkMXe4SbE41Fyfj67YNawA67XtnnzigElT0t6Vk6If7OekLg9FBBBo
                      2024-10-01 07:00:38 UTC1036OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 62 6f 71 5f 69 64 65 6e 74 69 74 79 66 72 6f 6e 74 65 6e 64 61 75 74 68 75 69 73 65 72 76 65 72 5f 32 30 32 34 30 39 32 34 2e 30 32 5f 70 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 33 2c 30 2c 30
                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"boq_identityfrontendauthuiserver_20240924.02_p0",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[3,0,0
                      2024-10-01 07:00:38 UTC523INHTTP/1.1 200 OK
                      Access-Control-Allow-Origin: https://accounts.google.com
                      Cross-Origin-Resource-Policy: cross-origin
                      Access-Control-Allow-Credentials: true
                      Access-Control-Allow-Headers: X-Playlog-Web
                      Content-Type: text/plain; charset=UTF-8
                      Date: Tue, 01 Oct 2024 07:00:38 GMT
                      Server: Playlog
                      Cache-Control: private
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Accept-Ranges: none
                      Vary: Accept-Encoding
                      Connection: close
                      Transfer-Encoding: chunked
                      2024-10-01 07:00:38 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                      2024-10-01 07:00:38 UTC5INData Raw: 30 0d 0a 0d 0a
                      Data Ascii: 0


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      15192.168.2.54976020.114.59.183443
                      TimestampBytes transferredDirectionData
                      2024-10-01 07:00:52 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=vMVG9GWPLDo4GCK&MD=z5Ml3TX9 HTTP/1.1
                      Connection: Keep-Alive
                      Accept: */*
                      User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                      Host: slscr.update.microsoft.com
                      2024-10-01 07:00:52 UTC560INHTTP/1.1 200 OK
                      Cache-Control: no-cache
                      Pragma: no-cache
                      Content-Type: application/octet-stream
                      Expires: -1
                      Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                      ETag: "vic+p1MiJJ+/WMnK08jaWnCBGDfvkGRzPk9f8ZadQHg=_1440"
                      MS-CorrelationId: 9ae64181-0668-420f-b6cf-fcbf84a236ae
                      MS-RequestId: 1d24c82c-4376-4cf5-9337-3a0add6384f6
                      MS-CV: C2EW1lv3D0ikhQWF.0
                      X-Microsoft-SLSClientCache: 1440
                      Content-Disposition: attachment; filename=environment.cab
                      X-Content-Type-Options: nosniff
                      Date: Tue, 01 Oct 2024 07:00:51 GMT
                      Connection: close
                      Content-Length: 30005
                      2024-10-01 07:00:52 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 8d 2b 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 5b 49 00 00 14 00 00 00 00 00 10 00 8d 2b 00 00 a8 49 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 72 4d 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 fe f6 51 be 21 2b 72 4d 43 4b ed 7c 05 58 54 eb da f6 14 43 49 37 0a 02 d2 b9 86 0e 41 52 a4 1b 24 a5 bb 43 24 44 18 94 90 92 52 41 3a 05 09 95 ee 54 b0 00 91 2e e9 12 10 04 11 c9 6f 10 b7 a2 67 9f bd cf 3e ff b7 ff b3 bf 73 ed e1 9a 99 f5 c6 7a d7 bb de f5 3e cf fd 3c f7 dc 17 4a 1a 52 e7 41 a8 97 1e 14 f4 e5 25 7d f4 05 82 82 c1 20 30 08 06 ba c3 05 02 11 7f a9 c1 ff d2 87 5c 1e f4 ed 65 8e 7a 1f f6 0a 40 03 1d 7b f9 83 2c 1c 2f db b8 3a 39 3a 58 38 ba 73 5e
                      Data Ascii: MSCF+D[I+IdrMenvironment.cabQ!+rMCK|XTCI7AR$C$DRA:T.og>sz><JRA%} 0\ez@{,/:9:X8s^
                      2024-10-01 07:00:52 UTC14181INData Raw: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 26 30 24 06 03 55 04 03 13 1d 4d 69 63 72 6f 73 6f 66 74 20 54 69 6d 65 2d 53 74 61 6d 70 20 50 43 41 20 32 30 31 30 30 1e 17 0d 32 33 31 30 31 32 31 39 30 37 32 35 5a 17 0d 32 35 30 31 31 30 31 39 30 37 32 35 5a 30 81 d2 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 2d 30 2b 06 03 55 04 0b 13 24 4d 69 63 72 6f
                      Data Ascii: UUS10UWashington10URedmond10UMicrosoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100231012190725Z250110190725Z010UUS10UWashington10URedmond10UMicrosoft Corporation1-0+U$Micro


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      16192.168.2.549764172.217.16.1424431560C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 07:01:08 UTC1338OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                      Host: play.google.com
                      Connection: keep-alive
                      Content-Length: 1243
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      sec-ch-ua-arch: "x86"
                      Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                      sec-ch-ua-full-version: "117.0.5938.132"
                      sec-ch-ua-platform-version: "10.0.0"
                      X-Goog-AuthUser: 0
                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                      sec-ch-ua-bitness: "64"
                      sec-ch-ua-model: ""
                      sec-ch-ua-wow64: ?0
                      sec-ch-ua-platform: "Windows"
                      Accept: */*
                      Origin: https://accounts.google.com
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlKHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Mode: cors
                      Sec-Fetch-Dest: empty
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      Cookie: NID=518=Yo6rtBTGP1NJZmkv8pCi1MxVRFkxyY_s5W5UIR4kqGbNTG8HIPT9gzaBbricaH69AC3kaA9t78n83pjgPzjQgSm8jSYrT3lRpvSPQ2GHiwYORe6cpK7JFhyh7ffZGrWy2JxaOFkMXe4SbE41Fyfj67YNawA67XtnnzigElT0t6Vk6If7OekLg9FBBBo
                      2024-10-01 07:01:08 UTC1243OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 36 36 30 36 36 39 36 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727766066960",null,null,null
                      2024-10-01 07:01:08 UTC523INHTTP/1.1 200 OK
                      Access-Control-Allow-Origin: https://accounts.google.com
                      Cross-Origin-Resource-Policy: cross-origin
                      Access-Control-Allow-Credentials: true
                      Access-Control-Allow-Headers: X-Playlog-Web
                      Content-Type: text/plain; charset=UTF-8
                      Date: Tue, 01 Oct 2024 07:01:08 GMT
                      Server: Playlog
                      Cache-Control: private
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Accept-Ranges: none
                      Vary: Accept-Encoding
                      Connection: close
                      Transfer-Encoding: chunked
                      2024-10-01 07:01:08 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                      2024-10-01 07:01:08 UTC5INData Raw: 30 0d 0a 0d 0a
                      Data Ascii: 0


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      17192.168.2.549765172.217.16.1424431560C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 07:01:09 UTC1338OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                      Host: play.google.com
                      Connection: keep-alive
                      Content-Length: 1056
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      sec-ch-ua-arch: "x86"
                      Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                      sec-ch-ua-full-version: "117.0.5938.132"
                      sec-ch-ua-platform-version: "10.0.0"
                      X-Goog-AuthUser: 0
                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                      sec-ch-ua-bitness: "64"
                      sec-ch-ua-model: ""
                      sec-ch-ua-wow64: ?0
                      sec-ch-ua-platform: "Windows"
                      Accept: */*
                      Origin: https://accounts.google.com
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlKHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Mode: cors
                      Sec-Fetch-Dest: empty
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      Cookie: NID=518=Yo6rtBTGP1NJZmkv8pCi1MxVRFkxyY_s5W5UIR4kqGbNTG8HIPT9gzaBbricaH69AC3kaA9t78n83pjgPzjQgSm8jSYrT3lRpvSPQ2GHiwYORe6cpK7JFhyh7ffZGrWy2JxaOFkMXe4SbE41Fyfj67YNawA67XtnnzigElT0t6Vk6If7OekLg9FBBBo
                      2024-10-01 07:01:09 UTC1056OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 36 36 30 36 37 36 34 36 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727766067646",null,null,null
                      2024-10-01 07:01:09 UTC523INHTTP/1.1 200 OK
                      Access-Control-Allow-Origin: https://accounts.google.com
                      Cross-Origin-Resource-Policy: cross-origin
                      Access-Control-Allow-Credentials: true
                      Access-Control-Allow-Headers: X-Playlog-Web
                      Content-Type: text/plain; charset=UTF-8
                      Date: Tue, 01 Oct 2024 07:01:09 GMT
                      Server: Playlog
                      Cache-Control: private
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Accept-Ranges: none
                      Vary: Accept-Encoding
                      Connection: close
                      Transfer-Encoding: chunked
                      2024-10-01 07:01:09 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                      2024-10-01 07:01:09 UTC5INData Raw: 30 0d 0a 0d 0a
                      Data Ascii: 0


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      18192.168.2.549768172.217.16.1424431560C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 07:01:38 UTC1338OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                      Host: play.google.com
                      Connection: keep-alive
                      Content-Length: 1503
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      sec-ch-ua-arch: "x86"
                      Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                      sec-ch-ua-full-version: "117.0.5938.132"
                      sec-ch-ua-platform-version: "10.0.0"
                      X-Goog-AuthUser: 0
                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                      sec-ch-ua-bitness: "64"
                      sec-ch-ua-model: ""
                      sec-ch-ua-wow64: ?0
                      sec-ch-ua-platform: "Windows"
                      Accept: */*
                      Origin: https://accounts.google.com
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlKHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Mode: cors
                      Sec-Fetch-Dest: empty
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      Cookie: NID=518=Yo6rtBTGP1NJZmkv8pCi1MxVRFkxyY_s5W5UIR4kqGbNTG8HIPT9gzaBbricaH69AC3kaA9t78n83pjgPzjQgSm8jSYrT3lRpvSPQ2GHiwYORe6cpK7JFhyh7ffZGrWy2JxaOFkMXe4SbE41Fyfj67YNawA67XtnnzigElT0t6Vk6If7OekLg9FBBBo
                      2024-10-01 07:01:38 UTC1503OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 36 36 30 39 37 31 36 33 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727766097163",null,null,null
                      2024-10-01 07:01:39 UTC523INHTTP/1.1 200 OK
                      Access-Control-Allow-Origin: https://accounts.google.com
                      Cross-Origin-Resource-Policy: cross-origin
                      Access-Control-Allow-Credentials: true
                      Access-Control-Allow-Headers: X-Playlog-Web
                      Content-Type: text/plain; charset=UTF-8
                      Date: Tue, 01 Oct 2024 07:01:38 GMT
                      Server: Playlog
                      Cache-Control: private
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Accept-Ranges: none
                      Vary: Accept-Encoding
                      Connection: close
                      Transfer-Encoding: chunked
                      2024-10-01 07:01:39 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                      2024-10-01 07:01:39 UTC5INData Raw: 30 0d 0a 0d 0a
                      Data Ascii: 0


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      19192.168.2.549769172.217.16.1424431560C:\Program Files\Google\Chrome\Application\chrome.exe
                      TimestampBytes transferredDirectionData
                      2024-10-01 07:01:39 UTC1338OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                      Host: play.google.com
                      Connection: keep-alive
                      Content-Length: 1213
                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                      sec-ch-ua-arch: "x86"
                      Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                      sec-ch-ua-full-version: "117.0.5938.132"
                      sec-ch-ua-platform-version: "10.0.0"
                      X-Goog-AuthUser: 0
                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                      sec-ch-ua-bitness: "64"
                      sec-ch-ua-model: ""
                      sec-ch-ua-wow64: ?0
                      sec-ch-ua-platform: "Windows"
                      Accept: */*
                      Origin: https://accounts.google.com
                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlKHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Mode: cors
                      Sec-Fetch-Dest: empty
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-US,en;q=0.9
                      Cookie: NID=518=Yo6rtBTGP1NJZmkv8pCi1MxVRFkxyY_s5W5UIR4kqGbNTG8HIPT9gzaBbricaH69AC3kaA9t78n83pjgPzjQgSm8jSYrT3lRpvSPQ2GHiwYORe6cpK7JFhyh7ffZGrWy2JxaOFkMXe4SbE41Fyfj67YNawA67XtnnzigElT0t6Vk6If7OekLg9FBBBo
                      2024-10-01 07:01:39 UTC1213OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 36 36 30 39 38 31 39 34 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727766098194",null,null,null
                      2024-10-01 07:01:40 UTC523INHTTP/1.1 200 OK
                      Access-Control-Allow-Origin: https://accounts.google.com
                      Cross-Origin-Resource-Policy: cross-origin
                      Access-Control-Allow-Credentials: true
                      Access-Control-Allow-Headers: X-Playlog-Web
                      Content-Type: text/plain; charset=UTF-8
                      Date: Tue, 01 Oct 2024 07:01:40 GMT
                      Server: Playlog
                      Cache-Control: private
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Accept-Ranges: none
                      Vary: Accept-Encoding
                      Connection: close
                      Transfer-Encoding: chunked
                      2024-10-01 07:01:40 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                      2024-10-01 07:01:40 UTC5INData Raw: 30 0d 0a 0d 0a
                      Data Ascii: 0


                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:02:59:53
                      Start date:01/10/2024
                      Path:C:\Users\user\Desktop\file.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\file.exe"
                      Imagebase:0xea0000
                      File size:917'504 bytes
                      MD5 hash:AE543423EDFE9428F33208D64AE7C680
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Target ID:1
                      Start time:02:59:53
                      Start date:01/10/2024
                      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecovery
                      Imagebase:0x7ff715980000
                      File size:3'242'272 bytes
                      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:4
                      Start time:02:59:54
                      Start date:01/10/2024
                      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1980,i,8398794096650981881,14612666716366114694,262144 --disable-features=CrashRecovery /prefetch:8
                      Imagebase:0x7ff715980000
                      File size:3'242'272 bytes
                      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:5
                      Start time:03:00:05
                      Start date:01/10/2024
                      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5660 --field-trial-handle=1980,i,8398794096650981881,14612666716366114694,262144 --disable-features=CrashRecovery /prefetch:8
                      Imagebase:0x7ff715980000
                      File size:3'242'272 bytes
                      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:6
                      Start time:03:00:05
                      Start date:01/10/2024
                      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 --field-trial-handle=1980,i,8398794096650981881,14612666716366114694,262144 --disable-features=CrashRecovery /prefetch:8
                      Imagebase:0x7ff715980000
                      File size:3'242'272 bytes
                      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:1.9%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:4.6%
                        Total number of Nodes:1458
                        Total number of Limit Nodes:41
                        execution_graph 94564 ea1cad SystemParametersInfoW 94565 ea2de3 94566 ea2df0 __wsopen_s 94565->94566 94567 ea2e09 94566->94567 94568 ee2c2b ___scrt_fastfail 94566->94568 94581 ea3aa2 94567->94581 94570 ee2c47 GetOpenFileNameW 94568->94570 94572 ee2c96 94570->94572 94639 ea6b57 94572->94639 94576 ee2cab 94576->94576 94578 ea2e27 94609 ea44a8 94578->94609 94651 ee1f50 94581->94651 94584 ea3ae9 94657 eaa6c3 94584->94657 94585 ea3ace 94587 ea6b57 22 API calls 94585->94587 94588 ea3ada 94587->94588 94653 ea37a0 94588->94653 94591 ea2da5 94592 ee1f50 __wsopen_s 94591->94592 94593 ea2db2 GetLongPathNameW 94592->94593 94594 ea6b57 22 API calls 94593->94594 94595 ea2dda 94594->94595 94596 ea3598 94595->94596 94708 eaa961 94596->94708 94599 ea3aa2 23 API calls 94600 ea35b5 94599->94600 94601 ee32eb 94600->94601 94602 ea35c0 94600->94602 94607 ee330d 94601->94607 94725 ebce60 41 API calls 94601->94725 94713 ea515f 94602->94713 94608 ea35df 94608->94578 94726 ea4ecb 94609->94726 94612 ee3833 94748 f12cf9 94612->94748 94613 ea4ecb 94 API calls 94616 ea44e1 94613->94616 94615 ee3848 94617 ee384c 94615->94617 94618 ee3869 94615->94618 94616->94612 94619 ea44e9 94616->94619 94775 ea4f39 94617->94775 94621 ebfe0b 22 API calls 94618->94621 94622 ee3854 94619->94622 94623 ea44f5 94619->94623 94630 ee38ae 94621->94630 94781 f0da5a 82 API calls 94622->94781 94774 ea940c 136 API calls 2 library calls 94623->94774 94626 ee3862 94626->94618 94627 ea2e31 94628 ee3a5f 94632 ee3a67 94628->94632 94629 ea4f39 68 API calls 94629->94632 94630->94628 94630->94632 94636 ea9cb3 22 API calls 94630->94636 94782 f0967e 22 API calls __fread_nolock 94630->94782 94783 f095ad 42 API calls _wcslen 94630->94783 94784 f10b5a 22 API calls 94630->94784 94785 eaa4a1 22 API calls __fread_nolock 94630->94785 94786 ea3ff7 22 API calls 94630->94786 94632->94629 94787 f0989b 82 API calls __wsopen_s 94632->94787 94636->94630 94640 ea6b67 _wcslen 94639->94640 94641 ee4ba1 94639->94641 94644 ea6b7d 94640->94644 94645 ea6ba2 94640->94645 94642 ea93b2 22 API calls 94641->94642 94643 ee4baa 94642->94643 94643->94643 95071 ea6f34 22 API calls 94644->95071 94646 ebfddb 22 API calls 94645->94646 94648 ea6bae 94646->94648 94650 ebfe0b 22 API calls 94648->94650 94649 ea6b85 __fread_nolock 94649->94576 94650->94649 94652 ea3aaf GetFullPathNameW 94651->94652 94652->94584 94652->94585 94654 ea37ae 94653->94654 94663 ea93b2 94654->94663 94656 ea2e12 94656->94591 94658 eaa6dd 94657->94658 94659 eaa6d0 94657->94659 94660 ebfddb 22 API calls 94658->94660 94659->94588 94661 eaa6e7 94660->94661 94662 ebfe0b 22 API calls 94661->94662 94662->94659 94664 ea93c9 __fread_nolock 94663->94664 94665 ea93c0 94663->94665 94664->94656 94665->94664 94667 eaaec9 94665->94667 94668 eaaedc 94667->94668 94672 eaaed9 __fread_nolock 94667->94672 94673 ebfddb 94668->94673 94670 eaaee7 94683 ebfe0b 94670->94683 94672->94664 94676 ebfde0 94673->94676 94675 ebfdfa 94675->94670 94676->94675 94679 ebfdfc 94676->94679 94693 ecea0c 94676->94693 94700 ec4ead 7 API calls 2 library calls 94676->94700 94678 ec066d 94702 ec32a4 RaiseException 94678->94702 94679->94678 94701 ec32a4 RaiseException 94679->94701 94682 ec068a 94682->94670 94685 ebfddb 94683->94685 94684 ecea0c ___std_exception_copy 21 API calls 94684->94685 94685->94684 94686 ebfdfa 94685->94686 94689 ebfdfc 94685->94689 94705 ec4ead 7 API calls 2 library calls 94685->94705 94686->94672 94688 ec066d 94707 ec32a4 RaiseException 94688->94707 94689->94688 94706 ec32a4 RaiseException 94689->94706 94691 ec068a 94691->94672 94698 ed3820 __dosmaperr 94693->94698 94694 ed385e 94704 ecf2d9 20 API calls __dosmaperr 94694->94704 94696 ed3849 RtlAllocateHeap 94697 ed385c 94696->94697 94696->94698 94697->94676 94698->94694 94698->94696 94703 ec4ead 7 API calls 2 library calls 94698->94703 94700->94676 94701->94678 94702->94682 94703->94698 94704->94697 94705->94685 94706->94688 94707->94691 94709 ebfe0b 22 API calls 94708->94709 94710 eaa976 94709->94710 94711 ebfddb 22 API calls 94710->94711 94712 ea35aa 94711->94712 94712->94599 94715 ea516e 94713->94715 94718 ea518f __fread_nolock 94713->94718 94714 ebfddb 22 API calls 94716 ea35cc 94714->94716 94717 ebfe0b 22 API calls 94715->94717 94719 ea35f3 94716->94719 94717->94718 94718->94714 94720 ea3605 94719->94720 94724 ea3624 __fread_nolock 94719->94724 94722 ebfe0b 22 API calls 94720->94722 94721 ebfddb 22 API calls 94723 ea363b 94721->94723 94722->94724 94723->94608 94724->94721 94725->94601 94788 ea4e90 LoadLibraryA 94726->94788 94731 ee3ccf 94734 ea4f39 68 API calls 94731->94734 94732 ea4ef6 LoadLibraryExW 94796 ea4e59 LoadLibraryA 94732->94796 94736 ee3cd6 94734->94736 94738 ea4e59 3 API calls 94736->94738 94739 ee3cde 94738->94739 94818 ea50f5 40 API calls __fread_nolock 94739->94818 94740 ea4f20 94740->94739 94741 ea4f2c 94740->94741 94743 ea4f39 68 API calls 94741->94743 94745 ea44cd 94743->94745 94744 ee3cf5 94819 f128fe 27 API calls 94744->94819 94745->94612 94745->94613 94747 ee3d05 94749 f12d15 94748->94749 94902 ea511f 64 API calls 94749->94902 94751 f12d29 94903 f12e66 75 API calls 94751->94903 94753 f12d3b 94771 f12d3f 94753->94771 94904 ea50f5 40 API calls __fread_nolock 94753->94904 94755 f12d56 94905 ea50f5 40 API calls __fread_nolock 94755->94905 94757 f12d66 94906 ea50f5 40 API calls __fread_nolock 94757->94906 94759 f12d81 94907 ea50f5 40 API calls __fread_nolock 94759->94907 94761 f12d9c 94908 ea511f 64 API calls 94761->94908 94763 f12db3 94764 ecea0c ___std_exception_copy 21 API calls 94763->94764 94765 f12dba 94764->94765 94766 ecea0c ___std_exception_copy 21 API calls 94765->94766 94767 f12dc4 94766->94767 94909 ea50f5 40 API calls __fread_nolock 94767->94909 94769 f12dd8 94910 f128fe 27 API calls 94769->94910 94771->94615 94772 f12dee 94772->94771 94911 f122ce 94772->94911 94774->94627 94776 ea4f4a 94775->94776 94777 ea4f43 94775->94777 94779 ea4f6a FreeLibrary 94776->94779 94780 ea4f59 94776->94780 94778 ece678 67 API calls 94777->94778 94778->94776 94779->94780 94780->94622 94781->94626 94782->94630 94783->94630 94784->94630 94785->94630 94786->94630 94787->94632 94789 ea4ea8 GetProcAddress 94788->94789 94790 ea4ec6 94788->94790 94791 ea4eb8 94789->94791 94793 ece5eb 94790->94793 94791->94790 94792 ea4ebf FreeLibrary 94791->94792 94792->94790 94820 ece52a 94793->94820 94795 ea4eea 94795->94731 94795->94732 94797 ea4e6e GetProcAddress 94796->94797 94798 ea4e8d 94796->94798 94799 ea4e7e 94797->94799 94801 ea4f80 94798->94801 94799->94798 94800 ea4e86 FreeLibrary 94799->94800 94800->94798 94802 ebfe0b 22 API calls 94801->94802 94803 ea4f95 94802->94803 94888 ea5722 94803->94888 94805 ea4fa1 __fread_nolock 94806 ee3d1d 94805->94806 94807 ea50a5 94805->94807 94817 ea4fdc 94805->94817 94899 f1304d 74 API calls 94806->94899 94891 ea42a2 CreateStreamOnHGlobal 94807->94891 94810 ee3d22 94900 ea511f 64 API calls 94810->94900 94813 ee3d45 94901 ea50f5 40 API calls __fread_nolock 94813->94901 94815 ea506e ISource 94815->94740 94817->94810 94817->94815 94897 ea50f5 40 API calls __fread_nolock 94817->94897 94898 ea511f 64 API calls 94817->94898 94818->94744 94819->94747 94823 ece536 BuildCatchObjectHelperInternal 94820->94823 94821 ece544 94845 ecf2d9 20 API calls __dosmaperr 94821->94845 94823->94821 94824 ece574 94823->94824 94826 ece579 94824->94826 94827 ece586 94824->94827 94825 ece549 94846 ed27ec 26 API calls pre_c_initialization 94825->94846 94847 ecf2d9 20 API calls __dosmaperr 94826->94847 94837 ed8061 94827->94837 94831 ece554 __fread_nolock 94831->94795 94832 ece58f 94833 ece595 94832->94833 94834 ece5a2 94832->94834 94848 ecf2d9 20 API calls __dosmaperr 94833->94848 94849 ece5d4 LeaveCriticalSection __fread_nolock 94834->94849 94838 ed806d BuildCatchObjectHelperInternal 94837->94838 94850 ed2f5e EnterCriticalSection 94838->94850 94840 ed807b 94851 ed80fb 94840->94851 94844 ed80ac __fread_nolock 94844->94832 94845->94825 94846->94831 94847->94831 94848->94831 94849->94831 94850->94840 94854 ed811e 94851->94854 94852 ed8177 94869 ed4c7d 94852->94869 94854->94852 94860 ed8088 94854->94860 94867 ec918d EnterCriticalSection 94854->94867 94868 ec91a1 LeaveCriticalSection 94854->94868 94858 ed8189 94858->94860 94882 ed3405 11 API calls 2 library calls 94858->94882 94864 ed80b7 94860->94864 94861 ed81a8 94883 ec918d EnterCriticalSection 94861->94883 94887 ed2fa6 LeaveCriticalSection 94864->94887 94866 ed80be 94866->94844 94867->94854 94868->94854 94874 ed4c8a __dosmaperr 94869->94874 94870 ed4cca 94885 ecf2d9 20 API calls __dosmaperr 94870->94885 94871 ed4cb5 RtlAllocateHeap 94872 ed4cc8 94871->94872 94871->94874 94876 ed29c8 94872->94876 94874->94870 94874->94871 94884 ec4ead 7 API calls 2 library calls 94874->94884 94877 ed29d3 RtlFreeHeap 94876->94877 94881 ed29fc __dosmaperr 94876->94881 94878 ed29e8 94877->94878 94877->94881 94886 ecf2d9 20 API calls __dosmaperr 94878->94886 94880 ed29ee GetLastError 94880->94881 94881->94858 94882->94861 94883->94860 94884->94874 94885->94872 94886->94880 94887->94866 94889 ebfddb 22 API calls 94888->94889 94890 ea5734 94889->94890 94890->94805 94892 ea42bc FindResourceExW 94891->94892 94896 ea42d9 94891->94896 94893 ee35ba LoadResource 94892->94893 94892->94896 94894 ee35cf SizeofResource 94893->94894 94893->94896 94895 ee35e3 LockResource 94894->94895 94894->94896 94895->94896 94896->94817 94897->94817 94898->94817 94899->94810 94900->94813 94901->94815 94902->94751 94903->94753 94904->94755 94905->94757 94906->94759 94907->94761 94908->94763 94909->94769 94910->94772 94912 f122d9 94911->94912 94913 f122e7 94911->94913 94914 ece5eb 29 API calls 94912->94914 94915 f1232c 94913->94915 94916 ece5eb 29 API calls 94913->94916 94939 f122f0 94913->94939 94914->94913 94940 f12557 40 API calls __fread_nolock 94915->94940 94917 f12311 94916->94917 94917->94915 94919 f1231a 94917->94919 94919->94939 94948 ece678 94919->94948 94920 f12370 94921 f12395 94920->94921 94922 f12374 94920->94922 94941 f12171 94921->94941 94923 f12381 94922->94923 94926 ece678 67 API calls 94922->94926 94928 ece678 67 API calls 94923->94928 94923->94939 94926->94923 94927 f1239d 94929 f123c3 94927->94929 94930 f123a3 94927->94930 94928->94939 94961 f123f3 74 API calls 94929->94961 94932 f123b0 94930->94932 94933 ece678 67 API calls 94930->94933 94934 ece678 67 API calls 94932->94934 94932->94939 94933->94932 94934->94939 94935 f123ca 94936 f123de 94935->94936 94937 ece678 67 API calls 94935->94937 94938 ece678 67 API calls 94936->94938 94936->94939 94937->94936 94938->94939 94939->94771 94940->94920 94942 ecea0c ___std_exception_copy 21 API calls 94941->94942 94943 f1217f 94942->94943 94944 ecea0c ___std_exception_copy 21 API calls 94943->94944 94945 f12190 94944->94945 94946 ecea0c ___std_exception_copy 21 API calls 94945->94946 94947 f1219c 94946->94947 94947->94927 94949 ece684 BuildCatchObjectHelperInternal 94948->94949 94950 ece6aa 94949->94950 94951 ece695 94949->94951 94960 ece6a5 __fread_nolock 94950->94960 94962 ec918d EnterCriticalSection 94950->94962 94979 ecf2d9 20 API calls __dosmaperr 94951->94979 94954 ece69a 94980 ed27ec 26 API calls pre_c_initialization 94954->94980 94955 ece6c6 94963 ece602 94955->94963 94958 ece6d1 94981 ece6ee LeaveCriticalSection __fread_nolock 94958->94981 94960->94939 94961->94935 94962->94955 94964 ece60f 94963->94964 94965 ece624 94963->94965 95014 ecf2d9 20 API calls __dosmaperr 94964->95014 94971 ece61f 94965->94971 94982 ecdc0b 94965->94982 94967 ece614 95015 ed27ec 26 API calls pre_c_initialization 94967->95015 94971->94958 94975 ece646 94999 ed862f 94975->94999 94978 ed29c8 _free 20 API calls 94978->94971 94979->94954 94980->94960 94981->94960 94983 ecdc23 94982->94983 94987 ecdc1f 94982->94987 94984 ecd955 __fread_nolock 26 API calls 94983->94984 94983->94987 94985 ecdc43 94984->94985 95016 ed59be 62 API calls 5 library calls 94985->95016 94988 ed4d7a 94987->94988 94989 ece640 94988->94989 94990 ed4d90 94988->94990 94992 ecd955 94989->94992 94990->94989 94991 ed29c8 _free 20 API calls 94990->94991 94991->94989 94993 ecd976 94992->94993 94994 ecd961 94992->94994 94993->94975 95017 ecf2d9 20 API calls __dosmaperr 94994->95017 94996 ecd966 95018 ed27ec 26 API calls pre_c_initialization 94996->95018 94998 ecd971 94998->94975 95000 ed863e 94999->95000 95001 ed8653 94999->95001 95022 ecf2c6 20 API calls __dosmaperr 95000->95022 95003 ed868e 95001->95003 95007 ed867a 95001->95007 95024 ecf2c6 20 API calls __dosmaperr 95003->95024 95004 ed8643 95023 ecf2d9 20 API calls __dosmaperr 95004->95023 95019 ed8607 95007->95019 95008 ed8693 95025 ecf2d9 20 API calls __dosmaperr 95008->95025 95011 ece64c 95011->94971 95011->94978 95012 ed869b 95026 ed27ec 26 API calls pre_c_initialization 95012->95026 95014->94967 95015->94971 95016->94987 95017->94996 95018->94998 95027 ed8585 95019->95027 95021 ed862b 95021->95011 95022->95004 95023->95011 95024->95008 95025->95012 95026->95011 95028 ed8591 BuildCatchObjectHelperInternal 95027->95028 95038 ed5147 EnterCriticalSection 95028->95038 95030 ed859f 95031 ed85c6 95030->95031 95032 ed85d1 95030->95032 95039 ed86ae 95031->95039 95054 ecf2d9 20 API calls __dosmaperr 95032->95054 95035 ed85cc 95055 ed85fb LeaveCriticalSection __wsopen_s 95035->95055 95037 ed85ee __fread_nolock 95037->95021 95038->95030 95056 ed53c4 95039->95056 95041 ed86c4 95069 ed5333 21 API calls 2 library calls 95041->95069 95043 ed86be 95043->95041 95045 ed53c4 __wsopen_s 26 API calls 95043->95045 95053 ed86f6 95043->95053 95044 ed53c4 __wsopen_s 26 API calls 95046 ed8702 CloseHandle 95044->95046 95049 ed86ed 95045->95049 95046->95041 95050 ed870e GetLastError 95046->95050 95047 ed871c 95048 ed873e 95047->95048 95070 ecf2a3 20 API calls __dosmaperr 95047->95070 95048->95035 95052 ed53c4 __wsopen_s 26 API calls 95049->95052 95050->95041 95052->95053 95053->95041 95053->95044 95054->95035 95055->95037 95057 ed53d1 95056->95057 95058 ed53e6 95056->95058 95059 ecf2c6 __dosmaperr 20 API calls 95057->95059 95060 ecf2c6 __dosmaperr 20 API calls 95058->95060 95062 ed540b 95058->95062 95061 ed53d6 95059->95061 95063 ed5416 95060->95063 95064 ecf2d9 __dosmaperr 20 API calls 95061->95064 95062->95043 95066 ecf2d9 __dosmaperr 20 API calls 95063->95066 95065 ed53de 95064->95065 95065->95043 95067 ed541e 95066->95067 95068 ed27ec pre_c_initialization 26 API calls 95067->95068 95068->95065 95069->95047 95070->95048 95071->94649 95072 ee2ba5 95073 ee2baf 95072->95073 95074 ea2b25 95072->95074 95118 ea3a5a 95073->95118 95100 ea2b83 7 API calls 95074->95100 95077 ee2bb8 95125 ea9cb3 95077->95125 95081 ea2b2f 95086 ea2b44 95081->95086 95104 ea3837 95081->95104 95082 ee2bc6 95083 ee2bce 95082->95083 95084 ee2bf5 95082->95084 95131 ea33c6 95083->95131 95088 ea33c6 22 API calls 95084->95088 95091 ea2b5f 95086->95091 95114 ea30f2 95086->95114 95090 ee2bf1 GetForegroundWindow ShellExecuteW 95088->95090 95096 ee2c26 95090->95096 95098 ea2b66 SetCurrentDirectoryW 95091->95098 95095 ee2be7 95097 ea33c6 22 API calls 95095->95097 95096->95091 95097->95090 95099 ea2b7a 95098->95099 95141 ea2cd4 7 API calls 95100->95141 95102 ea2b2a 95103 ea2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 95102->95103 95103->95081 95105 ea3862 ___scrt_fastfail 95104->95105 95142 ea4212 95105->95142 95108 ea38e8 95110 ee3386 Shell_NotifyIconW 95108->95110 95111 ea3906 Shell_NotifyIconW 95108->95111 95146 ea3923 95111->95146 95113 ea391c 95113->95086 95115 ea3154 95114->95115 95116 ea3104 ___scrt_fastfail 95114->95116 95115->95091 95117 ea3123 Shell_NotifyIconW 95116->95117 95117->95115 95119 ee1f50 __wsopen_s 95118->95119 95120 ea3a67 GetModuleFileNameW 95119->95120 95121 ea9cb3 22 API calls 95120->95121 95122 ea3a8d 95121->95122 95123 ea3aa2 23 API calls 95122->95123 95124 ea3a97 95123->95124 95124->95077 95126 ea9cc2 _wcslen 95125->95126 95127 ebfe0b 22 API calls 95126->95127 95128 ea9cea __fread_nolock 95127->95128 95129 ebfddb 22 API calls 95128->95129 95130 ea9d00 95129->95130 95130->95082 95132 ee30bb 95131->95132 95133 ea33dd 95131->95133 95135 ebfddb 22 API calls 95132->95135 95177 ea33ee 95133->95177 95137 ee30c5 _wcslen 95135->95137 95136 ea33e8 95140 ea6350 22 API calls 95136->95140 95138 ebfe0b 22 API calls 95137->95138 95139 ee30fe __fread_nolock 95138->95139 95140->95095 95141->95102 95143 ee35a4 95142->95143 95144 ea38b7 95142->95144 95143->95144 95145 ee35ad DestroyIcon 95143->95145 95144->95108 95168 f0c874 42 API calls _strftime 95144->95168 95145->95144 95147 ea393f 95146->95147 95166 ea3a13 95146->95166 95169 ea6270 95147->95169 95150 ea395a 95152 ea6b57 22 API calls 95150->95152 95151 ee3393 LoadStringW 95153 ee33ad 95151->95153 95154 ea396f 95152->95154 95162 ea3994 ___scrt_fastfail 95153->95162 95175 eaa8c7 22 API calls __fread_nolock 95153->95175 95155 ea397c 95154->95155 95156 ee33c9 95154->95156 95155->95153 95158 ea3986 95155->95158 95176 ea6350 22 API calls 95156->95176 95174 ea6350 22 API calls 95158->95174 95161 ee33d7 95161->95162 95164 ea33c6 22 API calls 95161->95164 95163 ea39f9 Shell_NotifyIconW 95162->95163 95163->95166 95165 ee33f9 95164->95165 95167 ea33c6 22 API calls 95165->95167 95166->95113 95167->95162 95168->95108 95170 ebfe0b 22 API calls 95169->95170 95171 ea6295 95170->95171 95172 ebfddb 22 API calls 95171->95172 95173 ea394d 95172->95173 95173->95150 95173->95151 95174->95162 95175->95162 95176->95161 95178 ea33fe _wcslen 95177->95178 95179 ee311d 95178->95179 95180 ea3411 95178->95180 95182 ebfddb 22 API calls 95179->95182 95187 eaa587 95180->95187 95184 ee3127 95182->95184 95183 ea341e __fread_nolock 95183->95136 95185 ebfe0b 22 API calls 95184->95185 95186 ee3157 __fread_nolock 95185->95186 95188 eaa59d 95187->95188 95191 eaa598 __fread_nolock 95187->95191 95189 ebfe0b 22 API calls 95188->95189 95190 eef80f 95188->95190 95189->95191 95190->95190 95191->95183 95192 ee2402 95195 ea1410 95192->95195 95196 ea144f mciSendStringW 95195->95196 95197 ee24b8 DestroyWindow 95195->95197 95198 ea146b 95196->95198 95199 ea16c6 95196->95199 95210 ee24c4 95197->95210 95201 ea1479 95198->95201 95198->95210 95199->95198 95200 ea16d5 UnregisterHotKey 95199->95200 95200->95199 95228 ea182e 95201->95228 95204 ee2509 95209 ee252d 95204->95209 95211 ee251c FreeLibrary 95204->95211 95205 ee24d8 95205->95210 95234 ea6246 CloseHandle 95205->95234 95206 ee24e2 FindClose 95206->95210 95207 ea148e 95207->95209 95216 ea149c 95207->95216 95212 ee2541 VirtualFree 95209->95212 95219 ea1509 95209->95219 95210->95204 95210->95205 95210->95206 95211->95204 95212->95209 95213 ea14f8 CoUninitialize 95213->95219 95214 ee2589 95221 ee2598 ISource 95214->95221 95235 f132eb 6 API calls ISource 95214->95235 95215 ea1514 95218 ea1524 95215->95218 95216->95213 95232 ea1944 VirtualFreeEx CloseHandle 95218->95232 95219->95214 95219->95215 95224 ee2627 95221->95224 95236 f064d4 22 API calls ISource 95221->95236 95223 ea153a 95223->95221 95225 ea161f 95223->95225 95224->95224 95225->95224 95233 ea1876 CloseHandle InternetCloseHandle InternetCloseHandle WaitForSingleObject 95225->95233 95227 ea16c1 95230 ea183b 95228->95230 95229 ea1480 95229->95204 95229->95207 95230->95229 95237 f0702a 22 API calls 95230->95237 95232->95223 95233->95227 95234->95205 95235->95214 95236->95221 95237->95230 95238 ea1044 95243 ea10f3 95238->95243 95240 ea104a 95279 ec00a3 29 API calls __onexit 95240->95279 95242 ea1054 95280 ea1398 95243->95280 95247 ea116a 95248 eaa961 22 API calls 95247->95248 95249 ea1174 95248->95249 95250 eaa961 22 API calls 95249->95250 95251 ea117e 95250->95251 95252 eaa961 22 API calls 95251->95252 95253 ea1188 95252->95253 95254 eaa961 22 API calls 95253->95254 95255 ea11c6 95254->95255 95256 eaa961 22 API calls 95255->95256 95257 ea1292 95256->95257 95290 ea171c 95257->95290 95261 ea12c4 95262 eaa961 22 API calls 95261->95262 95263 ea12ce 95262->95263 95311 eb1940 95263->95311 95265 ea12f9 95321 ea1aab 95265->95321 95267 ea1315 95268 ea1325 GetStdHandle 95267->95268 95269 ea137a 95268->95269 95270 ee2485 95268->95270 95274 ea1387 OleInitialize 95269->95274 95270->95269 95271 ee248e 95270->95271 95272 ebfddb 22 API calls 95271->95272 95273 ee2495 95272->95273 95328 f1011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 95273->95328 95274->95240 95276 ee249e 95329 f10944 CreateThread 95276->95329 95278 ee24aa CloseHandle 95278->95269 95279->95242 95330 ea13f1 95280->95330 95283 ea13f1 22 API calls 95284 ea13d0 95283->95284 95285 eaa961 22 API calls 95284->95285 95286 ea13dc 95285->95286 95287 ea6b57 22 API calls 95286->95287 95288 ea1129 95287->95288 95289 ea1bc3 6 API calls 95288->95289 95289->95247 95291 eaa961 22 API calls 95290->95291 95292 ea172c 95291->95292 95293 eaa961 22 API calls 95292->95293 95294 ea1734 95293->95294 95295 eaa961 22 API calls 95294->95295 95296 ea174f 95295->95296 95297 ebfddb 22 API calls 95296->95297 95298 ea129c 95297->95298 95299 ea1b4a 95298->95299 95300 ea1b58 95299->95300 95301 eaa961 22 API calls 95300->95301 95302 ea1b63 95301->95302 95303 eaa961 22 API calls 95302->95303 95304 ea1b6e 95303->95304 95305 eaa961 22 API calls 95304->95305 95306 ea1b79 95305->95306 95307 eaa961 22 API calls 95306->95307 95308 ea1b84 95307->95308 95309 ebfddb 22 API calls 95308->95309 95310 ea1b96 RegisterWindowMessageW 95309->95310 95310->95261 95312 eb1981 95311->95312 95316 eb195d 95311->95316 95337 ec0242 5 API calls __Init_thread_wait 95312->95337 95315 eb198b 95315->95316 95338 ec01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95315->95338 95320 eb196e 95316->95320 95339 ec0242 5 API calls __Init_thread_wait 95316->95339 95318 eb8727 95318->95320 95340 ec01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95318->95340 95320->95265 95322 ea1abb 95321->95322 95323 ee272d 95321->95323 95324 ebfddb 22 API calls 95322->95324 95341 f13209 23 API calls 95323->95341 95326 ea1ac3 95324->95326 95326->95267 95327 ee2738 95328->95276 95329->95278 95342 f1092a 28 API calls 95329->95342 95331 eaa961 22 API calls 95330->95331 95332 ea13fc 95331->95332 95333 eaa961 22 API calls 95332->95333 95334 ea1404 95333->95334 95335 eaa961 22 API calls 95334->95335 95336 ea13c6 95335->95336 95336->95283 95337->95315 95338->95316 95339->95318 95340->95320 95341->95327 95343 ef2a00 95358 ead7b0 ISource 95343->95358 95344 eadb11 PeekMessageW 95344->95358 95345 ead807 GetInputState 95345->95344 95345->95358 95346 ef1cbe TranslateAcceleratorW 95346->95358 95348 eadb8f PeekMessageW 95348->95358 95349 eada04 timeGetTime 95349->95358 95350 eadb73 TranslateMessage DispatchMessageW 95350->95348 95351 eadbaf Sleep 95369 eadbc0 95351->95369 95352 ef2b74 Sleep 95352->95369 95353 ebe551 timeGetTime 95353->95369 95354 ef1dda timeGetTime 95496 ebe300 23 API calls 95354->95496 95357 ef2c0b GetExitCodeProcess 95359 ef2c37 CloseHandle 95357->95359 95360 ef2c21 WaitForSingleObject 95357->95360 95358->95344 95358->95345 95358->95346 95358->95348 95358->95349 95358->95350 95358->95351 95358->95352 95358->95354 95362 ead9d5 95358->95362 95375 eadd50 95358->95375 95382 eb1310 95358->95382 95436 eabf40 95358->95436 95494 eadfd0 346 API calls 3 library calls 95358->95494 95495 ebedf6 IsDialogMessageW GetClassLongW 95358->95495 95497 f13a2a 23 API calls 95358->95497 95498 eaec40 95358->95498 95522 f1359c 82 API calls __wsopen_s 95358->95522 95359->95369 95360->95358 95360->95359 95361 ef2a31 95361->95362 95363 f329bf GetForegroundWindow 95363->95369 95365 ef2ca9 Sleep 95365->95358 95369->95353 95369->95357 95369->95358 95369->95361 95369->95362 95369->95363 95369->95365 95523 f25658 23 API calls 95369->95523 95524 f0e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 95369->95524 95525 f0d4dc CreateToolhelp32Snapshot Process32FirstW 95369->95525 95376 eadd6f 95375->95376 95377 eadd83 95375->95377 95535 ead260 95376->95535 95567 f1359c 82 API calls __wsopen_s 95377->95567 95379 eadd7a 95379->95358 95381 ef2f75 95381->95381 95383 eb17b0 95382->95383 95384 eb1376 95382->95384 95589 ec0242 5 API calls __Init_thread_wait 95383->95589 95385 eb1390 95384->95385 95386 ef6331 95384->95386 95389 eb1940 9 API calls 95385->95389 95594 f2709c 346 API calls 95386->95594 95388 eb17ba 95392 eb17fb 95388->95392 95394 ea9cb3 22 API calls 95388->95394 95393 eb13a0 95389->95393 95391 ef633d 95391->95358 95397 ef6346 95392->95397 95399 eb182c 95392->95399 95395 eb1940 9 API calls 95393->95395 95403 eb17d4 95394->95403 95396 eb13b6 95395->95396 95396->95392 95398 eb13ec 95396->95398 95595 f1359c 82 API calls __wsopen_s 95397->95595 95398->95397 95422 eb1408 __fread_nolock 95398->95422 95591 eaaceb 23 API calls ISource 95399->95591 95402 eb1839 95592 ebd217 346 API calls 95402->95592 95590 ec01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95403->95590 95406 ef636e 95596 f1359c 82 API calls __wsopen_s 95406->95596 95407 eb152f 95409 eb153c 95407->95409 95410 ef63d1 95407->95410 95412 eb1940 9 API calls 95409->95412 95598 f25745 54 API calls _wcslen 95410->95598 95414 eb1549 95412->95414 95413 ebfddb 22 API calls 95413->95422 95417 ef64fa 95414->95417 95419 eb1940 9 API calls 95414->95419 95415 eb1872 95593 ebfaeb 23 API calls 95415->95593 95416 ebfe0b 22 API calls 95416->95422 95426 ef6369 95417->95426 95600 f1359c 82 API calls __wsopen_s 95417->95600 95424 eb1563 95419->95424 95421 eaec40 346 API calls 95421->95422 95422->95402 95422->95406 95422->95407 95422->95413 95422->95416 95422->95421 95423 ef63b2 95422->95423 95422->95426 95597 f1359c 82 API calls __wsopen_s 95423->95597 95424->95417 95429 eb15c7 ISource 95424->95429 95599 eaa8c7 22 API calls __fread_nolock 95424->95599 95426->95358 95428 eb1940 9 API calls 95428->95429 95429->95415 95429->95417 95429->95426 95429->95428 95431 eb167b ISource 95429->95431 95575 f2ab67 95429->95575 95578 f15c5a 95429->95578 95583 f2a2ea 95429->95583 95430 eb171d 95430->95358 95431->95430 95588 ebce17 22 API calls ISource 95431->95588 95746 eaadf0 95436->95746 95438 eabf9d 95439 eabfa9 95438->95439 95440 ef04b6 95438->95440 95442 ef04c6 95439->95442 95443 eac01e 95439->95443 95765 f1359c 82 API calls __wsopen_s 95440->95765 95766 f1359c 82 API calls __wsopen_s 95442->95766 95751 eaac91 95443->95751 95446 eac7da 95450 ebfe0b 22 API calls 95446->95450 95455 eac808 __fread_nolock 95450->95455 95453 ef04f5 95456 ef055a 95453->95456 95767 ebd217 346 API calls 95453->95767 95460 ebfe0b 22 API calls 95455->95460 95480 eac603 95456->95480 95768 f1359c 82 API calls __wsopen_s 95456->95768 95457 eaec40 346 API calls 95491 eac039 ISource __fread_nolock 95457->95491 95458 f07120 22 API calls 95458->95491 95459 ef091a 95778 f13209 23 API calls 95459->95778 95492 eac350 ISource __fread_nolock 95460->95492 95461 eaaf8a 22 API calls 95461->95491 95464 ef08a5 95465 eaec40 346 API calls 95464->95465 95467 ef08cf 95465->95467 95467->95480 95776 eaa81b 41 API calls 95467->95776 95468 ef0591 95769 f1359c 82 API calls __wsopen_s 95468->95769 95469 ef08f6 95777 f1359c 82 API calls __wsopen_s 95469->95777 95475 eac253 95477 ef0976 95475->95477 95485 eac297 ISource 95475->95485 95476 eac237 95476->95475 95779 eaa8c7 22 API calls __fread_nolock 95476->95779 95780 eaaceb 23 API calls ISource 95477->95780 95479 ebfe0b 22 API calls 95479->95491 95480->95358 95482 ebfddb 22 API calls 95482->95491 95484 ef09bf 95484->95480 95781 f1359c 82 API calls __wsopen_s 95484->95781 95485->95484 95762 eaaceb 23 API calls ISource 95485->95762 95487 eac335 95487->95484 95489 eac342 95487->95489 95488 eabbe0 40 API calls 95488->95491 95763 eaa704 22 API calls ISource 95489->95763 95491->95446 95491->95453 95491->95455 95491->95456 95491->95457 95491->95458 95491->95459 95491->95461 95491->95464 95491->95468 95491->95469 95491->95476 95491->95479 95491->95480 95491->95482 95491->95484 95491->95488 95755 eaad81 95491->95755 95770 f07099 22 API calls __fread_nolock 95491->95770 95771 f25745 54 API calls _wcslen 95491->95771 95772 ebaa42 22 API calls ISource 95491->95772 95773 f0f05c 40 API calls 95491->95773 95774 eaa993 41 API calls 95491->95774 95775 eaaceb 23 API calls ISource 95491->95775 95493 eac3ac 95492->95493 95764 ebce17 22 API calls ISource 95492->95764 95493->95358 95494->95358 95495->95358 95496->95358 95497->95358 95501 eaec76 ISource 95498->95501 95499 ec0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95499->95501 95500 ec00a3 29 API calls pre_c_initialization 95500->95501 95501->95499 95501->95500 95502 ec01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95501->95502 95503 ebfddb 22 API calls 95501->95503 95504 eafef7 95501->95504 95507 ef4b0b 95501->95507 95508 eaa8c7 22 API calls 95501->95508 95509 ef4600 95501->95509 95515 eafbe3 95501->95515 95516 eaa961 22 API calls 95501->95516 95517 eaed9d ISource 95501->95517 95520 ef4beb 95501->95520 95521 eaf3ae ISource 95501->95521 95791 eb01e0 346 API calls 2 library calls 95501->95791 95792 eb06a0 41 API calls ISource 95501->95792 95502->95501 95503->95501 95504->95517 95794 eaa8c7 22 API calls __fread_nolock 95504->95794 95796 f1359c 82 API calls __wsopen_s 95507->95796 95508->95501 95509->95517 95793 eaa8c7 22 API calls __fread_nolock 95509->95793 95515->95517 95518 ef4bdc 95515->95518 95515->95521 95516->95501 95517->95358 95797 f1359c 82 API calls __wsopen_s 95518->95797 95798 f1359c 82 API calls __wsopen_s 95520->95798 95521->95517 95795 f1359c 82 API calls __wsopen_s 95521->95795 95522->95358 95523->95369 95524->95369 95799 f0def7 95525->95799 95527 f0d529 Process32NextW 95528 f0d5db CloseHandle 95527->95528 95533 f0d522 95527->95533 95528->95369 95529 eaa961 22 API calls 95529->95533 95530 ea9cb3 22 API calls 95530->95533 95533->95527 95533->95528 95533->95529 95533->95530 95805 ea525f 22 API calls 95533->95805 95806 ea6350 22 API calls 95533->95806 95807 ebce60 41 API calls 95533->95807 95536 eaec40 346 API calls 95535->95536 95553 ead29d 95536->95553 95537 ef1bc4 95574 f1359c 82 API calls __wsopen_s 95537->95574 95539 ead30b ISource 95539->95379 95540 ead3c3 95542 ead6d5 95540->95542 95543 ead3ce 95540->95543 95541 ead5ff 95545 ef1bb5 95541->95545 95546 ead614 95541->95546 95542->95539 95550 ebfe0b 22 API calls 95542->95550 95544 ebfddb 22 API calls 95543->95544 95554 ead3d5 __fread_nolock 95544->95554 95573 f25705 23 API calls 95545->95573 95549 ebfddb 22 API calls 95546->95549 95547 ead4b8 95552 ebfe0b 22 API calls 95547->95552 95560 ead46a 95549->95560 95550->95554 95551 ead429 ISource __fread_nolock 95551->95541 95559 ef1ba4 95551->95559 95551->95560 95563 ef1b7f 95551->95563 95565 ef1b5d 95551->95565 95569 ea1f6f 346 API calls 95551->95569 95552->95551 95553->95537 95553->95539 95553->95540 95553->95542 95553->95547 95553->95551 95557 ebfddb 22 API calls 95553->95557 95555 ebfddb 22 API calls 95554->95555 95556 ead3f6 95554->95556 95555->95556 95556->95551 95568 eabec0 346 API calls 95556->95568 95557->95553 95572 f1359c 82 API calls __wsopen_s 95559->95572 95560->95379 95571 f1359c 82 API calls __wsopen_s 95563->95571 95570 f1359c 82 API calls __wsopen_s 95565->95570 95567->95381 95568->95551 95569->95551 95570->95560 95571->95560 95572->95560 95573->95537 95574->95539 95601 f2aff9 95575->95601 95579 ea7510 53 API calls 95578->95579 95580 f15c6d 95579->95580 95741 f0dbbe lstrlenW 95580->95741 95582 f15c77 95582->95429 95584 ea7510 53 API calls 95583->95584 95585 f2a306 95584->95585 95586 f0d4dc 47 API calls 95585->95586 95587 f2a315 95586->95587 95587->95429 95588->95431 95589->95388 95590->95392 95591->95402 95592->95415 95593->95415 95594->95391 95595->95426 95596->95426 95597->95426 95598->95424 95599->95429 95600->95426 95602 f2b01d ___scrt_fastfail 95601->95602 95603 f2b094 95602->95603 95604 f2b058 95602->95604 95609 f2b08b 95603->95609 95722 eab567 39 API calls 95603->95722 95719 eab567 39 API calls 95604->95719 95606 f2b063 95606->95609 95720 eab567 39 API calls 95606->95720 95607 f2b0ed 95692 ea7510 95607->95692 95609->95607 95724 eab567 39 API calls 95609->95724 95611 f2b0a5 95723 eab567 39 API calls 95611->95723 95616 f2b078 95721 eab567 39 API calls 95616->95721 95619 f2b115 95620 f2b1d8 95619->95620 95621 f2b11f 95619->95621 95622 f2b20a GetCurrentDirectoryW 95620->95622 95624 ea7510 53 API calls 95620->95624 95623 ea7510 53 API calls 95621->95623 95625 ebfe0b 22 API calls 95622->95625 95626 f2b130 95623->95626 95629 f2b1ef 95624->95629 95627 f2b22f GetCurrentDirectoryW 95625->95627 95628 ea7620 22 API calls 95626->95628 95630 f2b23c 95627->95630 95631 f2b13a 95628->95631 95632 ea7620 22 API calls 95629->95632 95635 f2b275 95630->95635 95725 ea9c6e 22 API calls 95630->95725 95633 ea7510 53 API calls 95631->95633 95634 f2b1f9 _wcslen 95632->95634 95636 f2b14b 95633->95636 95634->95622 95634->95635 95643 f2b287 95635->95643 95644 f2b28b 95635->95644 95638 ea7620 22 API calls 95636->95638 95640 f2b155 95638->95640 95639 f2b255 95726 ea9c6e 22 API calls 95639->95726 95642 ea7510 53 API calls 95640->95642 95646 f2b166 95642->95646 95648 f2b39a CreateProcessW 95643->95648 95649 f2b2f8 95643->95649 95728 f107c0 10 API calls 95644->95728 95645 f2b265 95727 ea9c6e 22 API calls 95645->95727 95651 ea7620 22 API calls 95646->95651 95691 f2b32f _wcslen 95648->95691 95731 f011c8 39 API calls 95649->95731 95655 f2b170 95651->95655 95652 f2b294 95729 f106e6 10 API calls 95652->95729 95658 f2b1a6 GetSystemDirectoryW 95655->95658 95663 ea7510 53 API calls 95655->95663 95656 f2b2aa 95730 f105a7 8 API calls 95656->95730 95657 f2b2fd 95661 f2b323 95657->95661 95662 f2b32a 95657->95662 95660 ebfe0b 22 API calls 95658->95660 95665 f2b1cb GetSystemDirectoryW 95660->95665 95732 f01201 128 API calls 2 library calls 95661->95732 95733 f014ce 6 API calls 95662->95733 95667 f2b187 95663->95667 95664 f2b2d0 95664->95643 95665->95630 95670 ea7620 22 API calls 95667->95670 95669 f2b328 95669->95691 95673 f2b191 _wcslen 95670->95673 95671 f2b3d6 GetLastError 95684 f2b41a 95671->95684 95672 f2b42f CloseHandle 95674 f2b43f 95672->95674 95681 f2b49a 95672->95681 95673->95630 95673->95658 95675 f2b451 95674->95675 95676 f2b446 CloseHandle 95674->95676 95678 f2b463 95675->95678 95679 f2b458 CloseHandle 95675->95679 95676->95675 95682 f2b475 95678->95682 95683 f2b46a CloseHandle 95678->95683 95679->95678 95680 f2b4a6 95680->95684 95681->95680 95687 f2b4d2 CloseHandle 95681->95687 95734 f109d9 34 API calls 95682->95734 95683->95682 95736 f10175 6 API calls 95684->95736 95687->95684 95688 f2ab79 95688->95429 95689 f2b486 95735 f2b536 25 API calls 95689->95735 95691->95671 95691->95672 95693 ea7525 95692->95693 95709 ea7522 95692->95709 95694 ea755b 95693->95694 95695 ea752d 95693->95695 95698 ea756d 95694->95698 95705 ee500f 95694->95705 95706 ee50f6 95694->95706 95737 ec51c6 26 API calls 95695->95737 95738 ebfb21 51 API calls 95698->95738 95699 ea753d 95702 ebfddb 22 API calls 95699->95702 95700 ee510e 95700->95700 95704 ea7547 95702->95704 95707 ea9cb3 22 API calls 95704->95707 95708 ebfe0b 22 API calls 95705->95708 95714 ee5088 95705->95714 95740 ec5183 26 API calls 95706->95740 95707->95709 95710 ee5058 95708->95710 95715 ea7620 95709->95715 95711 ebfddb 22 API calls 95710->95711 95712 ee507f 95711->95712 95713 ea9cb3 22 API calls 95712->95713 95713->95714 95739 ebfb21 51 API calls 95714->95739 95716 ea762a _wcslen 95715->95716 95717 ebfe0b 22 API calls 95716->95717 95718 ea763f 95717->95718 95718->95619 95719->95606 95720->95616 95721->95609 95722->95611 95723->95609 95724->95607 95725->95639 95726->95645 95727->95635 95728->95652 95729->95656 95730->95664 95731->95657 95732->95669 95733->95691 95734->95689 95735->95681 95736->95688 95737->95699 95738->95699 95739->95706 95740->95700 95742 f0dc06 95741->95742 95743 f0dbdc GetFileAttributesW 95741->95743 95742->95582 95743->95742 95744 f0dbe8 FindFirstFileW 95743->95744 95744->95742 95745 f0dbf9 FindClose 95744->95745 95745->95742 95747 eaae01 95746->95747 95750 eaae1c ISource 95746->95750 95748 eaaec9 22 API calls 95747->95748 95749 eaae09 CharUpperBuffW 95748->95749 95749->95750 95750->95438 95752 eaacae 95751->95752 95754 eaacd1 95752->95754 95782 f1359c 82 API calls __wsopen_s 95752->95782 95754->95491 95756 eefadb 95755->95756 95757 eaad92 95755->95757 95758 ebfddb 22 API calls 95757->95758 95759 eaad99 95758->95759 95783 eaadcd 95759->95783 95762->95487 95763->95492 95764->95492 95765->95442 95766->95480 95767->95456 95768->95480 95769->95480 95770->95491 95771->95491 95772->95491 95773->95491 95774->95491 95775->95491 95776->95469 95777->95480 95778->95476 95779->95475 95780->95484 95781->95480 95782->95754 95787 eaaddd 95783->95787 95784 eaadb6 95784->95491 95785 ebfddb 22 API calls 95785->95787 95786 eaa961 22 API calls 95786->95787 95787->95784 95787->95785 95787->95786 95788 eaadcd 22 API calls 95787->95788 95790 eaa8c7 22 API calls __fread_nolock 95787->95790 95788->95787 95790->95787 95791->95501 95792->95501 95793->95517 95794->95517 95795->95517 95796->95517 95797->95520 95798->95517 95800 f0df02 95799->95800 95801 f0df19 95800->95801 95804 f0df1f 95800->95804 95808 ec63b2 GetStringTypeW _strftime 95800->95808 95809 ec62fb 39 API calls _strftime 95801->95809 95804->95533 95805->95533 95806->95533 95807->95533 95808->95800 95809->95804 95810 ed8402 95815 ed81be 95810->95815 95813 ed842a 95820 ed81ef try_get_first_available_module 95815->95820 95817 ed83ee 95834 ed27ec 26 API calls pre_c_initialization 95817->95834 95819 ed8343 95819->95813 95827 ee0984 95819->95827 95820->95820 95823 ed8338 95820->95823 95830 ec8e0b 40 API calls 2 library calls 95820->95830 95822 ed838c 95822->95823 95831 ec8e0b 40 API calls 2 library calls 95822->95831 95823->95819 95833 ecf2d9 20 API calls __dosmaperr 95823->95833 95825 ed83ab 95825->95823 95832 ec8e0b 40 API calls 2 library calls 95825->95832 95835 ee0081 95827->95835 95829 ee099f 95829->95813 95830->95822 95831->95825 95832->95823 95833->95817 95834->95819 95836 ee008d BuildCatchObjectHelperInternal 95835->95836 95837 ee009b 95836->95837 95840 ee00d4 95836->95840 95893 ecf2d9 20 API calls __dosmaperr 95837->95893 95839 ee00a0 95894 ed27ec 26 API calls pre_c_initialization 95839->95894 95846 ee065b 95840->95846 95845 ee00aa __fread_nolock 95845->95829 95896 ee042f 95846->95896 95849 ee068d 95928 ecf2c6 20 API calls __dosmaperr 95849->95928 95850 ee06a6 95914 ed5221 95850->95914 95853 ee0692 95929 ecf2d9 20 API calls __dosmaperr 95853->95929 95854 ee06ab 95855 ee06cb 95854->95855 95856 ee06b4 95854->95856 95927 ee039a CreateFileW 95855->95927 95930 ecf2c6 20 API calls __dosmaperr 95856->95930 95860 ee00f8 95895 ee0121 LeaveCriticalSection __wsopen_s 95860->95895 95861 ee06b9 95931 ecf2d9 20 API calls __dosmaperr 95861->95931 95863 ee0781 GetFileType 95865 ee078c GetLastError 95863->95865 95866 ee07d3 95863->95866 95864 ee0756 GetLastError 95933 ecf2a3 20 API calls __dosmaperr 95864->95933 95934 ecf2a3 20 API calls __dosmaperr 95865->95934 95936 ed516a 21 API calls 2 library calls 95866->95936 95867 ee0704 95867->95863 95867->95864 95932 ee039a CreateFileW 95867->95932 95870 ee079a CloseHandle 95870->95853 95872 ee07c3 95870->95872 95935 ecf2d9 20 API calls __dosmaperr 95872->95935 95874 ee0749 95874->95863 95874->95864 95876 ee07f4 95878 ee0840 95876->95878 95937 ee05ab 72 API calls 3 library calls 95876->95937 95877 ee07c8 95877->95853 95883 ee086d 95878->95883 95938 ee014d 72 API calls 4 library calls 95878->95938 95881 ee0866 95882 ee087e 95881->95882 95881->95883 95882->95860 95885 ee08fc CloseHandle 95882->95885 95884 ed86ae __wsopen_s 29 API calls 95883->95884 95884->95860 95939 ee039a CreateFileW 95885->95939 95887 ee0927 95888 ee0931 GetLastError 95887->95888 95892 ee095d 95887->95892 95940 ecf2a3 20 API calls __dosmaperr 95888->95940 95890 ee093d 95941 ed5333 21 API calls 2 library calls 95890->95941 95892->95860 95893->95839 95894->95845 95895->95845 95897 ee0450 95896->95897 95898 ee046a 95896->95898 95897->95898 95949 ecf2d9 20 API calls __dosmaperr 95897->95949 95942 ee03bf 95898->95942 95901 ee045f 95950 ed27ec 26 API calls pre_c_initialization 95901->95950 95903 ee04a2 95904 ee04d1 95903->95904 95951 ecf2d9 20 API calls __dosmaperr 95903->95951 95913 ee0524 95904->95913 95953 ecd70d 26 API calls 2 library calls 95904->95953 95907 ee04c6 95952 ed27ec 26 API calls pre_c_initialization 95907->95952 95908 ee051f 95909 ee059e 95908->95909 95908->95913 95954 ed27fc 11 API calls _abort 95909->95954 95912 ee05aa 95913->95849 95913->95850 95915 ed522d BuildCatchObjectHelperInternal 95914->95915 95957 ed2f5e EnterCriticalSection 95915->95957 95917 ed527b 95958 ed532a 95917->95958 95919 ed5234 95919->95917 95920 ed5259 95919->95920 95924 ed52c7 EnterCriticalSection 95919->95924 95961 ed5000 95920->95961 95921 ed52a4 __fread_nolock 95921->95854 95924->95917 95925 ed52d4 LeaveCriticalSection 95924->95925 95925->95919 95927->95867 95928->95853 95929->95860 95930->95861 95931->95853 95932->95874 95933->95853 95934->95870 95935->95877 95936->95876 95937->95878 95938->95881 95939->95887 95940->95890 95941->95892 95944 ee03d7 95942->95944 95943 ee03f2 95943->95903 95944->95943 95955 ecf2d9 20 API calls __dosmaperr 95944->95955 95946 ee0416 95956 ed27ec 26 API calls pre_c_initialization 95946->95956 95948 ee0421 95948->95903 95949->95901 95950->95898 95951->95907 95952->95904 95953->95908 95954->95912 95955->95946 95956->95948 95957->95919 95969 ed2fa6 LeaveCriticalSection 95958->95969 95960 ed5331 95960->95921 95962 ed4c7d __dosmaperr 20 API calls 95961->95962 95963 ed5012 95962->95963 95967 ed501f 95963->95967 95970 ed3405 11 API calls 2 library calls 95963->95970 95964 ed29c8 _free 20 API calls 95966 ed5071 95964->95966 95966->95917 95968 ed5147 EnterCriticalSection 95966->95968 95967->95964 95968->95917 95969->95960 95970->95963 95971 ea105b 95976 ea344d 95971->95976 95973 ea106a 96007 ec00a3 29 API calls __onexit 95973->96007 95975 ea1074 95977 ea345d __wsopen_s 95976->95977 95978 eaa961 22 API calls 95977->95978 95979 ea3513 95978->95979 95980 ea3a5a 24 API calls 95979->95980 95981 ea351c 95980->95981 96008 ea3357 95981->96008 95984 ea33c6 22 API calls 95985 ea3535 95984->95985 95986 ea515f 22 API calls 95985->95986 95987 ea3544 95986->95987 95988 eaa961 22 API calls 95987->95988 95989 ea354d 95988->95989 95990 eaa6c3 22 API calls 95989->95990 95991 ea3556 RegOpenKeyExW 95990->95991 95992 ee3176 RegQueryValueExW 95991->95992 95997 ea3578 95991->95997 95993 ee320c RegCloseKey 95992->95993 95994 ee3193 95992->95994 95993->95997 96006 ee321e _wcslen 95993->96006 95995 ebfe0b 22 API calls 95994->95995 95996 ee31ac 95995->95996 95999 ea5722 22 API calls 95996->95999 95997->95973 95998 ea4c6d 22 API calls 95998->96006 96000 ee31b7 RegQueryValueExW 95999->96000 96001 ee31d4 96000->96001 96003 ee31ee ISource 96000->96003 96002 ea6b57 22 API calls 96001->96002 96002->96003 96003->95993 96004 ea9cb3 22 API calls 96004->96006 96005 ea515f 22 API calls 96005->96006 96006->95997 96006->95998 96006->96004 96006->96005 96007->95975 96009 ee1f50 __wsopen_s 96008->96009 96010 ea3364 GetFullPathNameW 96009->96010 96011 ea3386 96010->96011 96012 ea6b57 22 API calls 96011->96012 96013 ea33a4 96012->96013 96013->95984 96014 ea1098 96019 ea42de 96014->96019 96018 ea10a7 96020 eaa961 22 API calls 96019->96020 96021 ea42f5 GetVersionExW 96020->96021 96022 ea6b57 22 API calls 96021->96022 96023 ea4342 96022->96023 96024 ea93b2 22 API calls 96023->96024 96028 ea4378 96023->96028 96025 ea436c 96024->96025 96027 ea37a0 22 API calls 96025->96027 96026 ea441b GetCurrentProcess IsWow64Process 96029 ea4437 96026->96029 96027->96028 96028->96026 96030 ee37df 96028->96030 96031 ea444f LoadLibraryA 96029->96031 96032 ee3824 GetSystemInfo 96029->96032 96033 ea449c GetSystemInfo 96031->96033 96034 ea4460 GetProcAddress 96031->96034 96035 ea4476 96033->96035 96034->96033 96036 ea4470 GetNativeSystemInfo 96034->96036 96037 ea447a FreeLibrary 96035->96037 96038 ea109d 96035->96038 96036->96035 96037->96038 96039 ec00a3 29 API calls __onexit 96038->96039 96039->96018 96040 eaf7bf 96041 eaf7d3 96040->96041 96042 eafcb6 96040->96042 96044 eafcc2 96041->96044 96045 ebfddb 22 API calls 96041->96045 96077 eaaceb 23 API calls ISource 96042->96077 96078 eaaceb 23 API calls ISource 96044->96078 96047 eaf7e5 96045->96047 96047->96044 96048 eafd3d 96047->96048 96049 eaf83e 96047->96049 96079 f11155 22 API calls 96048->96079 96051 eb1310 346 API calls 96049->96051 96067 eaed9d ISource 96049->96067 96056 eaec76 ISource 96051->96056 96052 ef4beb 96085 f1359c 82 API calls __wsopen_s 96052->96085 96053 ebfddb 22 API calls 96053->96056 96054 eafef7 96054->96067 96081 eaa8c7 22 API calls __fread_nolock 96054->96081 96056->96052 96056->96053 96056->96054 96058 ef4b0b 96056->96058 96059 eaa8c7 22 API calls 96056->96059 96060 ef4600 96056->96060 96065 ec0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96056->96065 96056->96067 96068 eafbe3 96056->96068 96069 eaa961 22 API calls 96056->96069 96070 ec00a3 29 API calls pre_c_initialization 96056->96070 96073 ec01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96056->96073 96074 eaf3ae ISource 96056->96074 96075 eb01e0 346 API calls 2 library calls 96056->96075 96076 eb06a0 41 API calls ISource 96056->96076 96083 f1359c 82 API calls __wsopen_s 96058->96083 96059->96056 96060->96067 96080 eaa8c7 22 API calls __fread_nolock 96060->96080 96065->96056 96068->96067 96071 ef4bdc 96068->96071 96068->96074 96069->96056 96070->96056 96084 f1359c 82 API calls __wsopen_s 96071->96084 96073->96056 96074->96067 96082 f1359c 82 API calls __wsopen_s 96074->96082 96075->96056 96076->96056 96077->96044 96078->96048 96079->96067 96080->96067 96081->96067 96082->96067 96083->96067 96084->96052 96085->96067 96086 ec03fb 96087 ec0407 BuildCatchObjectHelperInternal 96086->96087 96115 ebfeb1 96087->96115 96089 ec040e 96090 ec0561 96089->96090 96093 ec0438 96089->96093 96145 ec083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 96090->96145 96092 ec0568 96138 ec4e52 96092->96138 96102 ec0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 96093->96102 96126 ed247d 96093->96126 96100 ec0457 96103 ec04d8 96102->96103 96141 ec4e1a 38 API calls 3 library calls 96102->96141 96134 ec0959 96103->96134 96106 ec04de 96107 ec04f3 96106->96107 96142 ec0992 GetModuleHandleW 96107->96142 96109 ec04fa 96109->96092 96110 ec04fe 96109->96110 96111 ec0507 96110->96111 96143 ec4df5 28 API calls _abort 96110->96143 96144 ec0040 13 API calls 2 library calls 96111->96144 96114 ec050f 96114->96100 96116 ebfeba 96115->96116 96147 ec0698 IsProcessorFeaturePresent 96116->96147 96118 ebfec6 96148 ec2c94 10 API calls 3 library calls 96118->96148 96120 ebfecb 96121 ebfecf 96120->96121 96149 ed2317 96120->96149 96121->96089 96124 ebfee6 96124->96089 96127 ed2494 96126->96127 96128 ec0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 96127->96128 96129 ec0451 96128->96129 96129->96100 96130 ed2421 96129->96130 96131 ed2450 96130->96131 96132 ec0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 96131->96132 96133 ed2479 96132->96133 96133->96102 96200 ec2340 96134->96200 96137 ec097f 96137->96106 96202 ec4bcf 96138->96202 96141->96103 96142->96109 96143->96111 96144->96114 96145->96092 96147->96118 96148->96120 96153 edd1f6 96149->96153 96152 ec2cbd 8 API calls 3 library calls 96152->96121 96154 edd20f 96153->96154 96155 edd213 96153->96155 96171 ec0a8c 96154->96171 96155->96154 96159 ed4bfb 96155->96159 96157 ebfed8 96157->96124 96157->96152 96160 ed4c07 BuildCatchObjectHelperInternal 96159->96160 96178 ed2f5e EnterCriticalSection 96160->96178 96162 ed4c0e 96179 ed50af 96162->96179 96164 ed4c1d 96165 ed4c2c 96164->96165 96192 ed4a8f 29 API calls 96164->96192 96194 ed4c48 LeaveCriticalSection _abort 96165->96194 96168 ed4c27 96193 ed4b45 GetStdHandle GetFileType 96168->96193 96169 ed4c3d __fread_nolock 96169->96155 96172 ec0a95 96171->96172 96173 ec0a97 IsProcessorFeaturePresent 96171->96173 96172->96157 96175 ec0c5d 96173->96175 96199 ec0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96175->96199 96177 ec0d40 96177->96157 96178->96162 96180 ed50bb BuildCatchObjectHelperInternal 96179->96180 96181 ed50df 96180->96181 96182 ed50c8 96180->96182 96195 ed2f5e EnterCriticalSection 96181->96195 96196 ecf2d9 20 API calls __dosmaperr 96182->96196 96185 ed50cd 96197 ed27ec 26 API calls pre_c_initialization 96185->96197 96187 ed50d7 __fread_nolock 96187->96164 96188 ed5117 96198 ed513e LeaveCriticalSection _abort 96188->96198 96190 ed50eb 96190->96188 96191 ed5000 __wsopen_s 21 API calls 96190->96191 96191->96190 96192->96168 96193->96165 96194->96169 96195->96190 96196->96185 96197->96187 96198->96187 96199->96177 96201 ec096c GetStartupInfoW 96200->96201 96201->96137 96203 ec4bdb FindHandlerForForeignException 96202->96203 96204 ec4bf4 96203->96204 96205 ec4be2 96203->96205 96226 ed2f5e EnterCriticalSection 96204->96226 96241 ec4d29 GetModuleHandleW 96205->96241 96208 ec4be7 96208->96204 96242 ec4d6d GetModuleHandleExW 96208->96242 96209 ec4c99 96230 ec4cd9 96209->96230 96213 ec4bfb 96213->96209 96215 ec4c70 96213->96215 96227 ed21a8 96213->96227 96216 ec4c88 96215->96216 96221 ed2421 _abort 5 API calls 96215->96221 96222 ed2421 _abort 5 API calls 96216->96222 96217 ec4cb6 96233 ec4ce8 96217->96233 96218 ec4ce2 96250 ee1d29 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 96218->96250 96221->96216 96222->96209 96226->96213 96251 ed1ee1 96227->96251 96270 ed2fa6 LeaveCriticalSection 96230->96270 96232 ec4cb2 96232->96217 96232->96218 96271 ed360c 96233->96271 96236 ec4d16 96239 ec4d6d _abort 8 API calls 96236->96239 96237 ec4cf6 GetPEB 96237->96236 96238 ec4d06 GetCurrentProcess TerminateProcess 96237->96238 96238->96236 96240 ec4d1e ExitProcess 96239->96240 96241->96208 96243 ec4dba 96242->96243 96244 ec4d97 GetProcAddress 96242->96244 96245 ec4dc9 96243->96245 96246 ec4dc0 FreeLibrary 96243->96246 96247 ec4dac 96244->96247 96248 ec0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 96245->96248 96246->96245 96247->96243 96249 ec4bf3 96248->96249 96249->96204 96254 ed1e90 96251->96254 96253 ed1f05 96253->96215 96255 ed1e9c BuildCatchObjectHelperInternal 96254->96255 96262 ed2f5e EnterCriticalSection 96255->96262 96257 ed1eaa 96263 ed1f31 96257->96263 96261 ed1ec8 __fread_nolock 96261->96253 96262->96257 96266 ed1f51 96263->96266 96267 ed1f59 96263->96267 96264 ec0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 96265 ed1eb7 96264->96265 96269 ed1ed5 LeaveCriticalSection _abort 96265->96269 96266->96264 96267->96266 96268 ed29c8 _free 20 API calls 96267->96268 96268->96266 96269->96261 96270->96232 96272 ed3631 96271->96272 96273 ed3627 96271->96273 96278 ed2fd7 5 API calls 2 library calls 96272->96278 96275 ec0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 96273->96275 96276 ec4cf2 96275->96276 96276->96236 96276->96237 96277 ed3648 96277->96273 96278->96277 96279 ea1033 96284 ea4c91 96279->96284 96283 ea1042 96285 eaa961 22 API calls 96284->96285 96286 ea4cff 96285->96286 96292 ea3af0 96286->96292 96288 ea4d9c 96290 ea1038 96288->96290 96295 ea51f7 22 API calls __fread_nolock 96288->96295 96291 ec00a3 29 API calls __onexit 96290->96291 96291->96283 96296 ea3b1c 96292->96296 96295->96288 96297 ea3b0f 96296->96297 96298 ea3b29 96296->96298 96297->96288 96298->96297 96299 ea3b30 RegOpenKeyExW 96298->96299 96299->96297 96300 ea3b4a RegQueryValueExW 96299->96300 96301 ea3b6b 96300->96301 96302 ea3b80 RegCloseKey 96300->96302 96301->96302 96302->96297 96303 ea3156 96306 ea3170 96303->96306 96307 ea3187 96306->96307 96308 ea31eb 96307->96308 96309 ea318c 96307->96309 96347 ea31e9 96307->96347 96311 ee2dfb 96308->96311 96312 ea31f1 96308->96312 96313 ea3199 96309->96313 96314 ea3265 PostQuitMessage 96309->96314 96310 ea31d0 DefWindowProcW 96320 ea316a 96310->96320 96354 ea18e2 10 API calls 96311->96354 96315 ea31f8 96312->96315 96316 ea321d SetTimer RegisterWindowMessageW 96312->96316 96318 ee2e7c 96313->96318 96319 ea31a4 96313->96319 96314->96320 96321 ee2d9c 96315->96321 96322 ea3201 KillTimer 96315->96322 96316->96320 96324 ea3246 CreatePopupMenu 96316->96324 96358 f0bf30 34 API calls ___scrt_fastfail 96318->96358 96325 ea31ae 96319->96325 96326 ee2e68 96319->96326 96334 ee2dd7 MoveWindow 96321->96334 96335 ee2da1 96321->96335 96328 ea30f2 Shell_NotifyIconW 96322->96328 96323 ee2e1c 96355 ebe499 42 API calls 96323->96355 96324->96320 96331 ee2e4d 96325->96331 96332 ea31b9 96325->96332 96357 f0c161 27 API calls ___scrt_fastfail 96326->96357 96338 ea3214 96328->96338 96331->96310 96356 f00ad7 22 API calls 96331->96356 96340 ea31c4 96332->96340 96341 ea3253 96332->96341 96333 ee2e8e 96333->96310 96333->96320 96334->96320 96336 ee2dc6 SetFocus 96335->96336 96337 ee2da7 96335->96337 96336->96320 96337->96340 96342 ee2db0 96337->96342 96351 ea3c50 DeleteObject DestroyWindow 96338->96351 96339 ea3263 96339->96320 96340->96310 96348 ea30f2 Shell_NotifyIconW 96340->96348 96352 ea326f 44 API calls ___scrt_fastfail 96341->96352 96353 ea18e2 10 API calls 96342->96353 96347->96310 96349 ee2e41 96348->96349 96350 ea3837 49 API calls 96349->96350 96350->96347 96351->96320 96352->96339 96353->96320 96354->96323 96355->96340 96356->96347 96357->96339 96358->96333 96359 ea2e37 96360 eaa961 22 API calls 96359->96360 96361 ea2e4d 96360->96361 96438 ea4ae3 96361->96438 96363 ea2e6b 96364 ea3a5a 24 API calls 96363->96364 96365 ea2e7f 96364->96365 96366 ea9cb3 22 API calls 96365->96366 96367 ea2e8c 96366->96367 96368 ea4ecb 94 API calls 96367->96368 96369 ea2ea5 96368->96369 96370 ea2ead 96369->96370 96371 ee2cb0 96369->96371 96452 eaa8c7 22 API calls __fread_nolock 96370->96452 96372 f12cf9 80 API calls 96371->96372 96373 ee2cc3 96372->96373 96375 ee2ccf 96373->96375 96377 ea4f39 68 API calls 96373->96377 96379 ea4f39 68 API calls 96375->96379 96376 ea2ec3 96453 ea6f88 22 API calls 96376->96453 96377->96375 96381 ee2ce5 96379->96381 96380 ea2ecf 96382 ea9cb3 22 API calls 96380->96382 96470 ea3084 22 API calls 96381->96470 96383 ea2edc 96382->96383 96454 eaa81b 41 API calls 96383->96454 96386 ea2eec 96388 ea9cb3 22 API calls 96386->96388 96387 ee2d02 96471 ea3084 22 API calls 96387->96471 96390 ea2f12 96388->96390 96455 eaa81b 41 API calls 96390->96455 96392 ee2d1e 96393 ea3a5a 24 API calls 96392->96393 96395 ee2d44 96393->96395 96394 ea2f21 96398 eaa961 22 API calls 96394->96398 96472 ea3084 22 API calls 96395->96472 96397 ee2d50 96473 eaa8c7 22 API calls __fread_nolock 96397->96473 96400 ea2f3f 96398->96400 96456 ea3084 22 API calls 96400->96456 96401 ee2d5e 96474 ea3084 22 API calls 96401->96474 96404 ea2f4b 96457 ec4a28 40 API calls 3 library calls 96404->96457 96405 ee2d6d 96475 eaa8c7 22 API calls __fread_nolock 96405->96475 96407 ea2f59 96407->96381 96408 ea2f63 96407->96408 96458 ec4a28 40 API calls 3 library calls 96408->96458 96411 ee2d83 96476 ea3084 22 API calls 96411->96476 96412 ea2f6e 96412->96387 96414 ea2f78 96412->96414 96459 ec4a28 40 API calls 3 library calls 96414->96459 96416 ee2d90 96417 ea2f83 96417->96392 96418 ea2f8d 96417->96418 96460 ec4a28 40 API calls 3 library calls 96418->96460 96420 ea2f98 96421 ea2fdc 96420->96421 96461 ea3084 22 API calls 96420->96461 96421->96405 96422 ea2fe8 96421->96422 96422->96416 96464 ea63eb 22 API calls 96422->96464 96425 ea2fbf 96462 eaa8c7 22 API calls __fread_nolock 96425->96462 96426 ea2ff8 96465 ea6a50 22 API calls 96426->96465 96429 ea2fcd 96463 ea3084 22 API calls 96429->96463 96430 ea3006 96466 ea70b0 23 API calls 96430->96466 96435 ea3021 96436 ea3065 96435->96436 96467 ea6f88 22 API calls 96435->96467 96468 ea70b0 23 API calls 96435->96468 96469 ea3084 22 API calls 96435->96469 96439 ea4af0 __wsopen_s 96438->96439 96440 ea6b57 22 API calls 96439->96440 96441 ea4b22 96439->96441 96440->96441 96451 ea4b58 96441->96451 96477 ea4c6d 96441->96477 96443 ea9cb3 22 API calls 96446 ea4c52 96443->96446 96444 ea4c5e 96444->96363 96445 ea9cb3 22 API calls 96445->96451 96448 ea515f 22 API calls 96446->96448 96447 ea4c6d 22 API calls 96447->96451 96448->96444 96449 ea515f 22 API calls 96449->96451 96450 ea4c29 96450->96443 96450->96444 96451->96445 96451->96447 96451->96449 96451->96450 96452->96376 96453->96380 96454->96386 96455->96394 96456->96404 96457->96407 96458->96412 96459->96417 96460->96420 96461->96425 96462->96429 96463->96421 96464->96426 96465->96430 96466->96435 96467->96435 96468->96435 96469->96435 96470->96387 96471->96392 96472->96397 96473->96401 96474->96405 96475->96411 96476->96416 96478 eaaec9 22 API calls 96477->96478 96479 ea4c78 96478->96479 96479->96441

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 389 ea42de-ea434d call eaa961 GetVersionExW call ea6b57 394 ee3617-ee362a 389->394 395 ea4353 389->395 396 ee362b-ee362f 394->396 397 ea4355-ea4357 395->397 398 ee3632-ee363e 396->398 399 ee3631 396->399 400 ea435d-ea43bc call ea93b2 call ea37a0 397->400 401 ee3656 397->401 398->396 403 ee3640-ee3642 398->403 399->398 417 ee37df-ee37e6 400->417 418 ea43c2-ea43c4 400->418 406 ee365d-ee3660 401->406 403->397 405 ee3648-ee364f 403->405 405->394 410 ee3651 405->410 407 ea441b-ea4435 GetCurrentProcess IsWow64Process 406->407 408 ee3666-ee36a8 406->408 413 ea4437 407->413 414 ea4494-ea449a 407->414 408->407 411 ee36ae-ee36b1 408->411 410->401 415 ee36db-ee36e5 411->415 416 ee36b3-ee36bd 411->416 419 ea443d-ea4449 413->419 414->419 423 ee36f8-ee3702 415->423 424 ee36e7-ee36f3 415->424 420 ee36bf-ee36c5 416->420 421 ee36ca-ee36d6 416->421 425 ee37e8 417->425 426 ee3806-ee3809 417->426 418->406 422 ea43ca-ea43dd 418->422 427 ea444f-ea445e LoadLibraryA 419->427 428 ee3824-ee3828 GetSystemInfo 419->428 420->407 421->407 429 ee3726-ee372f 422->429 430 ea43e3-ea43e5 422->430 432 ee3704-ee3710 423->432 433 ee3715-ee3721 423->433 424->407 431 ee37ee 425->431 434 ee380b-ee381a 426->434 435 ee37f4-ee37fc 426->435 436 ea449c-ea44a6 GetSystemInfo 427->436 437 ea4460-ea446e GetProcAddress 427->437 441 ee373c-ee3748 429->441 442 ee3731-ee3737 429->442 439 ea43eb-ea43ee 430->439 440 ee374d-ee3762 430->440 431->435 432->407 433->407 434->431 443 ee381c-ee3822 434->443 435->426 438 ea4476-ea4478 436->438 437->436 444 ea4470-ea4474 GetNativeSystemInfo 437->444 445 ea447a-ea447b FreeLibrary 438->445 446 ea4481-ea4493 438->446 447 ea43f4-ea440f 439->447 448 ee3791-ee3794 439->448 449 ee376f-ee377b 440->449 450 ee3764-ee376a 440->450 441->407 442->407 443->435 444->438 445->446 452 ee3780-ee378c 447->452 453 ea4415 447->453 448->407 451 ee379a-ee37c1 448->451 449->407 450->407 454 ee37ce-ee37da 451->454 455 ee37c3-ee37c9 451->455 452->407 453->407 454->407 455->407
                        APIs
                        • GetVersionExW.KERNEL32(?), ref: 00EA430D
                          • Part of subcall function 00EA6B57: _wcslen.LIBCMT ref: 00EA6B6A
                        • GetCurrentProcess.KERNEL32(?,00F3CB64,00000000,?,?), ref: 00EA4422
                        • IsWow64Process.KERNEL32(00000000,?,?), ref: 00EA4429
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00EA4454
                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00EA4466
                        • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00EA4474
                        • FreeLibrary.KERNEL32(00000000,?,?), ref: 00EA447B
                        • GetSystemInfo.KERNEL32(?,?,?), ref: 00EA44A0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                        • String ID: GetNativeSystemInfo$kernel32.dll$|O
                        • API String ID: 3290436268-3101561225
                        • Opcode ID: 52fb222c1ff6f67c46f18e14e9d207a51fc737b24b02b108319ac548763c50f2
                        • Instruction ID: 73114500f9750f603b60b83a004b3be6959fd8d5facf4da0ebfcaddc43f47982
                        • Opcode Fuzzy Hash: 52fb222c1ff6f67c46f18e14e9d207a51fc737b24b02b108319ac548763c50f2
                        • Instruction Fuzzy Hash: B4A1C5B190A2CCCFC761CBBD7C455D57FA47B6A304B0464A9E08DB7AA2D260458CFB63

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 793 ea42a2-ea42ba CreateStreamOnHGlobal 794 ea42da-ea42dd 793->794 795 ea42bc-ea42d3 FindResourceExW 793->795 796 ea42d9 795->796 797 ee35ba-ee35c9 LoadResource 795->797 796->794 797->796 798 ee35cf-ee35dd SizeofResource 797->798 798->796 799 ee35e3-ee35ee LockResource 798->799 799->796 800 ee35f4-ee3612 799->800 800->796
                        APIs
                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00EA50AA,?,?,00000000,00000000), ref: 00EA42B2
                        • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00EA50AA,?,?,00000000,00000000), ref: 00EA42C9
                        • LoadResource.KERNEL32(?,00000000,?,?,00EA50AA,?,?,00000000,00000000,?,?,?,?,?,?,00EA4F20), ref: 00EE35BE
                        • SizeofResource.KERNEL32(?,00000000,?,?,00EA50AA,?,?,00000000,00000000,?,?,?,?,?,?,00EA4F20), ref: 00EE35D3
                        • LockResource.KERNEL32(00EA50AA,?,?,00EA50AA,?,?,00000000,00000000,?,?,?,?,?,?,00EA4F20,?), ref: 00EE35E6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                        • String ID: SCRIPT
                        • API String ID: 3051347437-3967369404
                        • Opcode ID: 6d56d221134b0f6d48e900864fb04bf477e2ed842927b9262d33d0e518d81b08
                        • Instruction ID: 094c4cb5d91ff575d9850664cde88779a9fd88e648df2474fc636556151c1bdd
                        • Opcode Fuzzy Hash: 6d56d221134b0f6d48e900864fb04bf477e2ed842927b9262d33d0e518d81b08
                        • Instruction Fuzzy Hash: 46117071240704BFD7219B65DC48F677BBAEFCAB65F104169F402AA2A0DBB1E8009770

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 918 f0dbbe-f0dbda lstrlenW 919 f0dc06 918->919 920 f0dbdc-f0dbe6 GetFileAttributesW 918->920 921 f0dc09-f0dc0d 919->921 920->921 922 f0dbe8-f0dbf7 FindFirstFileW 920->922 922->919 923 f0dbf9-f0dc04 FindClose 922->923 923->921
                        APIs
                        • lstrlenW.KERNEL32(?,"R), ref: 00F0DBCE
                        • GetFileAttributesW.KERNELBASE(?), ref: 00F0DBDD
                        • FindFirstFileW.KERNEL32(?,?), ref: 00F0DBEE
                        • FindClose.KERNEL32(00000000), ref: 00F0DBFA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: FileFind$AttributesCloseFirstlstrlen
                        • String ID: "R
                        • API String ID: 2695905019-1746183819
                        • Opcode ID: 8e6ad4b15884e4d7d236a50e28bfd0c7751eed1f62a7e2b69b8dd78eb618c24f
                        • Instruction ID: f15b8ce96120c9ee6a10fb8907dea7611805b9093ef3d3bb40630d5cf13f20de
                        • Opcode Fuzzy Hash: 8e6ad4b15884e4d7d236a50e28bfd0c7751eed1f62a7e2b69b8dd78eb618c24f
                        • Instruction Fuzzy Hash: C7F0E53181092857D2206BBCAC0D8AB3B6D9E01334B108702F836D20F0EBB09D54FBD5

                        Control-flow Graph

                        APIs
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00EA2B6B
                          • Part of subcall function 00EA3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00F71418,?,00EA2E7F,?,?,?,00000000), ref: 00EA3A78
                          • Part of subcall function 00EA9CB3: _wcslen.LIBCMT ref: 00EA9CBD
                        • GetForegroundWindow.USER32(runas,?,?,?,?,?,00F62224), ref: 00EE2C10
                        • ShellExecuteW.SHELL32(00000000,?,?,00F62224), ref: 00EE2C17
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                        • String ID: runas
                        • API String ID: 448630720-4000483414
                        • Opcode ID: e31d75553a095edbfb315131868af4de8c95bc5b8dad9b8b075c6977c999d18a
                        • Instruction ID: a27f7f5f39055bb9578025ae0a4c52cff12ea2edda320c660a8c0523a6929f2e
                        • Opcode Fuzzy Hash: e31d75553a095edbfb315131868af4de8c95bc5b8dad9b8b075c6977c999d18a
                        • Instruction Fuzzy Hash: 4111B4311083455BC704FF78D8519AEBBE4AB9B750F04742DF1467A0A3CF24A54DA753

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 971 ec4ce8-ec4cf4 call ed360c 974 ec4d16-ec4d22 call ec4d6d ExitProcess 971->974 975 ec4cf6-ec4d04 GetPEB 971->975 975->974 976 ec4d06-ec4d10 GetCurrentProcess TerminateProcess 975->976 976->974
                        APIs
                        • GetCurrentProcess.KERNEL32(00ED28E9,(,00EC4CBE,00000000,00F688B8,0000000C,00EC4E15,(,00000002,00000000,?,00ED28E9,00000003,00ED2DF7,?,?), ref: 00EC4D09
                        • TerminateProcess.KERNEL32(00000000,?,00ED28E9,00000003,00ED2DF7,?,?,?,00ECE6D1,?,00F68A48,00000010,00EA4F4A,?,?,00000000), ref: 00EC4D10
                        • ExitProcess.KERNEL32 ref: 00EC4D22
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Process$CurrentExitTerminate
                        • String ID: (
                        • API String ID: 1703294689-2063206799
                        • Opcode ID: fb549ba9ccef7b8851f50b15a3db905ef778c8737ac83709b23bceceb26a667f
                        • Instruction ID: 68ac227f120e925b6bbd685c2f65f573814da53e0d0e8a4d43e3dc5135d8c325
                        • Opcode Fuzzy Hash: fb549ba9ccef7b8851f50b15a3db905ef778c8737ac83709b23bceceb26a667f
                        • Instruction Fuzzy Hash: B4E0B6B1000148ABCF11BF64DE1AF983F6AEB417A5B105418FC16AA262CB36DD52EB80
                        APIs
                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00F0D501
                        • Process32FirstW.KERNEL32(00000000,?), ref: 00F0D50F
                        • Process32NextW.KERNEL32(00000000,?), ref: 00F0D52F
                        • CloseHandle.KERNELBASE(00000000), ref: 00F0D5DC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                        • String ID:
                        • API String ID: 420147892-0
                        • Opcode ID: 8d3aaea1b05578aad3524040092374f7c7e475649173a943ec97194dd0233b22
                        • Instruction ID: a0cc1427648608d71cc2ad754040f80c0be0c5c6fef9f9d18093f40461712d78
                        • Opcode Fuzzy Hash: 8d3aaea1b05578aad3524040092374f7c7e475649173a943ec97194dd0233b22
                        • Instruction Fuzzy Hash: D13181721083009FD304EF54CC81ABFBBE8EF9A354F14052DF581961A2EB71A945EB92

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 f2aff9-f2b056 call ec2340 3 f2b094-f2b098 0->3 4 f2b058-f2b06b call eab567 0->4 6 f2b09a-f2b0bb call eab567 * 2 3->6 7 f2b0dd-f2b0e0 3->7 12 f2b0c8 4->12 13 f2b06d-f2b092 call eab567 * 2 4->13 30 f2b0bf-f2b0c4 6->30 9 f2b0e2-f2b0e5 7->9 10 f2b0f5-f2b119 call ea7510 call ea7620 7->10 14 f2b0e8-f2b0ed call eab567 9->14 32 f2b1d8-f2b1e0 10->32 33 f2b11f-f2b178 call ea7510 call ea7620 call ea7510 call ea7620 call ea7510 call ea7620 10->33 17 f2b0cb-f2b0cf 12->17 13->30 14->10 22 f2b0d1-f2b0d7 17->22 23 f2b0d9-f2b0db 17->23 22->14 23->7 23->10 30->7 34 f2b0c6 30->34 35 f2b1e2-f2b1fd call ea7510 call ea7620 32->35 36 f2b20a-f2b238 GetCurrentDirectoryW call ebfe0b GetCurrentDirectoryW 32->36 82 f2b1a6-f2b1d6 GetSystemDirectoryW call ebfe0b GetSystemDirectoryW 33->82 83 f2b17a-f2b195 call ea7510 call ea7620 33->83 34->17 35->36 53 f2b1ff-f2b208 call ec4963 35->53 44 f2b23c 36->44 47 f2b240-f2b244 44->47 50 f2b246-f2b270 call ea9c6e * 3 47->50 51 f2b275-f2b285 call f100d9 47->51 50->51 64 f2b287-f2b289 51->64 65 f2b28b-f2b2e1 call f107c0 call f106e6 call f105a7 51->65 53->36 53->51 68 f2b2ee-f2b2f2 64->68 65->68 96 f2b2e3 65->96 70 f2b39a-f2b3be CreateProcessW 68->70 71 f2b2f8-f2b321 call f011c8 68->71 76 f2b3c1-f2b3d4 call ebfe14 * 2 70->76 87 f2b323-f2b328 call f01201 71->87 88 f2b32a call f014ce 71->88 101 f2b3d6-f2b3e8 76->101 102 f2b42f-f2b43d CloseHandle 76->102 82->44 83->82 110 f2b197-f2b1a0 call ec4963 83->110 100 f2b32f-f2b33c call ec4963 87->100 88->100 96->68 112 f2b347-f2b357 call ec4963 100->112 113 f2b33e-f2b345 100->113 108 f2b3ea 101->108 109 f2b3ed-f2b3fc 101->109 106 f2b43f-f2b444 102->106 107 f2b49c 102->107 114 f2b451-f2b456 106->114 115 f2b446-f2b44c CloseHandle 106->115 118 f2b4a0-f2b4a4 107->118 108->109 116 f2b401-f2b42a GetLastError call ea630c call eacfa0 109->116 117 f2b3fe 109->117 110->47 110->82 134 f2b362-f2b372 call ec4963 112->134 135 f2b359-f2b360 112->135 113->112 113->113 121 f2b463-f2b468 114->121 122 f2b458-f2b45e CloseHandle 114->122 115->114 132 f2b4e5-f2b4f6 call f10175 116->132 117->116 124 f2b4b2-f2b4bc 118->124 125 f2b4a6-f2b4b0 118->125 129 f2b475-f2b49a call f109d9 call f2b536 121->129 130 f2b46a-f2b470 CloseHandle 121->130 122->121 126 f2b4c4-f2b4e3 call eacfa0 CloseHandle 124->126 127 f2b4be 124->127 125->132 126->132 127->126 129->118 130->129 146 f2b374-f2b37b 134->146 147 f2b37d-f2b398 call ebfe14 * 3 134->147 135->134 135->135 146->146 146->147 147->76
                        APIs
                        • _wcslen.LIBCMT ref: 00F2B198
                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00F2B1B0
                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00F2B1D4
                        • _wcslen.LIBCMT ref: 00F2B200
                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00F2B214
                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00F2B236
                        • _wcslen.LIBCMT ref: 00F2B332
                          • Part of subcall function 00F105A7: GetStdHandle.KERNEL32(000000F6), ref: 00F105C6
                        • _wcslen.LIBCMT ref: 00F2B34B
                        • _wcslen.LIBCMT ref: 00F2B366
                        • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00F2B3B6
                        • GetLastError.KERNEL32(00000000), ref: 00F2B407
                        • CloseHandle.KERNEL32(?), ref: 00F2B439
                        • CloseHandle.KERNEL32(00000000), ref: 00F2B44A
                        • CloseHandle.KERNEL32(00000000), ref: 00F2B45C
                        • CloseHandle.KERNEL32(00000000), ref: 00F2B46E
                        • CloseHandle.KERNEL32(?), ref: 00F2B4E3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                        • String ID:
                        • API String ID: 2178637699-0
                        • Opcode ID: 43945287972f68125284e410b70bd343f22a7f3e0a3372f187ab379dcafe7635
                        • Instruction ID: 9c9014116e922cec42668ef8d23c78155df768690d3395e552db3cdad5be423f
                        • Opcode Fuzzy Hash: 43945287972f68125284e410b70bd343f22a7f3e0a3372f187ab379dcafe7635
                        • Instruction Fuzzy Hash: 25F19C319083509FC715EF24D891B6EBBE5AF89320F18855DF8959F2A2DB31EC40DB92
                        APIs
                        • GetInputState.USER32 ref: 00EAD807
                        • timeGetTime.WINMM ref: 00EADA07
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00EADB28
                        • TranslateMessage.USER32(?), ref: 00EADB7B
                        • DispatchMessageW.USER32(?), ref: 00EADB89
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00EADB9F
                        • Sleep.KERNEL32(0000000A), ref: 00EADBB1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                        • String ID:
                        • API String ID: 2189390790-0
                        • Opcode ID: 9e2f0cc268097751f6b0fe982e37a6ccb065ea3cd44887fb70551ccbbb4ff3e5
                        • Instruction ID: be64b69614ec5485444300429140c837f39e198009edf08107867fbe78f749a4
                        • Opcode Fuzzy Hash: 9e2f0cc268097751f6b0fe982e37a6ccb065ea3cd44887fb70551ccbbb4ff3e5
                        • Instruction Fuzzy Hash: 71422330608249DFD728CF24CC44BBAB7E0BF8A318F14655DE696AB691D770F844DB92

                        Control-flow Graph

                        APIs
                        • GetSysColorBrush.USER32(0000000F), ref: 00EA2D07
                        • RegisterClassExW.USER32(00000030), ref: 00EA2D31
                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00EA2D42
                        • InitCommonControlsEx.COMCTL32(?), ref: 00EA2D5F
                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00EA2D6F
                        • LoadIconW.USER32(000000A9), ref: 00EA2D85
                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00EA2D94
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                        • API String ID: 2914291525-1005189915
                        • Opcode ID: afc80eb5ff0e6db9c5c081e50a43b7b0d3eda52701427ab3edb3df06b1892404
                        • Instruction ID: 9354125a88e1e6f245eb30fd36899be62c898a2b02c80f8dcb6755e59a2b48cb
                        • Opcode Fuzzy Hash: afc80eb5ff0e6db9c5c081e50a43b7b0d3eda52701427ab3edb3df06b1892404
                        • Instruction Fuzzy Hash: 6021C5B591131DAFDB00DFA8E849BDDBBB5FB08710F00411AFA15B62A0D7B54584EFA1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 457 ee065b-ee068b call ee042f 460 ee068d-ee0698 call ecf2c6 457->460 461 ee06a6-ee06b2 call ed5221 457->461 466 ee069a-ee06a1 call ecf2d9 460->466 467 ee06cb-ee0714 call ee039a 461->467 468 ee06b4-ee06c9 call ecf2c6 call ecf2d9 461->468 478 ee097d-ee0983 466->478 476 ee0716-ee071f 467->476 477 ee0781-ee078a GetFileType 467->477 468->466 480 ee0756-ee077c GetLastError call ecf2a3 476->480 481 ee0721-ee0725 476->481 482 ee078c-ee07bd GetLastError call ecf2a3 CloseHandle 477->482 483 ee07d3-ee07d6 477->483 480->466 481->480 486 ee0727-ee0754 call ee039a 481->486 482->466 494 ee07c3-ee07ce call ecf2d9 482->494 484 ee07df-ee07e5 483->484 485 ee07d8-ee07dd 483->485 490 ee07e9-ee0837 call ed516a 484->490 491 ee07e7 484->491 485->490 486->477 486->480 500 ee0839-ee0845 call ee05ab 490->500 501 ee0847-ee086b call ee014d 490->501 491->490 494->466 500->501 508 ee086f-ee0879 call ed86ae 500->508 506 ee087e-ee08c1 501->506 507 ee086d 501->507 510 ee08e2-ee08f0 506->510 511 ee08c3-ee08c7 506->511 507->508 508->478 514 ee097b 510->514 515 ee08f6-ee08fa 510->515 511->510 513 ee08c9-ee08dd 511->513 513->510 514->478 515->514 516 ee08fc-ee092f CloseHandle call ee039a 515->516 519 ee0963-ee0977 516->519 520 ee0931-ee095d GetLastError call ecf2a3 call ed5333 516->520 519->514 520->519
                        APIs
                          • Part of subcall function 00EE039A: CreateFileW.KERNELBASE(00000000,00000000,?,00EE0704,?,?,00000000,?,00EE0704,00000000,0000000C), ref: 00EE03B7
                        • GetLastError.KERNEL32 ref: 00EE076F
                        • __dosmaperr.LIBCMT ref: 00EE0776
                        • GetFileType.KERNELBASE(00000000), ref: 00EE0782
                        • GetLastError.KERNEL32 ref: 00EE078C
                        • __dosmaperr.LIBCMT ref: 00EE0795
                        • CloseHandle.KERNEL32(00000000), ref: 00EE07B5
                        • CloseHandle.KERNEL32(?), ref: 00EE08FF
                        • GetLastError.KERNEL32 ref: 00EE0931
                        • __dosmaperr.LIBCMT ref: 00EE0938
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                        • String ID: H
                        • API String ID: 4237864984-2852464175
                        • Opcode ID: ba85f2a7c3c54eea0ee0601479cdc6f2bcf2b871ed5a756972f9773f61debacd
                        • Instruction ID: 1b989786eb26dc0f1b0f99206808a3ddd86cbc6cd43073ee87fdde3ba9743edd
                        • Opcode Fuzzy Hash: ba85f2a7c3c54eea0ee0601479cdc6f2bcf2b871ed5a756972f9773f61debacd
                        • Instruction Fuzzy Hash: D8A12532A001888FDF19AF68D851BAD7BE1EB46324F14115EF815BB2A1CB719C53DB91

                        Control-flow Graph

                        APIs
                          • Part of subcall function 00EA3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00F71418,?,00EA2E7F,?,?,?,00000000), ref: 00EA3A78
                          • Part of subcall function 00EA3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00EA3379
                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00EA356A
                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00EE318D
                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00EE31CE
                        • RegCloseKey.ADVAPI32(?), ref: 00EE3210
                        • _wcslen.LIBCMT ref: 00EE3277
                        • _wcslen.LIBCMT ref: 00EE3286
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                        • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                        • API String ID: 98802146-2727554177
                        • Opcode ID: a34093b27a10fd8d3b66f8e2437f7ce71ea708ba03d2edef2a8cf4575121178a
                        • Instruction ID: 186a5f1cc705f41a234d391f0518a69ebfb630c7684003052f8eae63e7b8f497
                        • Opcode Fuzzy Hash: a34093b27a10fd8d3b66f8e2437f7ce71ea708ba03d2edef2a8cf4575121178a
                        • Instruction Fuzzy Hash: 0E71C4714043089EC384DF65DC859ABBBE8FF89354F40142EF589A71A1DB74DA88DB52

                        Control-flow Graph

                        APIs
                        • GetSysColorBrush.USER32(0000000F), ref: 00EA2B8E
                        • LoadCursorW.USER32(00000000,00007F00), ref: 00EA2B9D
                        • LoadIconW.USER32(00000063), ref: 00EA2BB3
                        • LoadIconW.USER32(000000A4), ref: 00EA2BC5
                        • LoadIconW.USER32(000000A2), ref: 00EA2BD7
                        • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00EA2BEF
                        • RegisterClassExW.USER32(?), ref: 00EA2C40
                          • Part of subcall function 00EA2CD4: GetSysColorBrush.USER32(0000000F), ref: 00EA2D07
                          • Part of subcall function 00EA2CD4: RegisterClassExW.USER32(00000030), ref: 00EA2D31
                          • Part of subcall function 00EA2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00EA2D42
                          • Part of subcall function 00EA2CD4: InitCommonControlsEx.COMCTL32(?), ref: 00EA2D5F
                          • Part of subcall function 00EA2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00EA2D6F
                          • Part of subcall function 00EA2CD4: LoadIconW.USER32(000000A9), ref: 00EA2D85
                          • Part of subcall function 00EA2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00EA2D94
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                        • String ID: #$0$AutoIt v3
                        • API String ID: 423443420-4155596026
                        • Opcode ID: d601743a7dc4a2da95b10c77398c4a8c0ab3492f3f8ce38009c538ada2e56ae9
                        • Instruction ID: 0e42dcb8054bcf381f01be5c171e55be7cf44dd9be9965179e5ad8a5114a561d
                        • Opcode Fuzzy Hash: d601743a7dc4a2da95b10c77398c4a8c0ab3492f3f8ce38009c538ada2e56ae9
                        • Instruction Fuzzy Hash: 34214971E0031CABDB509FA9EC45BAA7FB5FB48B50F00001AF608B66A0D3B11588EF91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 598 ea3170-ea3185 599 ea3187-ea318a 598->599 600 ea31e5-ea31e7 598->600 601 ea31eb 599->601 602 ea318c-ea3193 599->602 600->599 603 ea31e9 600->603 605 ee2dfb-ee2e23 call ea18e2 call ebe499 601->605 606 ea31f1-ea31f6 601->606 607 ea3199-ea319e 602->607 608 ea3265-ea326d PostQuitMessage 602->608 604 ea31d0-ea31d8 DefWindowProcW 603->604 614 ea31de-ea31e4 604->614 644 ee2e28-ee2e2f 605->644 609 ea31f8-ea31fb 606->609 610 ea321d-ea3244 SetTimer RegisterWindowMessageW 606->610 612 ee2e7c-ee2e90 call f0bf30 607->612 613 ea31a4-ea31a8 607->613 615 ea3219-ea321b 608->615 616 ee2d9c-ee2d9f 609->616 617 ea3201-ea320f KillTimer call ea30f2 609->617 610->615 619 ea3246-ea3251 CreatePopupMenu 610->619 612->615 639 ee2e96 612->639 620 ea31ae-ea31b3 613->620 621 ee2e68-ee2e77 call f0c161 613->621 615->614 629 ee2dd7-ee2df6 MoveWindow 616->629 630 ee2da1-ee2da5 616->630 634 ea3214 call ea3c50 617->634 619->615 626 ee2e4d-ee2e54 620->626 627 ea31b9-ea31be 620->627 621->615 626->604 633 ee2e5a-ee2e63 call f00ad7 626->633 637 ea3253-ea3263 call ea326f 627->637 638 ea31c4-ea31ca 627->638 629->615 631 ee2dc6-ee2dd2 SetFocus 630->631 632 ee2da7-ee2daa 630->632 631->615 632->638 640 ee2db0-ee2dc1 call ea18e2 632->640 633->604 634->615 637->615 638->604 638->644 639->604 640->615 644->604 648 ee2e35-ee2e48 call ea30f2 call ea3837 644->648 648->604
                        APIs
                        • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00EA316A,?,?), ref: 00EA31D8
                        • KillTimer.USER32(?,00000001,?,?,?,?,?,00EA316A,?,?), ref: 00EA3204
                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00EA3227
                        • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00EA316A,?,?), ref: 00EA3232
                        • CreatePopupMenu.USER32 ref: 00EA3246
                        • PostQuitMessage.USER32(00000000), ref: 00EA3267
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                        • String ID: TaskbarCreated
                        • API String ID: 129472671-2362178303
                        • Opcode ID: b3cd77c9338730b3b55a2f1083161b789120ef2fd4537b866d8ce4f37d73622a
                        • Instruction ID: dfdcc526ff83d00786e806abe667e319703568d9c18aa4e9fd8eba0136fd4b32
                        • Opcode Fuzzy Hash: b3cd77c9338730b3b55a2f1083161b789120ef2fd4537b866d8ce4f37d73622a
                        • Instruction Fuzzy Hash: F0412B31244208ABDB141F7C9C0EBB93659FB4F354F04611AFA06BE1B2C775AA44B7B2

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 654 ea1410-ea1449 655 ea144f-ea1465 mciSendStringW 654->655 656 ee24b8-ee24b9 DestroyWindow 654->656 657 ea146b-ea1473 655->657 658 ea16c6-ea16d3 655->658 661 ee24c4-ee24d1 656->661 657->661 662 ea1479-ea1488 call ea182e 657->662 659 ea16f8-ea16ff 658->659 660 ea16d5-ea16f0 UnregisterHotKey 658->660 659->657 665 ea1705 659->665 660->659 664 ea16f2-ea16f3 call ea10d0 660->664 666 ee24d3-ee24d6 661->666 667 ee2500-ee2507 661->667 673 ee250e-ee251a 662->673 674 ea148e-ea1496 662->674 664->659 665->658 671 ee24d8-ee24e0 call ea6246 666->671 672 ee24e2-ee24e5 FindClose 666->672 667->661 670 ee2509 667->670 670->673 675 ee24eb-ee24f8 671->675 672->675 681 ee251c-ee251e FreeLibrary 673->681 682 ee2524-ee252b 673->682 678 ea149c-ea14c1 call eacfa0 674->678 679 ee2532-ee253f 674->679 675->667 680 ee24fa-ee24fb call f132b1 675->680 692 ea14f8-ea1503 CoUninitialize 678->692 693 ea14c3 678->693 686 ee2566-ee256d 679->686 687 ee2541-ee255e VirtualFree 679->687 680->667 681->682 682->673 685 ee252d 682->685 685->679 686->679 688 ee256f 686->688 687->686 690 ee2560-ee2561 call f13317 687->690 694 ee2574-ee2578 688->694 690->686 692->694 696 ea1509-ea150e 692->696 695 ea14c6-ea14f6 call ea1a05 call ea19ae 693->695 694->696 697 ee257e-ee2584 694->697 695->692 699 ee2589-ee2596 call f132eb 696->699 700 ea1514-ea151e 696->700 697->696 713 ee2598 699->713 703 ea1707-ea1714 call ebf80e 700->703 704 ea1524-ea15a5 call ea988f call ea1944 call ea17d5 call ebfe14 call ea177c call ea988f call eacfa0 call ea17fe call ebfe14 700->704 703->704 715 ea171a 703->715 717 ee259d-ee25bf call ebfdcd 704->717 743 ea15ab-ea15cf call ebfe14 704->743 713->717 715->703 722 ee25c1 717->722 725 ee25c6-ee25e8 call ebfdcd 722->725 731 ee25ea 725->731 734 ee25ef-ee2611 call ebfdcd 731->734 741 ee2613 734->741 744 ee2618-ee2625 call f064d4 741->744 743->725 749 ea15d5-ea15f9 call ebfe14 743->749 750 ee2627 744->750 749->734 755 ea15ff-ea1619 call ebfe14 749->755 752 ee262c-ee2639 call ebac64 750->752 758 ee263b 752->758 755->744 760 ea161f-ea1643 call ea17d5 call ebfe14 755->760 761 ee2640-ee264d call f13245 758->761 760->752 769 ea1649-ea1651 760->769 767 ee264f 761->767 771 ee2654-ee2661 call f132cc 767->771 769->761 770 ea1657-ea1675 call ea988f call ea190a 769->770 770->771 780 ea167b-ea1689 770->780 777 ee2663 771->777 779 ee2668-ee2675 call f132cc 777->779 785 ee2677 779->785 780->779 782 ea168f-ea16c5 call ea988f * 3 call ea1876 780->782 785->785
                        APIs
                        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00EA1459
                        • CoUninitialize.COMBASE ref: 00EA14F8
                        • UnregisterHotKey.USER32(?), ref: 00EA16DD
                        • DestroyWindow.USER32(?), ref: 00EE24B9
                        • FreeLibrary.KERNEL32(?), ref: 00EE251E
                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00EE254B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                        • String ID: close all
                        • API String ID: 469580280-3243417748
                        • Opcode ID: f2afb57155df216e745155b793a09b89f13901a42ef31da9e822829557badbf6
                        • Instruction ID: b0e3541f7c2db64ac508a971d4710a69bbbe79628b4a69dcf4071ffab72c205d
                        • Opcode Fuzzy Hash: f2afb57155df216e745155b793a09b89f13901a42ef31da9e822829557badbf6
                        • Instruction Fuzzy Hash: 4FD19931701212CFCB19EF15C995A69F7A4BF0A314F1562ADE54ABB252CB30AD12CF91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 803 ea2c63-ea2cd3 CreateWindowExW * 2 ShowWindow * 2
                        APIs
                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00EA2C91
                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00EA2CB2
                        • ShowWindow.USER32(00000000,?,?,?,?,?,?,00EA1CAD,?), ref: 00EA2CC6
                        • ShowWindow.USER32(00000000,?,?,?,?,?,?,00EA1CAD,?), ref: 00EA2CCF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Window$CreateShow
                        • String ID: AutoIt v3$edit
                        • API String ID: 1584632944-3779509399
                        • Opcode ID: a535e03b8789d8a62dde5dffdcebe210b534a9ac0707b643caac2799d3da93ef
                        • Instruction ID: 2b65a4206f5efeb03b486d3be09b874c73c070a723991227a8ecac81f3966f9f
                        • Opcode Fuzzy Hash: a535e03b8789d8a62dde5dffdcebe210b534a9ac0707b643caac2799d3da93ef
                        • Instruction Fuzzy Hash: D2F0DA755503987AEB71172BAC09E773EBDE7C6F60F01405AF908A35A0C6621894FAB2

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 960 ea3b1c-ea3b27 961 ea3b99-ea3b9b 960->961 962 ea3b29-ea3b2e 960->962 963 ea3b8c-ea3b8f 961->963 962->961 964 ea3b30-ea3b48 RegOpenKeyExW 962->964 964->961 965 ea3b4a-ea3b69 RegQueryValueExW 964->965 966 ea3b6b-ea3b76 965->966 967 ea3b80-ea3b8b RegCloseKey 965->967 968 ea3b78-ea3b7a 966->968 969 ea3b90-ea3b97 966->969 967->963 970 ea3b7e 968->970 969->970 970->967
                        APIs
                        • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00EA3B0F,SwapMouseButtons,00000004,?), ref: 00EA3B40
                        • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00EA3B0F,SwapMouseButtons,00000004,?), ref: 00EA3B61
                        • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00EA3B0F,SwapMouseButtons,00000004,?), ref: 00EA3B83
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CloseOpenQueryValue
                        • String ID: Control Panel\Mouse
                        • API String ID: 3677997916-824357125
                        • Opcode ID: 8091711acc99f8f9dfdedcf49d2fec4eeb16625e26c5c05e34bc8cdfae35f64b
                        • Instruction ID: 7b01833dac205a90451cad56395c7d7c90211f93385338ff988e2af590436f9a
                        • Opcode Fuzzy Hash: 8091711acc99f8f9dfdedcf49d2fec4eeb16625e26c5c05e34bc8cdfae35f64b
                        • Instruction Fuzzy Hash: A9112AB5511208FFDB208FA5DC85AEEBBBAEF09754B105459B805EB110D331AE40A7A0
                        APIs
                        • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00EE33A2
                          • Part of subcall function 00EA6B57: _wcslen.LIBCMT ref: 00EA6B6A
                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00EA3A04
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: IconLoadNotifyShell_String_wcslen
                        • String ID: Line:
                        • API String ID: 2289894680-1585850449
                        • Opcode ID: 2a7ebd117bc6aca8f712aae5683b2c40690d3fe545387fc04e3c4cc2bd3f9173
                        • Instruction ID: 39f1a8e10764cd41c9fdb05609a6dc2bda2f6abf68cd08332a266895644f6019
                        • Opcode Fuzzy Hash: 2a7ebd117bc6aca8f712aae5683b2c40690d3fe545387fc04e3c4cc2bd3f9173
                        • Instruction Fuzzy Hash: 88310571408304AEC720EB24DC46FDBB7E8AB8A314F00652EF499A7091DB70A648C7D3
                        APIs
                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00EC0668
                          • Part of subcall function 00EC32A4: RaiseException.KERNEL32(?,?,?,00EC068A,?,00F71444,?,?,?,?,?,?,00EC068A,00EA1129,00F68738,00EA1129), ref: 00EC3304
                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00EC0685
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Exception@8Throw$ExceptionRaise
                        • String ID: Unknown exception
                        • API String ID: 3476068407-410509341
                        • Opcode ID: 421123d35825fe48d83982204f91b7e1b47cb03f66e345a20cdee1be445496c0
                        • Instruction ID: 08854de13aa5f1b039e85d6196d9358a94ef5b968fe6ffa395808d93a1a608a2
                        • Opcode Fuzzy Hash: 421123d35825fe48d83982204f91b7e1b47cb03f66e345a20cdee1be445496c0
                        • Instruction Fuzzy Hash: BEF0A434900209B78F14BA64ED56E9E77AC5E00354B605539F814B55A1EF73DA278581
                        APIs
                          • Part of subcall function 00EA1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00EA1BF4
                          • Part of subcall function 00EA1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00EA1BFC
                          • Part of subcall function 00EA1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00EA1C07
                          • Part of subcall function 00EA1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00EA1C12
                          • Part of subcall function 00EA1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00EA1C1A
                          • Part of subcall function 00EA1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00EA1C22
                          • Part of subcall function 00EA1B4A: RegisterWindowMessageW.USER32(00000004,?,00EA12C4), ref: 00EA1BA2
                        • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00EA136A
                        • OleInitialize.OLE32 ref: 00EA1388
                        • CloseHandle.KERNEL32(00000000,00000000), ref: 00EE24AB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                        • String ID:
                        • API String ID: 1986988660-0
                        • Opcode ID: 88b7a98e033e5fe2676d23af0c8636a744e43b7fd60075acf6b28da1d568211e
                        • Instruction ID: add6c8036fa5fc2a1749366811bf1c564788cbd87c0cdcb8444f082c9c589db7
                        • Opcode Fuzzy Hash: 88b7a98e033e5fe2676d23af0c8636a744e43b7fd60075acf6b28da1d568211e
                        • Instruction Fuzzy Hash: 1271BCB49112088EC388DF7DAD466553AE5BB8A354719926ED00EEB262EB30448DFF53
                        APIs
                        • CloseHandle.KERNELBASE(00000000,00000000,?,?,00ED85CC,?,00F68CC8,0000000C), ref: 00ED8704
                        • GetLastError.KERNEL32(?,00ED85CC,?,00F68CC8,0000000C), ref: 00ED870E
                        • __dosmaperr.LIBCMT ref: 00ED8739
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CloseErrorHandleLast__dosmaperr
                        • String ID:
                        • API String ID: 2583163307-0
                        • Opcode ID: 73e7653b0d6c6e2bee8e01b1e2b632b5ef87073ef1556a0dea99b8a8f20a7460
                        • Instruction ID: 9c0d51c1cd843daba615f8d77d8140aaa960c27110cf87ec83d96814c3e92568
                        • Opcode Fuzzy Hash: 73e7653b0d6c6e2bee8e01b1e2b632b5ef87073ef1556a0dea99b8a8f20a7460
                        • Instruction Fuzzy Hash: 64012F3360556026D62466345A45B7E6B85CB8177CF35311BF828FB3D2DD62CC839590
                        APIs
                        • __Init_thread_footer.LIBCMT ref: 00EB17F6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Init_thread_footer
                        • String ID: CALL
                        • API String ID: 1385522511-4196123274
                        • Opcode ID: 13b9cddaf07f9f796f73dfd7f1f935a185feab18c8286dea09bab34f8fba61dc
                        • Instruction ID: ad90bb46b3ffe2cbe34e5c48ee58ea111e9af0bba2a6683ad2e6850c0bd5e171
                        • Opcode Fuzzy Hash: 13b9cddaf07f9f796f73dfd7f1f935a185feab18c8286dea09bab34f8fba61dc
                        • Instruction Fuzzy Hash: 9222AC706083419FC714DF14C890AABBBF1BF85324F5899ADF596AB261D731E845CB82
                        APIs
                        • GetOpenFileNameW.COMDLG32(?), ref: 00EE2C8C
                          • Part of subcall function 00EA3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00EA3A97,?,?,00EA2E7F,?,?,?,00000000), ref: 00EA3AC2
                          • Part of subcall function 00EA2DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00EA2DC4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Name$Path$FileFullLongOpen
                        • String ID: X
                        • API String ID: 779396738-3081909835
                        • Opcode ID: a9870ee8aff57bcf535317080d1ec57d0241d56e4f4ed00ddbb14e69e64b45d1
                        • Instruction ID: 9c7698a4e70a4ee18045df35ffb8783c87cb332c1604ea38a803e92fff8451b2
                        • Opcode Fuzzy Hash: a9870ee8aff57bcf535317080d1ec57d0241d56e4f4ed00ddbb14e69e64b45d1
                        • Instruction Fuzzy Hash: 46219371A0029C9BDB01DF98C845BEE7BFDAF4D314F009059E505FB241DBB46A899BA1
                        APIs
                        • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00EA3908
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: IconNotifyShell_
                        • String ID:
                        • API String ID: 1144537725-0
                        • Opcode ID: fa4b0d5ed231bcf533372b359eb9a64ef3979f1e3e7ae982d81539a0dcd2e040
                        • Instruction ID: 1abbff5c4bc46c6b64debf2811d05b34437c1c09fd5f1e32e77af2736ee992b7
                        • Opcode Fuzzy Hash: fa4b0d5ed231bcf533372b359eb9a64ef3979f1e3e7ae982d81539a0dcd2e040
                        • Instruction Fuzzy Hash: 0931C370504305DFD360DF38D885797BBE8FB49708F00092EF599A7280E775AA48DB52
                        APIs
                          • Part of subcall function 00EA4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00EA4EDD,?,00F71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00EA4E9C
                          • Part of subcall function 00EA4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00EA4EAE
                          • Part of subcall function 00EA4E90: FreeLibrary.KERNEL32(00000000,?,?,00EA4EDD,?,00F71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00EA4EC0
                        • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00F71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00EA4EFD
                          • Part of subcall function 00EA4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00EE3CDE,?,00F71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00EA4E62
                          • Part of subcall function 00EA4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00EA4E74
                          • Part of subcall function 00EA4E59: FreeLibrary.KERNEL32(00000000,?,?,00EE3CDE,?,00F71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00EA4E87
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Library$Load$AddressFreeProc
                        • String ID:
                        • API String ID: 2632591731-0
                        • Opcode ID: 8d089c0c2f93957036b1be51718836da7365e0d68a2264b9c0cce6257fdf2d45
                        • Instruction ID: 461a9bc6371584c11297a8965ebb072138cf5093b36ee721458e1c3459b773b9
                        • Opcode Fuzzy Hash: 8d089c0c2f93957036b1be51718836da7365e0d68a2264b9c0cce6257fdf2d45
                        • Instruction Fuzzy Hash: F7110472700205AACB14AB60DC02FAD77E59F89710F20A42DF452BE1C1DEB0FA059750
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: __wsopen_s
                        • String ID:
                        • API String ID: 3347428461-0
                        • Opcode ID: f3461761c3ca1bc5ba08cb4ff2e5619135b3847d6324514cda0d7f899d62b4ec
                        • Instruction ID: abaac1c86b2e233ff21083e260177502fd18f388812b52ccd867e04ce2d26608
                        • Opcode Fuzzy Hash: f3461761c3ca1bc5ba08cb4ff2e5619135b3847d6324514cda0d7f899d62b4ec
                        • Instruction Fuzzy Hash: 3F11187590410AAFCB05DF58EA41A9E7BF5EF48314F10405AF818AB312DB31EA12CBA5
                        APIs
                          • Part of subcall function 00ED4C7D: RtlAllocateHeap.NTDLL(00000008,00EA1129,00000000,?,00ED2E29,00000001,00000364,?,?,?,00ECF2DE,00ED3863,00F71444,?,00EBFDF5,?), ref: 00ED4CBE
                        • _free.LIBCMT ref: 00ED506C
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: AllocateHeap_free
                        • String ID:
                        • API String ID: 614378929-0
                        • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                        • Instruction ID: 3d09acc89a84af2ab242ab42cdf8f514828f66ecb44e62779b38096f60e873a1
                        • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                        • Instruction Fuzzy Hash: A40126732047046BE3218E659881A9AFBECFB89370F25051EE194A33C0EA30A906C6B4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                        • Instruction ID: a49ce2daa9afb19ccbccc4f07fe70f14d7bb9467f02f2646a56c047445711b05
                        • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                        • Instruction Fuzzy Hash: 86F0D132521A1496D6312A798E05F9E33DCDFA2334F10272EF521B23D2DA76A80386A5
                        APIs
                        • RtlAllocateHeap.NTDLL(00000008,00EA1129,00000000,?,00ED2E29,00000001,00000364,?,?,?,00ECF2DE,00ED3863,00F71444,?,00EBFDF5,?), ref: 00ED4CBE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: d515ad21747ac3242b598dc52278fc61776403ca765bdfc17007cda9873c4c23
                        • Instruction ID: 57bb4a6b47a73bb141f3aeb1556e5e8ae3c57cd5028ebf05f6d4364ef79c431d
                        • Opcode Fuzzy Hash: d515ad21747ac3242b598dc52278fc61776403ca765bdfc17007cda9873c4c23
                        • Instruction Fuzzy Hash: 94F02B7121212467FB201F229D05F5AB7C9FF60364B186117F805BA3C0CA31D80352D0
                        APIs
                        • RtlAllocateHeap.NTDLL(00000000,?,00F71444,?,00EBFDF5,?,?,00EAA976,00000010,00F71440,00EA13FC,?,00EA13C6,?,00EA1129), ref: 00ED3852
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: a56980567ab6cbce84cf7c4e647d655203acb458658646689c8019156d1d2738
                        • Instruction ID: 4591976ebd2e89c8b24f8a67f5de41dd73009cf31e5e8d58bc553b2057ef24fb
                        • Opcode Fuzzy Hash: a56980567ab6cbce84cf7c4e647d655203acb458658646689c8019156d1d2738
                        • Instruction Fuzzy Hash: 52E0E5391002245AD62926779D00FDA36CAEB427B4F192226BC04B66D1CB61DD03B2E3
                        APIs
                        • FreeLibrary.KERNEL32(?,?,00F71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00EA4F6D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: FreeLibrary
                        • String ID:
                        • API String ID: 3664257935-0
                        • Opcode ID: 64505ead8726326bdd11e0aed4c98931d463c1fc97fb28335a111b6232835284
                        • Instruction ID: cad6722e18ed7e868a0fa231dd8bba0a9aa8c1b3f563b3308fd93ea9b14bdf31
                        • Opcode Fuzzy Hash: 64505ead8726326bdd11e0aed4c98931d463c1fc97fb28335a111b6232835284
                        • Instruction Fuzzy Hash: 30F0A0B5205341CFCB349F20D490812B7E0BF49329320B97EE1DAA6650C7B1A844EF40
                        APIs
                        • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00EA314E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: IconNotifyShell_
                        • String ID:
                        • API String ID: 1144537725-0
                        • Opcode ID: 6aeda5f8d0243faf2f04f574f1183f2789d15111acbe9c24c8ca5c5ab34601c5
                        • Instruction ID: ce3fb6ab84f0dbf2bb350304e7a1b9b9febbbbf46d0cb443692dd5e3467557b4
                        • Opcode Fuzzy Hash: 6aeda5f8d0243faf2f04f574f1183f2789d15111acbe9c24c8ca5c5ab34601c5
                        • Instruction Fuzzy Hash: C7F012709143589FE7929B28DC4A7957AACB705708F0001E9A648A6192DB755788CB52
                        APIs
                        • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00EA2DC4
                          • Part of subcall function 00EA6B57: _wcslen.LIBCMT ref: 00EA6B6A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: LongNamePath_wcslen
                        • String ID:
                        • API String ID: 541455249-0
                        • Opcode ID: f6eb9d23f6ba06b70904a0fe381a795ccaeb921586b48e5aa530a533c70dcf27
                        • Instruction ID: d9847ed1bb5c70a4e488e3820dec22899dd5ea4895012d517fe95c81f85cd09b
                        • Opcode Fuzzy Hash: f6eb9d23f6ba06b70904a0fe381a795ccaeb921586b48e5aa530a533c70dcf27
                        • Instruction Fuzzy Hash: C8E0CD726001285BC71192589C05FDA77DDDFC9790F0500B1FD09F7248D970ED80C690
                        APIs
                          • Part of subcall function 00EA3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00EA3908
                          • Part of subcall function 00EAD739: GetInputState.USER32 ref: 00EAD807
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00EA2B6B
                          • Part of subcall function 00EA30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 00EA314E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: IconNotifyShell_$CurrentDirectoryInputState
                        • String ID:
                        • API String ID: 3667716007-0
                        • Opcode ID: ac8de7c3d659854217439e3a64a49b897c9c1d79dc2f52170d41356aabdac27b
                        • Instruction ID: 89521882a3be2057737f3dac6f0fe50e1aaea49c7683d48eb31682633199ea78
                        • Opcode Fuzzy Hash: ac8de7c3d659854217439e3a64a49b897c9c1d79dc2f52170d41356aabdac27b
                        • Instruction Fuzzy Hash: B3E0862230424807C608BB78A85657DB7D99BDB355F40757EF147BB1A3CE2865494352
                        APIs
                        • CreateFileW.KERNELBASE(00000000,00000000,?,00EE0704,?,?,00000000,?,00EE0704,00000000,0000000C), ref: 00EE03B7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CreateFile
                        • String ID:
                        • API String ID: 823142352-0
                        • Opcode ID: aa6679e59f0b40e464f4fbfe40347118900eaa99518eb85d30a474505b194105
                        • Instruction ID: 205c026550611a92a340b82b74c8948039651bcebcf61e0719744da6f8fccff1
                        • Opcode Fuzzy Hash: aa6679e59f0b40e464f4fbfe40347118900eaa99518eb85d30a474505b194105
                        • Instruction Fuzzy Hash: 75D06C3204010DBBDF029F84DD06EDA3BAAFB48714F014000BE1866020C732E821AB90
                        APIs
                        • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00EA1CBC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: InfoParametersSystem
                        • String ID:
                        • API String ID: 3098949447-0
                        • Opcode ID: d4a5c1507a6f8f78955bc7d2256af2624824caf9ebe6d44546fc0851cde5739d
                        • Instruction ID: adde5871139982f6ef12cc0357b733b9b58203430b7f2ca7c3e8292178caf8ae
                        • Opcode Fuzzy Hash: d4a5c1507a6f8f78955bc7d2256af2624824caf9ebe6d44546fc0851cde5739d
                        • Instruction Fuzzy Hash: 03C0923628030CEFF2948B94BC4AF107765B348B10F088001F64DA95E3C7A228A0FBA2
                        APIs
                          • Part of subcall function 00EB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00EB9BB2
                        • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00F3961A
                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00F3965B
                        • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00F3969F
                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00F396C9
                        • SendMessageW.USER32 ref: 00F396F2
                        • GetKeyState.USER32(00000011), ref: 00F3978B
                        • GetKeyState.USER32(00000009), ref: 00F39798
                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00F397AE
                        • GetKeyState.USER32(00000010), ref: 00F397B8
                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00F397E9
                        • SendMessageW.USER32 ref: 00F39810
                        • SendMessageW.USER32(?,00001030,?,00F37E95), ref: 00F39918
                        • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00F3992E
                        • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00F39941
                        • SetCapture.USER32(?), ref: 00F3994A
                        • ClientToScreen.USER32(?,?), ref: 00F399AF
                        • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00F399BC
                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00F399D6
                        • ReleaseCapture.USER32 ref: 00F399E1
                        • GetCursorPos.USER32(?), ref: 00F39A19
                        • ScreenToClient.USER32(?,?), ref: 00F39A26
                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00F39A80
                        • SendMessageW.USER32 ref: 00F39AAE
                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00F39AEB
                        • SendMessageW.USER32 ref: 00F39B1A
                        • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00F39B3B
                        • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00F39B4A
                        • GetCursorPos.USER32(?), ref: 00F39B68
                        • ScreenToClient.USER32(?,?), ref: 00F39B75
                        • GetParent.USER32(?), ref: 00F39B93
                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00F39BFA
                        • SendMessageW.USER32 ref: 00F39C2B
                        • ClientToScreen.USER32(?,?), ref: 00F39C84
                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00F39CB4
                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00F39CDE
                        • SendMessageW.USER32 ref: 00F39D01
                        • ClientToScreen.USER32(?,?), ref: 00F39D4E
                        • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00F39D82
                          • Part of subcall function 00EB9944: GetWindowLongW.USER32(?,000000EB), ref: 00EB9952
                        • GetWindowLongW.USER32(?,000000F0), ref: 00F39E05
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                        • String ID: @GUI_DRAGID$F
                        • API String ID: 3429851547-4164748364
                        • Opcode ID: 0b8a86eb066642cfa93452f5b040b87b2c893c824afb3fdf97bed9a0b11cbf91
                        • Instruction ID: 7da03a9ab10d4f1df54a62cd71a7fbe74e224323b1edee3759dec9cf4c3c67f9
                        • Opcode Fuzzy Hash: 0b8a86eb066642cfa93452f5b040b87b2c893c824afb3fdf97bed9a0b11cbf91
                        • Instruction Fuzzy Hash: DF42BC31609205AFD720CF28CC45FAABBE5FF49330F140619F699972A1D7B1E854EB92
                        APIs
                        • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00F348F3
                        • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00F34908
                        • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00F34927
                        • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00F3494B
                        • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00F3495C
                        • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00F3497B
                        • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00F349AE
                        • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00F349D4
                        • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00F34A0F
                        • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00F34A56
                        • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00F34A7E
                        • IsMenu.USER32(?), ref: 00F34A97
                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F34AF2
                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F34B20
                        • GetWindowLongW.USER32(?,000000F0), ref: 00F34B94
                        • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00F34BE3
                        • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00F34C82
                        • wsprintfW.USER32 ref: 00F34CAE
                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00F34CC9
                        • GetWindowTextW.USER32(?,00000000,00000001), ref: 00F34CF1
                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00F34D13
                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00F34D33
                        • GetWindowTextW.USER32(?,00000000,00000001), ref: 00F34D5A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                        • String ID: %d/%02d/%02d
                        • API String ID: 4054740463-328681919
                        • Opcode ID: 76a60ad2469c86387282192a65712ef79accfa74ba184c7b6145b0ea510efde6
                        • Instruction ID: 3d6b07e59f655f6da3d98901d12699abac57390591c2fffa5f25c401c891bf32
                        • Opcode Fuzzy Hash: 76a60ad2469c86387282192a65712ef79accfa74ba184c7b6145b0ea510efde6
                        • Instruction Fuzzy Hash: 6512BF71A00218ABEB258F24CC49FAE7BE9AF45730F144129F519EB2E1DB74B941EB50
                        APIs
                        • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 00EBF998
                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00EFF474
                        • IsIconic.USER32(00000000), ref: 00EFF47D
                        • ShowWindow.USER32(00000000,00000009), ref: 00EFF48A
                        • SetForegroundWindow.USER32(00000000), ref: 00EFF494
                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00EFF4AA
                        • GetCurrentThreadId.KERNEL32 ref: 00EFF4B1
                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00EFF4BD
                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 00EFF4CE
                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 00EFF4D6
                        • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 00EFF4DE
                        • SetForegroundWindow.USER32(00000000), ref: 00EFF4E1
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00EFF4F6
                        • keybd_event.USER32(00000012,00000000), ref: 00EFF501
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00EFF50B
                        • keybd_event.USER32(00000012,00000000), ref: 00EFF510
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00EFF519
                        • keybd_event.USER32(00000012,00000000), ref: 00EFF51E
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00EFF528
                        • keybd_event.USER32(00000012,00000000), ref: 00EFF52D
                        • SetForegroundWindow.USER32(00000000), ref: 00EFF530
                        • AttachThreadInput.USER32(?,000000FF,00000000), ref: 00EFF557
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                        • String ID: Shell_TrayWnd
                        • API String ID: 4125248594-2988720461
                        • Opcode ID: e1ca9d8004315e5759fb2ccc3e308f4c7759d5c281f5cca7907347a32a51ba4a
                        • Instruction ID: 306b7b922e1059f47c42643cb520f07ad209d1638ec067cc87ecf1187089cc86
                        • Opcode Fuzzy Hash: e1ca9d8004315e5759fb2ccc3e308f4c7759d5c281f5cca7907347a32a51ba4a
                        • Instruction Fuzzy Hash: 66313D71A4021CBAEB206BB55C4AFBF7E6DEF44B60F141066FA05F61D1C6B19D00ABA0
                        APIs
                          • Part of subcall function 00F016C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00F0170D
                          • Part of subcall function 00F016C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00F0173A
                          • Part of subcall function 00F016C3: GetLastError.KERNEL32 ref: 00F0174A
                        • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00F01286
                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00F012A8
                        • CloseHandle.KERNEL32(?), ref: 00F012B9
                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00F012D1
                        • GetProcessWindowStation.USER32 ref: 00F012EA
                        • SetProcessWindowStation.USER32(00000000), ref: 00F012F4
                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00F01310
                          • Part of subcall function 00F010BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00F011FC), ref: 00F010D4
                          • Part of subcall function 00F010BF: CloseHandle.KERNEL32(?,?,00F011FC), ref: 00F010E9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                        • String ID: $default$winsta0
                        • API String ID: 22674027-1027155976
                        • Opcode ID: 71c6c0fbc24d4df42414b99c4a68dc59c00eba83ba13214f85db0d0ea78c835d
                        • Instruction ID: bb837a4a854ba39278c828c9506c68957afdda5d5bb601cea3dc5cbbad39cf81
                        • Opcode Fuzzy Hash: 71c6c0fbc24d4df42414b99c4a68dc59c00eba83ba13214f85db0d0ea78c835d
                        • Instruction Fuzzy Hash: 648177B1900209ABDF21DFA4DC49FEE7BBAFF05724F144129F910B62A0C7758A54EB61
                        APIs
                          • Part of subcall function 00F010F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00F01114
                          • Part of subcall function 00F010F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00F00B9B,?,?,?), ref: 00F01120
                          • Part of subcall function 00F010F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00F00B9B,?,?,?), ref: 00F0112F
                          • Part of subcall function 00F010F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00F00B9B,?,?,?), ref: 00F01136
                          • Part of subcall function 00F010F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00F0114D
                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00F00BCC
                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00F00C00
                        • GetLengthSid.ADVAPI32(?), ref: 00F00C17
                        • GetAce.ADVAPI32(?,00000000,?), ref: 00F00C51
                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00F00C6D
                        • GetLengthSid.ADVAPI32(?), ref: 00F00C84
                        • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00F00C8C
                        • HeapAlloc.KERNEL32(00000000), ref: 00F00C93
                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00F00CB4
                        • CopySid.ADVAPI32(00000000), ref: 00F00CBB
                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00F00CEA
                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00F00D0C
                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00F00D1E
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F00D45
                        • HeapFree.KERNEL32(00000000), ref: 00F00D4C
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F00D55
                        • HeapFree.KERNEL32(00000000), ref: 00F00D5C
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F00D65
                        • HeapFree.KERNEL32(00000000), ref: 00F00D6C
                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00F00D78
                        • HeapFree.KERNEL32(00000000), ref: 00F00D7F
                          • Part of subcall function 00F01193: GetProcessHeap.KERNEL32(00000008,00F00BB1,?,00000000,?,00F00BB1,?), ref: 00F011A1
                          • Part of subcall function 00F01193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00F00BB1,?), ref: 00F011A8
                          • Part of subcall function 00F01193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00F00BB1,?), ref: 00F011B7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                        • String ID:
                        • API String ID: 4175595110-0
                        • Opcode ID: 644beffae8b9e9a8b1d3b1a9e0cb8cd47965daebd11159914ee1d1ea6608b2a0
                        • Instruction ID: 71b3e7b4161ad7a3bb64b3e46d528fce0fbb8cc2d32127a4ac4399441becce6f
                        • Opcode Fuzzy Hash: 644beffae8b9e9a8b1d3b1a9e0cb8cd47965daebd11159914ee1d1ea6608b2a0
                        • Instruction Fuzzy Hash: A3715AB2D0120AABDF10DFA5DD44FAEBBB9BF04320F044515E914F6191DB75AA05EBB0
                        APIs
                        • OpenClipboard.USER32(00F3CC08), ref: 00F1EB29
                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 00F1EB37
                        • GetClipboardData.USER32(0000000D), ref: 00F1EB43
                        • CloseClipboard.USER32 ref: 00F1EB4F
                        • GlobalLock.KERNEL32(00000000), ref: 00F1EB87
                        • CloseClipboard.USER32 ref: 00F1EB91
                        • GlobalUnlock.KERNEL32(00000000), ref: 00F1EBBC
                        • IsClipboardFormatAvailable.USER32(00000001), ref: 00F1EBC9
                        • GetClipboardData.USER32(00000001), ref: 00F1EBD1
                        • GlobalLock.KERNEL32(00000000), ref: 00F1EBE2
                        • GlobalUnlock.KERNEL32(00000000), ref: 00F1EC22
                        • IsClipboardFormatAvailable.USER32(0000000F), ref: 00F1EC38
                        • GetClipboardData.USER32(0000000F), ref: 00F1EC44
                        • GlobalLock.KERNEL32(00000000), ref: 00F1EC55
                        • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00F1EC77
                        • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00F1EC94
                        • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00F1ECD2
                        • GlobalUnlock.KERNEL32(00000000), ref: 00F1ECF3
                        • CountClipboardFormats.USER32 ref: 00F1ED14
                        • CloseClipboard.USER32 ref: 00F1ED59
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                        • String ID:
                        • API String ID: 420908878-0
                        • Opcode ID: a4c26a4b61e91f18b512ddcf6ddccfe708bab6e0c3651791d1898bb7933d3f30
                        • Instruction ID: f47ec590b82ed2ec013f08b7a0ef9d8caf8840b9420bfbf21631b01db3fe10a9
                        • Opcode Fuzzy Hash: a4c26a4b61e91f18b512ddcf6ddccfe708bab6e0c3651791d1898bb7933d3f30
                        • Instruction Fuzzy Hash: 356117352043059FD300DF20D889F6AB7E5EF85724F18545DF856AB2A2CB30ED85EBA2
                        APIs
                        • FindFirstFileW.KERNEL32(?,?), ref: 00F169BE
                        • FindClose.KERNEL32(00000000), ref: 00F16A12
                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00F16A4E
                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00F16A75
                          • Part of subcall function 00EA9CB3: _wcslen.LIBCMT ref: 00EA9CBD
                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00F16AB2
                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00F16ADF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                        • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                        • API String ID: 3830820486-3289030164
                        • Opcode ID: fffb94838696cd488ffb508a158e8965cda0e7ef41a189ee97c98d2a7270c6d3
                        • Instruction ID: c261872729df17b9ab04210cfdda32ef8f085fbcf249f9909bed577a14f2ea44
                        • Opcode Fuzzy Hash: fffb94838696cd488ffb508a158e8965cda0e7ef41a189ee97c98d2a7270c6d3
                        • Instruction Fuzzy Hash: 0CD14072508300AFC714EBA4CC91EABB7ECAF89704F44591DF585E7192EB74EA44CB62
                        APIs
                        • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00F19663
                        • GetFileAttributesW.KERNEL32(?), ref: 00F196A1
                        • SetFileAttributesW.KERNEL32(?,?), ref: 00F196BB
                        • FindNextFileW.KERNEL32(00000000,?), ref: 00F196D3
                        • FindClose.KERNEL32(00000000), ref: 00F196DE
                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00F196FA
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00F1974A
                        • SetCurrentDirectoryW.KERNEL32(00F66B7C), ref: 00F19768
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F19772
                        • FindClose.KERNEL32(00000000), ref: 00F1977F
                        • FindClose.KERNEL32(00000000), ref: 00F1978F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                        • String ID: *.*
                        • API String ID: 1409584000-438819550
                        • Opcode ID: 645986846ea10c3f1fb52cbcae0a9f5ee49f65e79f7cb8620d2bae1d3e81a02b
                        • Instruction ID: bfbe5073370347045b607365e8b1f59e32873db81ff12924e9c8fa3e23b80620
                        • Opcode Fuzzy Hash: 645986846ea10c3f1fb52cbcae0a9f5ee49f65e79f7cb8620d2bae1d3e81a02b
                        • Instruction Fuzzy Hash: F031C032904219AADF14AFB5DC18ADE77ACAF49330F104165F815E21E0DBB0DA80ABA0
                        APIs
                        • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00F197BE
                        • FindNextFileW.KERNEL32(00000000,?), ref: 00F19819
                        • FindClose.KERNEL32(00000000), ref: 00F19824
                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00F19840
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00F19890
                        • SetCurrentDirectoryW.KERNEL32(00F66B7C), ref: 00F198AE
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F198B8
                        • FindClose.KERNEL32(00000000), ref: 00F198C5
                        • FindClose.KERNEL32(00000000), ref: 00F198D5
                          • Part of subcall function 00F0DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00F0DB00
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                        • String ID: *.*
                        • API String ID: 2640511053-438819550
                        • Opcode ID: 0a975dde3f0472f89a43342245a2d504f085fa4602711e61f92a5ba31abeb142
                        • Instruction ID: 16392179b3908fd42dad2ab3116d9f4a707b7cdc7996fc962c92e5d93d833cc7
                        • Opcode Fuzzy Hash: 0a975dde3f0472f89a43342245a2d504f085fa4602711e61f92a5ba31abeb142
                        • Instruction Fuzzy Hash: C331C1329042196EDB14AFB4EC58ADE77ACAF46330F504165E814F21A0DBB1DAC5EBA0
                        APIs
                          • Part of subcall function 00F2C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F2B6AE,?,?), ref: 00F2C9B5
                          • Part of subcall function 00F2C998: _wcslen.LIBCMT ref: 00F2C9F1
                          • Part of subcall function 00F2C998: _wcslen.LIBCMT ref: 00F2CA68
                          • Part of subcall function 00F2C998: _wcslen.LIBCMT ref: 00F2CA9E
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F2BF3E
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 00F2BFA9
                        • RegCloseKey.ADVAPI32(00000000), ref: 00F2BFCD
                        • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00F2C02C
                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00F2C0E7
                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00F2C154
                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00F2C1E9
                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 00F2C23A
                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00F2C2E3
                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00F2C382
                        • RegCloseKey.ADVAPI32(00000000), ref: 00F2C38F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                        • String ID:
                        • API String ID: 3102970594-0
                        • Opcode ID: a2a78b6d88deb5903d4a502fdddd3c06174d79492fa050e00018f87072ee1611
                        • Instruction ID: e38de8262e85a5a61561d080e51e4de31fef7399af71c26012d4a6606ce6d4cf
                        • Opcode Fuzzy Hash: a2a78b6d88deb5903d4a502fdddd3c06174d79492fa050e00018f87072ee1611
                        • Instruction Fuzzy Hash: 2B025C716042109FC714DF24D891E2ABBE5EF89314F19889DF84ADF2A2DB31EC45DB92
                        APIs
                        • GetLocalTime.KERNEL32(?), ref: 00F18257
                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00F18267
                        • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00F18273
                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F18310
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00F18324
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00F18356
                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00F1838C
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00F18395
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CurrentDirectoryTime$File$Local$System
                        • String ID: *.*
                        • API String ID: 1464919966-438819550
                        • Opcode ID: 2deef9a0aa810356fbf8cc787d66e0b0a76a65e4438ae46d3c3470141fce02dc
                        • Instruction ID: 25e7f5b8b9b377f40dea168a683743c83647d70fdb587b4e61c4fe90cd7beb89
                        • Opcode Fuzzy Hash: 2deef9a0aa810356fbf8cc787d66e0b0a76a65e4438ae46d3c3470141fce02dc
                        • Instruction Fuzzy Hash: F4618C725043459FC710EF60C84099EB3E9FF89360F04491DF999E7251DB35E946CB92
                        APIs
                          • Part of subcall function 00EA3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00EA3A97,?,?,00EA2E7F,?,?,?,00000000), ref: 00EA3AC2
                          • Part of subcall function 00F0E199: GetFileAttributesW.KERNEL32(?,00F0CF95), ref: 00F0E19A
                        • FindFirstFileW.KERNEL32(?,?), ref: 00F0D122
                        • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00F0D1DD
                        • MoveFileW.KERNEL32(?,?), ref: 00F0D1F0
                        • DeleteFileW.KERNEL32(?,?,?,?), ref: 00F0D20D
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F0D237
                          • Part of subcall function 00F0D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00F0D21C,?,?), ref: 00F0D2B2
                        • FindClose.KERNEL32(00000000,?,?,?), ref: 00F0D253
                        • FindClose.KERNEL32(00000000), ref: 00F0D264
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                        • String ID: \*.*
                        • API String ID: 1946585618-1173974218
                        • Opcode ID: 173e5bff89c95b67bccace598472d1241d5ed93d35b3a1d807787ff8fea8f903
                        • Instruction ID: ffed29d9e1320cf0c14aaf2f1f92c8d1923f9eabf8d8e95b9b91349727f1daee
                        • Opcode Fuzzy Hash: 173e5bff89c95b67bccace598472d1241d5ed93d35b3a1d807787ff8fea8f903
                        • Instruction Fuzzy Hash: 4F615E31C0511DABCF05EBE0DE529EEB7B5AF59350F244165E40277192EB34AF09EB60
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                        • String ID:
                        • API String ID: 1737998785-0
                        • Opcode ID: fc67af1769949c0ed92e1b685678eb316f3d5b8165f3e58cad0901722a940cf1
                        • Instruction ID: e71f4706ff42798800f29625d6bbca594792218b9e9dabca20046ca31e7d985f
                        • Opcode Fuzzy Hash: fc67af1769949c0ed92e1b685678eb316f3d5b8165f3e58cad0901722a940cf1
                        • Instruction Fuzzy Hash: 65419D35604611AFD310DF25E889B5ABBE1FF44328F15C099E8199B762C735EC82DBD0
                        APIs
                          • Part of subcall function 00F016C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00F0170D
                          • Part of subcall function 00F016C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00F0173A
                          • Part of subcall function 00F016C3: GetLastError.KERNEL32 ref: 00F0174A
                        • ExitWindowsEx.USER32(?,00000000), ref: 00F0E932
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                        • String ID: $ $@$SeShutdownPrivilege
                        • API String ID: 2234035333-3163812486
                        • Opcode ID: 418b1765b9b08de93f74ed044a2234d22308ac5547743089ac7dc0468edac816
                        • Instruction ID: 01095cc06eed6247b795cde37133cbc0a0f3d6603f2f04f2a30c5f3881080362
                        • Opcode Fuzzy Hash: 418b1765b9b08de93f74ed044a2234d22308ac5547743089ac7dc0468edac816
                        • Instruction Fuzzy Hash: FE01D673A10215ABEB6427B49C86BBB725CAB14760F154D21FC03F21D2D5A55C40B2D0
                        APIs
                        • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00F21276
                        • WSAGetLastError.WSOCK32 ref: 00F21283
                        • bind.WSOCK32(00000000,?,00000010), ref: 00F212BA
                        • WSAGetLastError.WSOCK32 ref: 00F212C5
                        • closesocket.WSOCK32(00000000), ref: 00F212F4
                        • listen.WSOCK32(00000000,00000005), ref: 00F21303
                        • WSAGetLastError.WSOCK32 ref: 00F2130D
                        • closesocket.WSOCK32(00000000), ref: 00F2133C
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ErrorLast$closesocket$bindlistensocket
                        • String ID:
                        • API String ID: 540024437-0
                        • Opcode ID: afa0a9e542437ff40850a61460ff1a4aea63f8431a94417b1b8995b07de0c65f
                        • Instruction ID: 7ac3885c596c2310d21a107d848f1f65621d71ebd37d54016ca5b2cf6fd0055e
                        • Opcode Fuzzy Hash: afa0a9e542437ff40850a61460ff1a4aea63f8431a94417b1b8995b07de0c65f
                        • Instruction Fuzzy Hash: 1E418131A00114DFD710DF64D488B2ABBE6BF56328F188198E8569F2D2C771ED81DBE1
                        APIs
                        • _free.LIBCMT ref: 00EDB9D4
                        • _free.LIBCMT ref: 00EDB9F8
                        • _free.LIBCMT ref: 00EDBB7F
                        • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00F43700), ref: 00EDBB91
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00F7121C,000000FF,00000000,0000003F,00000000,?,?), ref: 00EDBC09
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00F71270,000000FF,?,0000003F,00000000,?), ref: 00EDBC36
                        • _free.LIBCMT ref: 00EDBD4B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _free$ByteCharMultiWide$InformationTimeZone
                        • String ID:
                        • API String ID: 314583886-0
                        • Opcode ID: d64412b34681e22f1505f1514aa22d5e299d9f182684cdbcfded86d7fc64225f
                        • Instruction ID: b40baff19c94408471395224747f39a17ad1fbb8f0df342d72a65a1609215a89
                        • Opcode Fuzzy Hash: d64412b34681e22f1505f1514aa22d5e299d9f182684cdbcfded86d7fc64225f
                        • Instruction Fuzzy Hash: E5C12671904248EFDB209F688851AAABBE9EF41314F15619BE494FB392FB318E43D750
                        APIs
                          • Part of subcall function 00EA3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00EA3A97,?,?,00EA2E7F,?,?,?,00000000), ref: 00EA3AC2
                          • Part of subcall function 00F0E199: GetFileAttributesW.KERNEL32(?,00F0CF95), ref: 00F0E19A
                        • FindFirstFileW.KERNEL32(?,?), ref: 00F0D420
                        • DeleteFileW.KERNEL32(?,?,?,?), ref: 00F0D470
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F0D481
                        • FindClose.KERNEL32(00000000), ref: 00F0D498
                        • FindClose.KERNEL32(00000000), ref: 00F0D4A1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                        • String ID: \*.*
                        • API String ID: 2649000838-1173974218
                        • Opcode ID: 6c11bde887726f2103e1e877a1fad9b2447c866366f5187c272942540b16d3d6
                        • Instruction ID: ebcd8b6b97774c95c877e63d39342dae2b0f374c289ccf7f16930d576a4b1590
                        • Opcode Fuzzy Hash: 6c11bde887726f2103e1e877a1fad9b2447c866366f5187c272942540b16d3d6
                        • Instruction Fuzzy Hash: 013180314083459FC304EF64D8919AFB7E8AE96314F445A2DF4D1A7191EB34EA09E7A3
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: __floor_pentium4
                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                        • API String ID: 4168288129-2761157908
                        • Opcode ID: 7a90f3ba3308858310f5136d6fe5d8a8badf119cef45c13ff3495349281c0a1b
                        • Instruction ID: 3fc6b0381172514bd7245b8b10ddd90271e5f779b0d819ecaa551ff27447505a
                        • Opcode Fuzzy Hash: 7a90f3ba3308858310f5136d6fe5d8a8badf119cef45c13ff3495349281c0a1b
                        • Instruction Fuzzy Hash: E3C22771E086288BDB25DE289D447EAB7B5EB48305F1451EBD84EF7340E775AE828F40
                        APIs
                        • _wcslen.LIBCMT ref: 00F164DC
                        • CoInitialize.OLE32(00000000), ref: 00F16639
                        • CoCreateInstance.OLE32(00F3FCF8,00000000,00000001,00F3FB68,?), ref: 00F16650
                        • CoUninitialize.OLE32 ref: 00F168D4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                        • String ID: .lnk
                        • API String ID: 886957087-24824748
                        • Opcode ID: 2def1f95c85e9387dd8b6336ac37402113844ccb394b54465d7a03aef4cdba06
                        • Instruction ID: 90c4667904d5445bf244887eb5ea3d2834a9a8ff2895d71b54bf4fe848330993
                        • Opcode Fuzzy Hash: 2def1f95c85e9387dd8b6336ac37402113844ccb394b54465d7a03aef4cdba06
                        • Instruction Fuzzy Hash: 54D16A71608201AFC304EF24C881EABB7E9FF99314F14496DF595DB292DB31E949CB92
                        APIs
                        • GetForegroundWindow.USER32(?,?,00000000), ref: 00F222E8
                          • Part of subcall function 00F1E4EC: GetWindowRect.USER32(?,?), ref: 00F1E504
                        • GetDesktopWindow.USER32 ref: 00F22312
                        • GetWindowRect.USER32(00000000), ref: 00F22319
                        • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00F22355
                        • GetCursorPos.USER32(?), ref: 00F22381
                        • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00F223DF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Window$Rectmouse_event$CursorDesktopForeground
                        • String ID:
                        • API String ID: 2387181109-0
                        • Opcode ID: 0330bd27d0f218ecfb83740326d6388a03f8e75a921549f12620287d07a25ae9
                        • Instruction ID: c4fbdb4474a0f485ff9265883524806fa159c8ae3b1f44ee3e12fb350df28671
                        • Opcode Fuzzy Hash: 0330bd27d0f218ecfb83740326d6388a03f8e75a921549f12620287d07a25ae9
                        • Instruction Fuzzy Hash: 7C31AF72504315ABD760DF54D845B5BB7AAFF84324F000A19F985A7191DB34ED08DBD2
                        APIs
                          • Part of subcall function 00EA9CB3: _wcslen.LIBCMT ref: 00EA9CBD
                        • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00F19B78
                        • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00F19C8B
                          • Part of subcall function 00F13874: GetInputState.USER32 ref: 00F138CB
                          • Part of subcall function 00F13874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F13966
                        • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00F19BA8
                        • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00F19C75
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                        • String ID: *.*
                        • API String ID: 1972594611-438819550
                        • Opcode ID: 7574d82025a0e46066621011f00c6659d2fc3843dca6ef4d20c1f580547c43ad
                        • Instruction ID: bcc1fe240f5ec90cd40169d48011a9c88613ace0908ffd3b3881a2f6cd562cf2
                        • Opcode Fuzzy Hash: 7574d82025a0e46066621011f00c6659d2fc3843dca6ef4d20c1f580547c43ad
                        • Instruction Fuzzy Hash: 75417E7190820A9BCF15DF64C855AEEBBF8EF09320F244055E855B6291EB70AE84DBE1
                        APIs
                          • Part of subcall function 00EB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00EB9BB2
                        • DefDlgProcW.USER32(?,?,?,?,?), ref: 00EB9A4E
                        • GetSysColor.USER32(0000000F), ref: 00EB9B23
                        • SetBkColor.GDI32(?,00000000), ref: 00EB9B36
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Color$LongProcWindow
                        • String ID:
                        • API String ID: 3131106179-0
                        • Opcode ID: 45fc045be227131b6d605f1f9ca4dc64af37469d9739a3a1b2490372e0cfdd28
                        • Instruction ID: b435279f0e4a8f5383ba3809dfb89a60ef2710530baa493f02f385abdff56201
                        • Opcode Fuzzy Hash: 45fc045be227131b6d605f1f9ca4dc64af37469d9739a3a1b2490372e0cfdd28
                        • Instruction Fuzzy Hash: 04A13D70108448BEE724AA3C8C99DFB369DEF42354F15610AF742F66D3CA359D41E276
                        APIs
                          • Part of subcall function 00F2304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00F2307A
                          • Part of subcall function 00F2304E: _wcslen.LIBCMT ref: 00F2309B
                        • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00F2185D
                        • WSAGetLastError.WSOCK32 ref: 00F21884
                        • bind.WSOCK32(00000000,?,00000010), ref: 00F218DB
                        • WSAGetLastError.WSOCK32 ref: 00F218E6
                        • closesocket.WSOCK32(00000000), ref: 00F21915
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                        • String ID:
                        • API String ID: 1601658205-0
                        • Opcode ID: 0d88b235523738020bcc97947999d5e18274e4e169bf1193e40d84b2fc7718ab
                        • Instruction ID: 9ff34dc852d1dafcf91d959a86208704efb44809cb8ebf347e0bcf527a4d3e2c
                        • Opcode Fuzzy Hash: 0d88b235523738020bcc97947999d5e18274e4e169bf1193e40d84b2fc7718ab
                        • Instruction Fuzzy Hash: 9151B275A00210AFDB10EF24D886F6A77E5AB49718F188098F959AF3D3C771AD41CBA1
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                        • String ID:
                        • API String ID: 292994002-0
                        • Opcode ID: cfc3ad2a1084cbeaf0a5140155bf6a780e2527b044b68d9793fa209cae01b2b9
                        • Instruction ID: 47f0997328a4e51e3ce510d3c2ba0b341f55aadf9106e7d164cfd4390405b8df
                        • Opcode Fuzzy Hash: cfc3ad2a1084cbeaf0a5140155bf6a780e2527b044b68d9793fa209cae01b2b9
                        • Instruction Fuzzy Hash: 9821A631B402115FD7208F1AC854B9A7BE5FF85375F199058E8499B351C775EC42EBD0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                        • API String ID: 0-1546025612
                        • Opcode ID: 7a75fcba8af2238352320145697132373ea48a9c7a9ae4fa558d87139f5ecb03
                        • Instruction ID: 68d0f84395c3537a09bea0917e6909a672ff6e33e333ba6f6a3692edeffe5992
                        • Opcode Fuzzy Hash: 7a75fcba8af2238352320145697132373ea48a9c7a9ae4fa558d87139f5ecb03
                        • Instruction Fuzzy Hash: F8A28F71E0065ACBDF24CF59C9407EEB7B1BF59318F2491AAE815BB285DB30AD81CB50
                        APIs
                        • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00F0AAAC
                        • SetKeyboardState.USER32(00000080), ref: 00F0AAC8
                        • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00F0AB36
                        • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00F0AB88
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: KeyboardState$InputMessagePostSend
                        • String ID:
                        • API String ID: 432972143-0
                        • Opcode ID: 6ff7ae5241a4286dbcae1d9606d24af2b51b1d200ce4e13e63c08837f118de40
                        • Instruction ID: 5beed71dbfcd3ac776c6e307dca4da5538be91fb4556f43f416fc0b6799eac88
                        • Opcode Fuzzy Hash: 6ff7ae5241a4286dbcae1d9606d24af2b51b1d200ce4e13e63c08837f118de40
                        • Instruction Fuzzy Hash: 7D3116B1E40708AEFF358B64CC05BFA7BA6AB84330F04421AF085561D1D378C981F7A2
                        APIs
                        • InternetReadFile.WININET(?,?,00000400,?), ref: 00F1CE89
                        • GetLastError.KERNEL32(?,00000000), ref: 00F1CEEA
                        • SetEvent.KERNEL32(?,?,00000000), ref: 00F1CEFE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ErrorEventFileInternetLastRead
                        • String ID:
                        • API String ID: 234945975-0
                        • Opcode ID: a2480d7ad1928712bb817c3d8fa6383ad0fefda9355636a3155ebd42f9871cbc
                        • Instruction ID: 562d0b9323c5e37f9dcfbb21f14abb657ad90fedcf0142b528499d631b336ab9
                        • Opcode Fuzzy Hash: a2480d7ad1928712bb817c3d8fa6383ad0fefda9355636a3155ebd42f9871cbc
                        • Instruction Fuzzy Hash: EA21CF71940305ABDB30CFA5C948BA7B7FDEB00324F10441EE546E2151E775EE85ABE0
                        APIs
                        • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00F082AA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: lstrlen
                        • String ID: ($|
                        • API String ID: 1659193697-1631851259
                        • Opcode ID: 6cafe7f8cf79fdce5d4f4436b6c18e521c26450fe58c508ce420b751163f3c29
                        • Instruction ID: 4d41adcabbb41b56b1267f847f84aac433cfd7eabe2ed9ab741f382e2f6ced92
                        • Opcode Fuzzy Hash: 6cafe7f8cf79fdce5d4f4436b6c18e521c26450fe58c508ce420b751163f3c29
                        • Instruction Fuzzy Hash: 59323575A007059FCB28CF19C481A6AB7F0FF48760B15C56EE49ADB3A1EB70E942DB40
                        APIs
                        • FindFirstFileW.KERNEL32(?,?), ref: 00F15CC1
                        • FindNextFileW.KERNEL32(00000000,?), ref: 00F15D17
                        • FindClose.KERNEL32(?), ref: 00F15D5F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Find$File$CloseFirstNext
                        • String ID:
                        • API String ID: 3541575487-0
                        • Opcode ID: 6a2ed83c5884d96be071826a334fcec4a7e11aef39ab402bdc83b1d7ed52e60d
                        • Instruction ID: 175d5c822534cdba4964c21e8d43e59db5daf43d1530e02cdbd570b74ffe1c34
                        • Opcode Fuzzy Hash: 6a2ed83c5884d96be071826a334fcec4a7e11aef39ab402bdc83b1d7ed52e60d
                        • Instruction Fuzzy Hash: 41519975A04601DFC714CF28D494A96B7E4FF8A324F14855DE95A9B3A1CB30F844DB91
                        APIs
                        • IsDebuggerPresent.KERNEL32 ref: 00ED271A
                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00ED2724
                        • UnhandledExceptionFilter.KERNEL32(?), ref: 00ED2731
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                        • String ID:
                        • API String ID: 3906539128-0
                        • Opcode ID: e317c93a045da3e475eae75cef5541782a089ab1c09f0bc6992a7589b3b58a1a
                        • Instruction ID: 89adfa840ced31f6cba0a2415e227392e1f9ec2aa502de30b31c9245bd504140
                        • Opcode Fuzzy Hash: e317c93a045da3e475eae75cef5541782a089ab1c09f0bc6992a7589b3b58a1a
                        • Instruction Fuzzy Hash: A031C67590121CABCB21DF68DD88B99BBB8EF18310F5051DAE91CA7260E7349F828F44
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 00F151DA
                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00F15238
                        • SetErrorMode.KERNEL32(00000000), ref: 00F152A1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ErrorMode$DiskFreeSpace
                        • String ID:
                        • API String ID: 1682464887-0
                        • Opcode ID: 1ad4ba98d7288b22392997eaffab05129eaf7395cea2ec70fb0cd046ae69d3d3
                        • Instruction ID: 6b7007fcd1009f749acac4ac11d833f76f4c30392b60e9cc0dd1c7c0900a5abe
                        • Opcode Fuzzy Hash: 1ad4ba98d7288b22392997eaffab05129eaf7395cea2ec70fb0cd046ae69d3d3
                        • Instruction Fuzzy Hash: 01312A75A00518DFDB00DF94D884EADBBF5FF49318F188099E805AB3A2DB35E856DB90
                        APIs
                          • Part of subcall function 00EBFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00EC0668
                          • Part of subcall function 00EBFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00EC0685
                        • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00F0170D
                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00F0173A
                        • GetLastError.KERNEL32 ref: 00F0174A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                        • String ID:
                        • API String ID: 577356006-0
                        • Opcode ID: c851193e9ca59d2288f8fcbf9991f9ff2404d10979273e85bcf74a70454b236c
                        • Instruction ID: df29bf60e58be85558c553636f359dbf30bb2d8cfb75c92546dbb3b86b15477a
                        • Opcode Fuzzy Hash: c851193e9ca59d2288f8fcbf9991f9ff2404d10979273e85bcf74a70454b236c
                        • Instruction Fuzzy Hash: 731191B2504308AFD7189F54DC86EABB7F9FB44724B20852EE056A7281EB70FC419B60
                        APIs
                        • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00F0D608
                        • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00F0D645
                        • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00F0D650
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CloseControlCreateDeviceFileHandle
                        • String ID:
                        • API String ID: 33631002-0
                        • Opcode ID: b23c836d37894109360653740f248e2ccdc5036b0691047ea9705e28396c4388
                        • Instruction ID: 1c15df1a5eeef56da0a52afcb29c3b3b20727c18acae540d618ef13c14f19166
                        • Opcode Fuzzy Hash: b23c836d37894109360653740f248e2ccdc5036b0691047ea9705e28396c4388
                        • Instruction Fuzzy Hash: 2C113C75E05228BBDB108F959C45FAFBBBCEB45B60F108115F904E7290D6704A05ABA1
                        APIs
                        • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00F0168C
                        • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00F016A1
                        • FreeSid.ADVAPI32(?), ref: 00F016B1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: AllocateCheckFreeInitializeMembershipToken
                        • String ID:
                        • API String ID: 3429775523-0
                        • Opcode ID: 60364b09709b65e9f724e3bf673b95c9a654af0893725d70bee761ac90d2c236
                        • Instruction ID: a9cf2563f91a09051bdb6a6ad1f6f76f2c8b775a1a08cbb02832c6f62ddd865c
                        • Opcode Fuzzy Hash: 60364b09709b65e9f724e3bf673b95c9a654af0893725d70bee761ac90d2c236
                        • Instruction Fuzzy Hash: 94F0F4B195030DFBDB00DFE49D89AAEBBBDFB08714F504565E501E2181E774AA44AB90
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID: /
                        • API String ID: 0-2043925204
                        • Opcode ID: 2afea16913ed1fdae4c788ff02dd44cfaf44fbb145e065a56b03df7105894198
                        • Instruction ID: 9a0aa937b031f04aed923dc3cf072855a83241e82f64018a524b0662467e5ff6
                        • Opcode Fuzzy Hash: 2afea16913ed1fdae4c788ff02dd44cfaf44fbb145e065a56b03df7105894198
                        • Instruction Fuzzy Hash: 09416E7250061A6FCB20DFB9CC48DBB77B8EB84358F2052AEF915E7280E6709D42CB50
                        APIs
                        • GetUserNameW.ADVAPI32(?,?), ref: 00EFD28C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: NameUser
                        • String ID: X64
                        • API String ID: 2645101109-893830106
                        • Opcode ID: f8bb92e64ac3c0665ca7af759fe8cb5f9f61f41d7b380703e8b64a92154843c6
                        • Instruction ID: a32f93fe4024fda6b9946214853d25adcfd6b369b8756cf10f2f4aad5061bd18
                        • Opcode Fuzzy Hash: f8bb92e64ac3c0665ca7af759fe8cb5f9f61f41d7b380703e8b64a92154843c6
                        • Instruction Fuzzy Hash: 50D0C9B480511DEACB94DB90DC88DDEB77DBB04315F100151F106F2000D73095489F50
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                        • Instruction ID: a092cd2a3f48e5d29eab4a97e5c50b42232c9a7e6eb75f95b0f920ee675ece41
                        • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                        • Instruction Fuzzy Hash: D002E871E002199FDF14CFA9C980BADFBF1EF48314F25916ED919B7284D731AA428B94
                        APIs
                        • FindFirstFileW.KERNEL32(?,?), ref: 00F16918
                        • FindClose.KERNEL32(00000000), ref: 00F16961
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Find$CloseFileFirst
                        • String ID:
                        • API String ID: 2295610775-0
                        • Opcode ID: 619c49d28311734536686ab97df1c49824d6597a64a7885f6a0af6b91164a0d3
                        • Instruction ID: 51bcf6c7a57b139b32d40e5e26ca0acf219e453439041dbc7a0c3ac75f39fdc2
                        • Opcode Fuzzy Hash: 619c49d28311734536686ab97df1c49824d6597a64a7885f6a0af6b91164a0d3
                        • Instruction Fuzzy Hash: CD1190356042109FC710DF29D884A16BBE5FF89328F55C699E8699F2A2C730EC45CB91
                        APIs
                        • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00F24891,?,?,00000035,?), ref: 00F137E4
                        • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00F24891,?,?,00000035,?), ref: 00F137F4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ErrorFormatLastMessage
                        • String ID:
                        • API String ID: 3479602957-0
                        • Opcode ID: 7ca57ec3358c922d5d629471607aa5f3d03f02e61e21a85ebce2af5d74ac5448
                        • Instruction ID: a4df72742d2fc1ee1b9afcb38640e50099dc36dd1c7a68ac4cc76b98b241f46a
                        • Opcode Fuzzy Hash: 7ca57ec3358c922d5d629471607aa5f3d03f02e61e21a85ebce2af5d74ac5448
                        • Instruction Fuzzy Hash: DEF0A0B16042282AE62017668C49FEB7AAEEF85771F000175F509E2281D9609944D7F0
                        APIs
                        • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00F0B25D
                        • keybd_event.USER32(?,75A8C0D0,?,00000000), ref: 00F0B270
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: InputSendkeybd_event
                        • String ID:
                        • API String ID: 3536248340-0
                        • Opcode ID: d2534caceadbca0932afb86eceac994308d3ec71bb65bcaf77f181f75c518db8
                        • Instruction ID: ccee5f08d12fb6bd3730f1eeeffe049de588d4b9dcef745e994139e984283c61
                        • Opcode Fuzzy Hash: d2534caceadbca0932afb86eceac994308d3ec71bb65bcaf77f181f75c518db8
                        • Instruction Fuzzy Hash: B7F01D7180424DABDB159FA0C805BAE7BB4FF04315F048009F955A5191C7798611AF94
                        APIs
                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00F011FC), ref: 00F010D4
                        • CloseHandle.KERNEL32(?,?,00F011FC), ref: 00F010E9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: AdjustCloseHandlePrivilegesToken
                        • String ID:
                        • API String ID: 81990902-0
                        • Opcode ID: 50078961430cc8cabcbf5599139439bfbf46c799f6e081ec496bdd53e937fc2f
                        • Instruction ID: 19ed374086d464b14075efb3d71dfac125f1e895fa8a8b09c632c08aaab2b86a
                        • Opcode Fuzzy Hash: 50078961430cc8cabcbf5599139439bfbf46c799f6e081ec496bdd53e937fc2f
                        • Instruction Fuzzy Hash: D3E0BF72014610AEF7252B51FC05EB777EAEB04320B14882DF5A5904B1DB62ACA0EB50
                        Strings
                        • Variable is not of type 'Object'., xrefs: 00EF0C40
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID: Variable is not of type 'Object'.
                        • API String ID: 0-1840281001
                        • Opcode ID: 4b63a76e2f67dda83ca980983a447261aa1bb2dd908cd97ac8932c942a89b9ac
                        • Instruction ID: 768a2ecfdb6ffcec2d322f72c52366831cf955af688c5261dd33bce01ae8f8d5
                        • Opcode Fuzzy Hash: 4b63a76e2f67dda83ca980983a447261aa1bb2dd908cd97ac8932c942a89b9ac
                        • Instruction Fuzzy Hash: 16326B74A002189FCF14DF90C981AFDB7B5BF0A308F24A059E906BF292D735AE45CB61
                        APIs
                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00ED6766,?,?,00000008,?,?,00EDFEFE,00000000), ref: 00ED6998
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ExceptionRaise
                        • String ID:
                        • API String ID: 3997070919-0
                        • Opcode ID: b060144b42b82667dbe60b57c379ec81269500a441762c75c0d5701070f8f836
                        • Instruction ID: 62c4376daf5b3458a972d4f72f6209184975f971a792fa42dbf7ddd9ca985a42
                        • Opcode Fuzzy Hash: b060144b42b82667dbe60b57c379ec81269500a441762c75c0d5701070f8f836
                        • Instruction Fuzzy Hash: 80B16C356106089FD718CF28C486BA57BE0FF45368F25965AE8D9DF3A2C335E982CB40
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID: 0-3916222277
                        • Opcode ID: 7cc13c2cf0b88b38446d0ba0790ad71fe08df8b25aca59cdf1986b19f6e71482
                        • Instruction ID: 55a977374f439a87709fc05b9903c89ed3d986f1f0ab686d9339389f8a4d9b89
                        • Opcode Fuzzy Hash: 7cc13c2cf0b88b38446d0ba0790ad71fe08df8b25aca59cdf1986b19f6e71482
                        • Instruction Fuzzy Hash: 4C126E719002299BDB24CF58C9806FEB7F5FF48710F1491AAE949FB251EB749E81CB90
                        APIs
                        • BlockInput.USER32(00000001), ref: 00F1EABD
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: BlockInput
                        • String ID:
                        • API String ID: 3456056419-0
                        • Opcode ID: d8d3a36413e7f7e17f7d9d250a221627e984c5c653b9b01d7cdb4546225becf1
                        • Instruction ID: 4d933d789b7e66f1767f4961bfd60dce09a59eeb181dd12e143847a1c03742a8
                        • Opcode Fuzzy Hash: d8d3a36413e7f7e17f7d9d250a221627e984c5c653b9b01d7cdb4546225becf1
                        • Instruction Fuzzy Hash: B9E01A362002049FC710EF69D805E9AB7EAAF99770F049416FC4ADB351DA74A8809B91
                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,00EC03EE), ref: 00EC09DA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: 615179f6480b8272cbdb35affaf9d470a0cb2deb914b419b11a5d28edb46ba25
                        • Instruction ID: 771b2b77c6bb2f1a941d1bb19455100aa9e7cf8b76f8d00a15571796e651385c
                        • Opcode Fuzzy Hash: 615179f6480b8272cbdb35affaf9d470a0cb2deb914b419b11a5d28edb46ba25
                        • Instruction Fuzzy Hash:
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0
                        • API String ID: 0-4108050209
                        • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                        • Instruction ID: e8703ae43e482367aa3becd2184bc34b4a252749c1f4910372db4a3c774242a5
                        • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                        • Instruction Fuzzy Hash: 8B51436260C7155ADB3C45288B5AFFE63D59B92348F18350DEAC2B7282C623DE43DF52
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: cac3d207367ffa40d03b70c7e8a93fe03bb12b9287a87ac28cdfc5a9998d7a0c
                        • Instruction ID: 7f64598e7141267ff8449bcbd4ea9f818e8aea2dbe4f3ae43092d4425e5af98d
                        • Opcode Fuzzy Hash: cac3d207367ffa40d03b70c7e8a93fe03bb12b9287a87ac28cdfc5a9998d7a0c
                        • Instruction Fuzzy Hash: E9323226D29F014DD7239634D822335A249EFB73C9F15E737FC6AB5AA6EB28C4835100
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 61d77059737787128f65c0080481c5822c3616a9aa461904f7c29657f0b60abd
                        • Instruction ID: 2e55a3edb2417c7d0b18e1bcc62e262972ecbc7d7dcff84cf82a65ec3a540b3b
                        • Opcode Fuzzy Hash: 61d77059737787128f65c0080481c5822c3616a9aa461904f7c29657f0b60abd
                        • Instruction Fuzzy Hash: F2321A31A0810D8BCF28CF29C6946FEBBA1EB45308F39B566D65AF7295D230DD81DB41
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e20593375d29c7c541a0871d991a11b9f618412f96bd87616e89158886bf4bfe
                        • Instruction ID: b43e6c79e4cafc34317018e45a2e3de94436bc648b820cef5186374e26317c2d
                        • Opcode Fuzzy Hash: e20593375d29c7c541a0871d991a11b9f618412f96bd87616e89158886bf4bfe
                        • Instruction Fuzzy Hash: DE22BFB1A0060ADFDF14CF65C881AEEB3F6FF49304F106529E852BB291EB35A915CB50
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: afa6c4a0e87c94f7941570d933c1cfb1f80fef9607a315972d422a923c08213b
                        • Instruction ID: b86c6f6331d10bfa16643282f99c5b61021bd465c98aebe5ab6299a282320d45
                        • Opcode Fuzzy Hash: afa6c4a0e87c94f7941570d933c1cfb1f80fef9607a315972d422a923c08213b
                        • Instruction Fuzzy Hash: D202A5B0A00249EBDF04DF65D881AAEB7F5FF44304F109169E816BB391EB71AE11CB91
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 26d089e3ba059d19d6dfaafd9a2640fb983be5d72f7441768c67a3ec3f48fcdf
                        • Instruction ID: db302cd5bfa851023dfdceafb06ed74ae0d1aabb047304a0043553f16470ed1a
                        • Opcode Fuzzy Hash: 26d089e3ba059d19d6dfaafd9a2640fb983be5d72f7441768c67a3ec3f48fcdf
                        • Instruction Fuzzy Hash: 69B11524D2AF444DD3239B398831336B65CAFBB6D5F91D71BFC1674D62EB2286835140
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                        • Instruction ID: 27c82be644c99014aad4890ff35f70629141fa12d9067a085730f5c35dc5bbeb
                        • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                        • Instruction Fuzzy Hash: 949188722080A34DD72D42398674A7DFFE15A933A631A17DDE4F3DA1C2EE21C566D620
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                        • Instruction ID: 8f927af7ab50e3bbcb70997467aadf4cdc9fe94df21a7820e6267f2d8dd227c8
                        • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                        • Instruction Fuzzy Hash: 1391CA322090E309DB29423D8634A3DFFE15E933A530E17DED5F2DB1C2EE268566D620
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                        • Instruction ID: 39a3b8a13785b46ce7077ea818cfa48d99462ad9fadc9b3f657c1442f97198c1
                        • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                        • Instruction Fuzzy Hash: 5A91E9322090E34DDB2D427A8674A7DFFE14A933A531917DDD4F2DA1C2FD21C966DA20
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 76b65c4a4e1ea586b43147fd2226f93657c0d1fd4826738cb1de69da71299534
                        • Instruction ID: 84807c7ac85f6fdabbb31417e8c679c46501ed0ead0ad9b28988ecdb5817266c
                        • Opcode Fuzzy Hash: 76b65c4a4e1ea586b43147fd2226f93657c0d1fd4826738cb1de69da71299534
                        • Instruction Fuzzy Hash: 1F613471208709A6DB349A288B95FFE6396DF41718F10391EF8C2FB281DA139E438F55
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b8df2dd491671b59bc55f963c6c8342ea5c8bc1440af0442be634b2e7ce0bfaa
                        • Instruction ID: 72b481cd030fd936ffd3c7808a67e45f631893c034028a31d2fd0059382b54a9
                        • Opcode Fuzzy Hash: b8df2dd491671b59bc55f963c6c8342ea5c8bc1440af0442be634b2e7ce0bfaa
                        • Instruction Fuzzy Hash: AF6136726087096ADA385A284B52FFE2B94AF43748F10395DF8C3FB281D613AD43CE55
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                        • Instruction ID: 8b5a148aad37082fb1dd3e1f14686d7c39e7f9690c8b7090cefd3b2d8c4a8888
                        • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                        • Instruction Fuzzy Hash: 1D81863350C0A349DB2D42398634A7EFFE15A933A531A17DED4F2DA1C3EE25C566E620
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 56965f11d3c70baa97036058162285847be5953c396adf16c72242fb847c4223
                        • Instruction ID: c7f3eff5dadfc8ee0ec0c9d0144ba47df388dfb6d9dba30ebed4b7da0fa7c495
                        • Opcode Fuzzy Hash: 56965f11d3c70baa97036058162285847be5953c396adf16c72242fb847c4223
                        • Instruction Fuzzy Hash: 2D216586E1D3CAAFD75295F448B96D57FD04C2353439A24BFCA821B083F48F458E9B42
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b6dfc6a592c8455f58af505ebecd10986076865d597fd3c4d071f0c123be6106
                        • Instruction ID: 66074fab0b127f09ebc2e71d44f0101bba43941070b4409a1b40aaa98eb31b6f
                        • Opcode Fuzzy Hash: b6dfc6a592c8455f58af505ebecd10986076865d597fd3c4d071f0c123be6106
                        • Instruction Fuzzy Hash: 0D21A5327206158BD768CF79C8226BE73E5A754320F15862EE4A7C37D1DE3AA944DB80
                        APIs
                        • DeleteObject.GDI32(00000000), ref: 00F22B30
                        • DeleteObject.GDI32(00000000), ref: 00F22B43
                        • DestroyWindow.USER32 ref: 00F22B52
                        • GetDesktopWindow.USER32 ref: 00F22B6D
                        • GetWindowRect.USER32(00000000), ref: 00F22B74
                        • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00F22CA3
                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00F22CB1
                        • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F22CF8
                        • GetClientRect.USER32(00000000,?), ref: 00F22D04
                        • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00F22D40
                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F22D62
                        • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F22D75
                        • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F22D80
                        • GlobalLock.KERNEL32(00000000), ref: 00F22D89
                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F22D98
                        • GlobalUnlock.KERNEL32(00000000), ref: 00F22DA1
                        • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F22DA8
                        • GlobalFree.KERNEL32(00000000), ref: 00F22DB3
                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F22DC5
                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,00F3FC38,00000000), ref: 00F22DDB
                        • GlobalFree.KERNEL32(00000000), ref: 00F22DEB
                        • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00F22E11
                        • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00F22E30
                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F22E52
                        • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F2303F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                        • String ID: $AutoIt v3$DISPLAY$static
                        • API String ID: 2211948467-2373415609
                        • Opcode ID: 1cc6388bc4fdd64b31a799f91d9fac53aa1d71333933962f8df271f266589036
                        • Instruction ID: be3fe54ad30ed787f8e02dc03e1418b566dc0a4d80ef45878aed300345496c4b
                        • Opcode Fuzzy Hash: 1cc6388bc4fdd64b31a799f91d9fac53aa1d71333933962f8df271f266589036
                        • Instruction Fuzzy Hash: D6027171900219AFDB14DF64DC89EAE7BBAFF49320F048158F915AB2A1C774ED01DBA0
                        APIs
                        • SetTextColor.GDI32(?,00000000), ref: 00F3712F
                        • GetSysColorBrush.USER32(0000000F), ref: 00F37160
                        • GetSysColor.USER32(0000000F), ref: 00F3716C
                        • SetBkColor.GDI32(?,000000FF), ref: 00F37186
                        • SelectObject.GDI32(?,?), ref: 00F37195
                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00F371C0
                        • GetSysColor.USER32(00000010), ref: 00F371C8
                        • CreateSolidBrush.GDI32(00000000), ref: 00F371CF
                        • FrameRect.USER32(?,?,00000000), ref: 00F371DE
                        • DeleteObject.GDI32(00000000), ref: 00F371E5
                        • InflateRect.USER32(?,000000FE,000000FE), ref: 00F37230
                        • FillRect.USER32(?,?,?), ref: 00F37262
                        • GetWindowLongW.USER32(?,000000F0), ref: 00F37284
                          • Part of subcall function 00F373E8: GetSysColor.USER32(00000012), ref: 00F37421
                          • Part of subcall function 00F373E8: SetTextColor.GDI32(?,?), ref: 00F37425
                          • Part of subcall function 00F373E8: GetSysColorBrush.USER32(0000000F), ref: 00F3743B
                          • Part of subcall function 00F373E8: GetSysColor.USER32(0000000F), ref: 00F37446
                          • Part of subcall function 00F373E8: GetSysColor.USER32(00000011), ref: 00F37463
                          • Part of subcall function 00F373E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00F37471
                          • Part of subcall function 00F373E8: SelectObject.GDI32(?,00000000), ref: 00F37482
                          • Part of subcall function 00F373E8: SetBkColor.GDI32(?,00000000), ref: 00F3748B
                          • Part of subcall function 00F373E8: SelectObject.GDI32(?,?), ref: 00F37498
                          • Part of subcall function 00F373E8: InflateRect.USER32(?,000000FF,000000FF), ref: 00F374B7
                          • Part of subcall function 00F373E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00F374CE
                          • Part of subcall function 00F373E8: GetWindowLongW.USER32(00000000,000000F0), ref: 00F374DB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                        • String ID:
                        • API String ID: 4124339563-0
                        • Opcode ID: 6822d2bdd55099a9d020aa9f45489d5dd5b4bcd98b70ec2924a94f2091d1c11c
                        • Instruction ID: 7847077199f13868ce57b572f1d1e4f496c5307a914630956e471dffa02dba64
                        • Opcode Fuzzy Hash: 6822d2bdd55099a9d020aa9f45489d5dd5b4bcd98b70ec2924a94f2091d1c11c
                        • Instruction Fuzzy Hash: 09A1A272408305AFDB10AF60DC48E5B7BAAFF49330F140A19F962A61E1D771E944EF91
                        APIs
                        • DestroyWindow.USER32(?,?), ref: 00EB8E14
                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 00EF6AC5
                        • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00EF6AFE
                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00EF6F43
                          • Part of subcall function 00EB8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00EB8BE8,?,00000000,?,?,?,?,00EB8BBA,00000000,?), ref: 00EB8FC5
                        • SendMessageW.USER32(?,00001053), ref: 00EF6F7F
                        • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00EF6F96
                        • ImageList_Destroy.COMCTL32(00000000,?), ref: 00EF6FAC
                        • ImageList_Destroy.COMCTL32(00000000,?), ref: 00EF6FB7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                        • String ID: 0
                        • API String ID: 2760611726-4108050209
                        • Opcode ID: 7790bc3a06199aa5e0e8608c2bef96702dc0d04f43f15d67dd76254390491692
                        • Instruction ID: 76703ecaeea577305dfaadaeb679542c5b04a5a323ab4d8c3a7630b8e3593b74
                        • Opcode Fuzzy Hash: 7790bc3a06199aa5e0e8608c2bef96702dc0d04f43f15d67dd76254390491692
                        • Instruction Fuzzy Hash: 98129D31200209DFDB25DF18CD44BB6B7F5FB44314F14A469E689AB261CB31EC96EB92
                        APIs
                        • DestroyWindow.USER32(00000000), ref: 00F2273E
                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00F2286A
                        • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00F228A9
                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00F228B9
                        • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00F22900
                        • GetClientRect.USER32(00000000,?), ref: 00F2290C
                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00F22955
                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00F22964
                        • GetStockObject.GDI32(00000011), ref: 00F22974
                        • SelectObject.GDI32(00000000,00000000), ref: 00F22978
                        • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00F22988
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F22991
                        • DeleteDC.GDI32(00000000), ref: 00F2299A
                        • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00F229C6
                        • SendMessageW.USER32(00000030,00000000,00000001), ref: 00F229DD
                        • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00F22A1D
                        • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00F22A31
                        • SendMessageW.USER32(00000404,00000001,00000000), ref: 00F22A42
                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00F22A77
                        • GetStockObject.GDI32(00000011), ref: 00F22A82
                        • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00F22A8D
                        • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00F22A97
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                        • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                        • API String ID: 2910397461-517079104
                        • Opcode ID: 32c46dffaa973ffd13b0a36bdf8222d9a19d7b5bfff99261c74b41511d6e0c5f
                        • Instruction ID: b020b6323ed21ab402a00e99c8eef9948b662bd1cdec52b15781e45a36fe5e7f
                        • Opcode Fuzzy Hash: 32c46dffaa973ffd13b0a36bdf8222d9a19d7b5bfff99261c74b41511d6e0c5f
                        • Instruction Fuzzy Hash: 66B15C71A00219AFEB14DF68DC8AFAE7BA9FB08720F004155F915EB291D774ED40DB90
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 00F14AED
                        • GetDriveTypeW.KERNEL32(?,00F3CB68,?,\\.\,00F3CC08), ref: 00F14BCA
                        • SetErrorMode.KERNEL32(00000000,00F3CB68,?,\\.\,00F3CC08), ref: 00F14D36
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ErrorMode$DriveType
                        • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                        • API String ID: 2907320926-4222207086
                        • Opcode ID: 26ea4a843991587b3b30faab5a4c0eeccd34e3743c40265abfe2cda1fdea6e63
                        • Instruction ID: a11c5bd58551bf956fc516b3ac3f5150232e49adcc953954fbbbcaea4383a941
                        • Opcode Fuzzy Hash: 26ea4a843991587b3b30faab5a4c0eeccd34e3743c40265abfe2cda1fdea6e63
                        • Instruction Fuzzy Hash: 88617431B05105DBCB08DF24CA81EE9B7A1ABCA754B244455F806EB692DB35FD81FBC2
                        APIs
                        • GetSysColor.USER32(00000012), ref: 00F37421
                        • SetTextColor.GDI32(?,?), ref: 00F37425
                        • GetSysColorBrush.USER32(0000000F), ref: 00F3743B
                        • GetSysColor.USER32(0000000F), ref: 00F37446
                        • CreateSolidBrush.GDI32(?), ref: 00F3744B
                        • GetSysColor.USER32(00000011), ref: 00F37463
                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00F37471
                        • SelectObject.GDI32(?,00000000), ref: 00F37482
                        • SetBkColor.GDI32(?,00000000), ref: 00F3748B
                        • SelectObject.GDI32(?,?), ref: 00F37498
                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00F374B7
                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00F374CE
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00F374DB
                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00F3752A
                        • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00F37554
                        • InflateRect.USER32(?,000000FD,000000FD), ref: 00F37572
                        • DrawFocusRect.USER32(?,?), ref: 00F3757D
                        • GetSysColor.USER32(00000011), ref: 00F3758E
                        • SetTextColor.GDI32(?,00000000), ref: 00F37596
                        • DrawTextW.USER32(?,00F370F5,000000FF,?,00000000), ref: 00F375A8
                        • SelectObject.GDI32(?,?), ref: 00F375BF
                        • DeleteObject.GDI32(?), ref: 00F375CA
                        • SelectObject.GDI32(?,?), ref: 00F375D0
                        • DeleteObject.GDI32(?), ref: 00F375D5
                        • SetTextColor.GDI32(?,?), ref: 00F375DB
                        • SetBkColor.GDI32(?,?), ref: 00F375E5
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                        • String ID:
                        • API String ID: 1996641542-0
                        • Opcode ID: 0c50828c2ccdd6a33086c0fcfd3f73e7c5a94484627bce86f9dbc689fe800559
                        • Instruction ID: cc3d1b8e8364e9762b95a41afd2081abcaadf467b97d17dc13d8a935c279e9de
                        • Opcode Fuzzy Hash: 0c50828c2ccdd6a33086c0fcfd3f73e7c5a94484627bce86f9dbc689fe800559
                        • Instruction Fuzzy Hash: D2615E72D00218AFDF11AFA4DC49AEE7FBAEB08330F154115F915BB2A1D775A940EB90
                        APIs
                        • GetCursorPos.USER32(?), ref: 00F31128
                        • GetDesktopWindow.USER32 ref: 00F3113D
                        • GetWindowRect.USER32(00000000), ref: 00F31144
                        • GetWindowLongW.USER32(?,000000F0), ref: 00F31199
                        • DestroyWindow.USER32(?), ref: 00F311B9
                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00F311ED
                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00F3120B
                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00F3121D
                        • SendMessageW.USER32(00000000,00000421,?,?), ref: 00F31232
                        • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00F31245
                        • IsWindowVisible.USER32(00000000), ref: 00F312A1
                        • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00F312BC
                        • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00F312D0
                        • GetWindowRect.USER32(00000000,?), ref: 00F312E8
                        • MonitorFromPoint.USER32(?,?,00000002), ref: 00F3130E
                        • GetMonitorInfoW.USER32(00000000,?), ref: 00F31328
                        • CopyRect.USER32(?,?), ref: 00F3133F
                        • SendMessageW.USER32(00000000,00000412,00000000), ref: 00F313AA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                        • String ID: ($0$tooltips_class32
                        • API String ID: 698492251-4156429822
                        • Opcode ID: 5c534db3dc08d056fb050fb35b9d88bd1e8e91155e3ff243672634c909ddae8d
                        • Instruction ID: 73dac931948d56df292a03432614cde00edc95f66980e9a1d33353f43ee50573
                        • Opcode Fuzzy Hash: 5c534db3dc08d056fb050fb35b9d88bd1e8e91155e3ff243672634c909ddae8d
                        • Instruction Fuzzy Hash: C5B16D71A04341AFD714DF64C885B6FBBE5FF89360F008918F999AB262C771E844DB91
                        APIs
                        • CharUpperBuffW.USER32(?,?), ref: 00F302E5
                        • _wcslen.LIBCMT ref: 00F3031F
                        • _wcslen.LIBCMT ref: 00F30389
                        • _wcslen.LIBCMT ref: 00F303F1
                        • _wcslen.LIBCMT ref: 00F30475
                        • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00F304C5
                        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00F30504
                          • Part of subcall function 00EBF9F2: _wcslen.LIBCMT ref: 00EBF9FD
                          • Part of subcall function 00F0223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00F02258
                          • Part of subcall function 00F0223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00F0228A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _wcslen$MessageSend$BuffCharUpper
                        • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                        • API String ID: 1103490817-719923060
                        • Opcode ID: 9c24ba992fc4f1f54c09543186927e7b1daf96109531a67d57f048b6f32f0b43
                        • Instruction ID: 67f90d58ecc1afdeeb17a674c6de07ddc4800a4725f404f950f5447fb00c03c6
                        • Opcode Fuzzy Hash: 9c24ba992fc4f1f54c09543186927e7b1daf96109531a67d57f048b6f32f0b43
                        • Instruction Fuzzy Hash: 94E190316183018FC714DF24C96192AB3E6BFC8724F14496EF896AB2A6DB30ED45EB51
                        APIs
                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00EB8968
                        • GetSystemMetrics.USER32(00000007), ref: 00EB8970
                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00EB899B
                        • GetSystemMetrics.USER32(00000008), ref: 00EB89A3
                        • GetSystemMetrics.USER32(00000004), ref: 00EB89C8
                        • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00EB89E5
                        • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00EB89F5
                        • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00EB8A28
                        • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00EB8A3C
                        • GetClientRect.USER32(00000000,000000FF), ref: 00EB8A5A
                        • GetStockObject.GDI32(00000011), ref: 00EB8A76
                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 00EB8A81
                          • Part of subcall function 00EB912D: GetCursorPos.USER32(?), ref: 00EB9141
                          • Part of subcall function 00EB912D: ScreenToClient.USER32(00000000,?), ref: 00EB915E
                          • Part of subcall function 00EB912D: GetAsyncKeyState.USER32(00000001), ref: 00EB9183
                          • Part of subcall function 00EB912D: GetAsyncKeyState.USER32(00000002), ref: 00EB919D
                        • SetTimer.USER32(00000000,00000000,00000028,00EB90FC), ref: 00EB8AA8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                        • String ID: AutoIt v3 GUI
                        • API String ID: 1458621304-248962490
                        • Opcode ID: 32b063ac2f78b2d26791c14031331fe4426791c8cd5e799abf72009f9e965f09
                        • Instruction ID: 2c9fc640aef0ee94fb447811d336954b22dc629a16d95bdcd65f02105142b05b
                        • Opcode Fuzzy Hash: 32b063ac2f78b2d26791c14031331fe4426791c8cd5e799abf72009f9e965f09
                        • Instruction Fuzzy Hash: 2EB17A71A00209AFDF14DFA8DD45BEE3BB5FB48314F14522AFA19B7290DB30A841DB51
                        APIs
                          • Part of subcall function 00F010F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00F01114
                          • Part of subcall function 00F010F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00F00B9B,?,?,?), ref: 00F01120
                          • Part of subcall function 00F010F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00F00B9B,?,?,?), ref: 00F0112F
                          • Part of subcall function 00F010F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00F00B9B,?,?,?), ref: 00F01136
                          • Part of subcall function 00F010F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00F0114D
                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00F00DF5
                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00F00E29
                        • GetLengthSid.ADVAPI32(?), ref: 00F00E40
                        • GetAce.ADVAPI32(?,00000000,?), ref: 00F00E7A
                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00F00E96
                        • GetLengthSid.ADVAPI32(?), ref: 00F00EAD
                        • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00F00EB5
                        • HeapAlloc.KERNEL32(00000000), ref: 00F00EBC
                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00F00EDD
                        • CopySid.ADVAPI32(00000000), ref: 00F00EE4
                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00F00F13
                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00F00F35
                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00F00F47
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F00F6E
                        • HeapFree.KERNEL32(00000000), ref: 00F00F75
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F00F7E
                        • HeapFree.KERNEL32(00000000), ref: 00F00F85
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F00F8E
                        • HeapFree.KERNEL32(00000000), ref: 00F00F95
                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00F00FA1
                        • HeapFree.KERNEL32(00000000), ref: 00F00FA8
                          • Part of subcall function 00F01193: GetProcessHeap.KERNEL32(00000008,00F00BB1,?,00000000,?,00F00BB1,?), ref: 00F011A1
                          • Part of subcall function 00F01193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00F00BB1,?), ref: 00F011A8
                          • Part of subcall function 00F01193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00F00BB1,?), ref: 00F011B7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                        • String ID:
                        • API String ID: 4175595110-0
                        • Opcode ID: 8a017de695470c1814d5394ece2490779548de64a8536352b12e4615179b9258
                        • Instruction ID: d4b2fdc964dd832a38b9ae446b59a58f3dadf970e1f8120dc1d118ddd335d5ff
                        • Opcode Fuzzy Hash: 8a017de695470c1814d5394ece2490779548de64a8536352b12e4615179b9258
                        • Instruction Fuzzy Hash: 05716D7290020AABDF209FA5DC44FAEBBB9FF05322F044115FA59F6191DB319905FBA0
                        APIs
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F2C4BD
                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00F3CC08,00000000,?,00000000,?,?), ref: 00F2C544
                        • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00F2C5A4
                        • _wcslen.LIBCMT ref: 00F2C5F4
                        • _wcslen.LIBCMT ref: 00F2C66F
                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00F2C6B2
                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00F2C7C1
                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00F2C84D
                        • RegCloseKey.ADVAPI32(?), ref: 00F2C881
                        • RegCloseKey.ADVAPI32(00000000), ref: 00F2C88E
                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00F2C960
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                        • API String ID: 9721498-966354055
                        • Opcode ID: 1e2f12c29ed057a3f37c3c7a720e6d8e1e1c6b839aa0146cce2190caceab47a4
                        • Instruction ID: 39d94011ff3825e0f6d10740ae84ed01aa998924cd62d6d7cbb4ea7ab2c60132
                        • Opcode Fuzzy Hash: 1e2f12c29ed057a3f37c3c7a720e6d8e1e1c6b839aa0146cce2190caceab47a4
                        • Instruction Fuzzy Hash: 4A127B756042119FC714EF14D891A2AB7E5EF89724F15885CF88AAB3A2DB31FC41DB81
                        APIs
                        • CharUpperBuffW.USER32(?,?), ref: 00F309C6
                        • _wcslen.LIBCMT ref: 00F30A01
                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00F30A54
                        • _wcslen.LIBCMT ref: 00F30A8A
                        • _wcslen.LIBCMT ref: 00F30B06
                        • _wcslen.LIBCMT ref: 00F30B81
                          • Part of subcall function 00EBF9F2: _wcslen.LIBCMT ref: 00EBF9FD
                          • Part of subcall function 00F02BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00F02BFA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _wcslen$MessageSend$BuffCharUpper
                        • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                        • API String ID: 1103490817-4258414348
                        • Opcode ID: 3950c4f616d457028edc5b1b332c79ec0dbaf719524c0c3d0fca3b1405ff7b87
                        • Instruction ID: 83d9dd5b971f8103d18e41ae7fccf96e0684e947a81cc00ea0ae666691f1ecb2
                        • Opcode Fuzzy Hash: 3950c4f616d457028edc5b1b332c79ec0dbaf719524c0c3d0fca3b1405ff7b87
                        • Instruction Fuzzy Hash: 70E1A1316083019FCB14EF24C46092AB7E1BFD9364F14495EF896AB3A2DB31ED45EB81
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _wcslen$BuffCharUpper
                        • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                        • API String ID: 1256254125-909552448
                        • Opcode ID: 7e73445e2de50f29843250843014e2a194fc94f97d04f5f7996cf2d4b346d70b
                        • Instruction ID: 3bead41573d20bbec15ca3efbe8537b8b4444fed0e0fbc86c24ed4a572978f0e
                        • Opcode Fuzzy Hash: 7e73445e2de50f29843250843014e2a194fc94f97d04f5f7996cf2d4b346d70b
                        • Instruction Fuzzy Hash: 8E71F533E0017A8BCB20DE7CED616BF3391AFA1764B150128F856AB285E635DD45B7D0
                        APIs
                        • _wcslen.LIBCMT ref: 00F3835A
                        • _wcslen.LIBCMT ref: 00F3836E
                        • _wcslen.LIBCMT ref: 00F38391
                        • _wcslen.LIBCMT ref: 00F383B4
                        • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00F383F2
                        • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00F35BF2), ref: 00F3844E
                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00F38487
                        • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00F384CA
                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00F38501
                        • FreeLibrary.KERNEL32(?), ref: 00F3850D
                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00F3851D
                        • DestroyIcon.USER32(?,?,?,?,?,00F35BF2), ref: 00F3852C
                        • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00F38549
                        • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00F38555
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                        • String ID: .dll$.exe$.icl
                        • API String ID: 799131459-1154884017
                        • Opcode ID: 636f7e95eff3829f3944c0c7af50f041317991966ecbad877c4097c4088c3954
                        • Instruction ID: 9246ada8da03cda542e605fa6a1f4203aea2f52bd17288df936ef49259840cab
                        • Opcode Fuzzy Hash: 636f7e95eff3829f3944c0c7af50f041317991966ecbad877c4097c4088c3954
                        • Instruction Fuzzy Hash: DF61B072940319BAEB14DF64CC41BFE77A8BF08771F104609F815E61D1DB79A981E7A0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                        • API String ID: 0-1645009161
                        • Opcode ID: 619b56b71483040bf40741118c3731280cd9ef6d9ac107530f06e2a4fb29809c
                        • Instruction ID: 5832a2d4c33b615900853e896b24cd1ff63536b6fa7e69e88a14ac9a48ef3fc9
                        • Opcode Fuzzy Hash: 619b56b71483040bf40741118c3731280cd9ef6d9ac107530f06e2a4fb29809c
                        • Instruction Fuzzy Hash: D381F671A04605BBDB20EF60DD42FEF37A8AF5A304F046025F944BE192EB75E911D7A1
                        APIs
                        • CharLowerBuffW.USER32(?,?), ref: 00F13EF8
                        • _wcslen.LIBCMT ref: 00F13F03
                        • _wcslen.LIBCMT ref: 00F13F5A
                        • _wcslen.LIBCMT ref: 00F13F98
                        • GetDriveTypeW.KERNEL32(?), ref: 00F13FD6
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F1401E
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F14059
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F14087
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: SendString_wcslen$BuffCharDriveLowerType
                        • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                        • API String ID: 1839972693-4113822522
                        • Opcode ID: b52c78425b84ede867b3509d5068a5cf01175d710d63b4db38e79359ac9401ea
                        • Instruction ID: 84dfaca74e6df33644a7358865a8a60c1a0ed83e6c5dd82c1c6c0aaa027356b4
                        • Opcode Fuzzy Hash: b52c78425b84ede867b3509d5068a5cf01175d710d63b4db38e79359ac9401ea
                        • Instruction Fuzzy Hash: 7671F532A042119FC710DF34C8809AAB7F4EF99768F10492DF895E7251EB31ED8ADB91
                        APIs
                        • LoadIconW.USER32(00000063), ref: 00F05A2E
                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00F05A40
                        • SetWindowTextW.USER32(?,?), ref: 00F05A57
                        • GetDlgItem.USER32(?,000003EA), ref: 00F05A6C
                        • SetWindowTextW.USER32(00000000,?), ref: 00F05A72
                        • GetDlgItem.USER32(?,000003E9), ref: 00F05A82
                        • SetWindowTextW.USER32(00000000,?), ref: 00F05A88
                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00F05AA9
                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00F05AC3
                        • GetWindowRect.USER32(?,?), ref: 00F05ACC
                        • _wcslen.LIBCMT ref: 00F05B33
                        • SetWindowTextW.USER32(?,?), ref: 00F05B6F
                        • GetDesktopWindow.USER32 ref: 00F05B75
                        • GetWindowRect.USER32(00000000), ref: 00F05B7C
                        • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00F05BD3
                        • GetClientRect.USER32(?,?), ref: 00F05BE0
                        • PostMessageW.USER32(?,00000005,00000000,?), ref: 00F05C05
                        • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00F05C2F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                        • String ID:
                        • API String ID: 895679908-0
                        • Opcode ID: 60fb29a81df242f1799b6dde487ebffbb55bd0f9b723d17f32c2ab3023103c19
                        • Instruction ID: b4429cd0edea73c0f8416f52c967c3f26cc8bcffa89bbe551297d4e9da3b911f
                        • Opcode Fuzzy Hash: 60fb29a81df242f1799b6dde487ebffbb55bd0f9b723d17f32c2ab3023103c19
                        • Instruction Fuzzy Hash: 9D717C71A00B09AFDB20DFA8CE85A6FBBF5FF48B14F104518E546A25A0D7B5E940EF50
                        APIs
                        • LoadCursorW.USER32(00000000,00007F89), ref: 00F1FE27
                        • LoadCursorW.USER32(00000000,00007F8A), ref: 00F1FE32
                        • LoadCursorW.USER32(00000000,00007F00), ref: 00F1FE3D
                        • LoadCursorW.USER32(00000000,00007F03), ref: 00F1FE48
                        • LoadCursorW.USER32(00000000,00007F8B), ref: 00F1FE53
                        • LoadCursorW.USER32(00000000,00007F01), ref: 00F1FE5E
                        • LoadCursorW.USER32(00000000,00007F81), ref: 00F1FE69
                        • LoadCursorW.USER32(00000000,00007F88), ref: 00F1FE74
                        • LoadCursorW.USER32(00000000,00007F80), ref: 00F1FE7F
                        • LoadCursorW.USER32(00000000,00007F86), ref: 00F1FE8A
                        • LoadCursorW.USER32(00000000,00007F83), ref: 00F1FE95
                        • LoadCursorW.USER32(00000000,00007F85), ref: 00F1FEA0
                        • LoadCursorW.USER32(00000000,00007F82), ref: 00F1FEAB
                        • LoadCursorW.USER32(00000000,00007F84), ref: 00F1FEB6
                        • LoadCursorW.USER32(00000000,00007F04), ref: 00F1FEC1
                        • LoadCursorW.USER32(00000000,00007F02), ref: 00F1FECC
                        • GetCursorInfo.USER32(?), ref: 00F1FEDC
                        • GetLastError.KERNEL32 ref: 00F1FF1E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Cursor$Load$ErrorInfoLast
                        • String ID:
                        • API String ID: 3215588206-0
                        • Opcode ID: 9bb2c952f15c882f7b4aa4cc230e5192204a4fb696bce99ad3868bcf68093732
                        • Instruction ID: 94a3d67b6f4765b135adc08616e34ccbe90f5e9c4dbf3ad8a231c138508e47e2
                        • Opcode Fuzzy Hash: 9bb2c952f15c882f7b4aa4cc230e5192204a4fb696bce99ad3868bcf68093732
                        • Instruction Fuzzy Hash: 094154B0D043196EDB109FBA8C8585EBFE8FF04364B54452AF11DEB281DB78A941CF91
                        APIs
                        • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00EC00C6
                          • Part of subcall function 00EC00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(00F7070C,00000FA0,4CA40546,?,?,?,?,00EE23B3,000000FF), ref: 00EC011C
                          • Part of subcall function 00EC00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00EE23B3,000000FF), ref: 00EC0127
                          • Part of subcall function 00EC00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00EE23B3,000000FF), ref: 00EC0138
                          • Part of subcall function 00EC00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00EC014E
                          • Part of subcall function 00EC00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00EC015C
                          • Part of subcall function 00EC00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00EC016A
                          • Part of subcall function 00EC00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00EC0195
                          • Part of subcall function 00EC00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00EC01A0
                        • ___scrt_fastfail.LIBCMT ref: 00EC00E7
                          • Part of subcall function 00EC00A3: __onexit.LIBCMT ref: 00EC00A9
                        Strings
                        • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00EC0122
                        • kernel32.dll, xrefs: 00EC0133
                        • WakeAllConditionVariable, xrefs: 00EC0162
                        • SleepConditionVariableCS, xrefs: 00EC0154
                        • InitializeConditionVariable, xrefs: 00EC0148
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                        • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                        • API String ID: 66158676-1714406822
                        • Opcode ID: c6c06f9648e224076d5b363031f81d608a5ef552a77e922cee4d01bb05c2d1d4
                        • Instruction ID: 848242928cdfc57184c43be0943b01f7eb75c24fe72ece99087d6f2c597e1352
                        • Opcode Fuzzy Hash: c6c06f9648e224076d5b363031f81d608a5ef552a77e922cee4d01bb05c2d1d4
                        • Instruction Fuzzy Hash: 5C21F232A45315EBE7106BA4AD0AF6AB2E4DB04B71F04112EF805F3291DFA19801AA92
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _wcslen
                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                        • API String ID: 176396367-1603158881
                        • Opcode ID: a30d478fa063a06f352809bf97248b3ec34ba8604d0c3286e707f3c12d1411bd
                        • Instruction ID: 764e803ec30c0999d595cc2d23ef57a6ae356aa40a011fd1dc9412234e1706e8
                        • Opcode Fuzzy Hash: a30d478fa063a06f352809bf97248b3ec34ba8604d0c3286e707f3c12d1411bd
                        • Instruction Fuzzy Hash: 08E1C432E00516ABCB18DFA8C851BFEBBB9BF54720F548119E456B7290DB30AE45B790
                        APIs
                        • CharLowerBuffW.USER32(00000000,00000000,00F3CC08), ref: 00F14527
                        • _wcslen.LIBCMT ref: 00F1453B
                        • _wcslen.LIBCMT ref: 00F14599
                        • _wcslen.LIBCMT ref: 00F145F4
                        • _wcslen.LIBCMT ref: 00F1463F
                        • _wcslen.LIBCMT ref: 00F146A7
                          • Part of subcall function 00EBF9F2: _wcslen.LIBCMT ref: 00EBF9FD
                        • GetDriveTypeW.KERNEL32(?,00F66BF0,00000061), ref: 00F14743
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _wcslen$BuffCharDriveLowerType
                        • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                        • API String ID: 2055661098-1000479233
                        • Opcode ID: 2193e52c7ed2b44495ee9be4343c0994138d6a65ef91e0e260c3c6cd50e45ddc
                        • Instruction ID: c17c8c1f9450199306cd0641feed6bf7c8ff9e0c7b309b8b0373addaf1bc66d3
                        • Opcode Fuzzy Hash: 2193e52c7ed2b44495ee9be4343c0994138d6a65ef91e0e260c3c6cd50e45ddc
                        • Instruction Fuzzy Hash: 2CB10071A083029FC710DF28C890AAAF7E5AFEA764F54491DF496D7291D730E884DB92
                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00F3CC08), ref: 00F240BB
                        • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00F240CD
                        • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,00F3CC08), ref: 00F240F2
                        • FreeLibrary.KERNEL32(00000000,?,00F3CC08), ref: 00F2413E
                        • StringFromGUID2.OLE32(?,?,00000028,?,00F3CC08), ref: 00F241A8
                        • SysFreeString.OLEAUT32(00000009), ref: 00F24262
                        • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00F242C8
                        • SysFreeString.OLEAUT32(?), ref: 00F242F2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                        • String ID: GetModuleHandleExW$kernel32.dll
                        • API String ID: 354098117-199464113
                        • Opcode ID: cdee3cde51396e93f4c423ee816820b1e80bb8b7fbcaa39bde33027fa1e04888
                        • Instruction ID: a3228eeb5d711891c624a745c68f9a25c2368aabb6574fdfa320558033691bbd
                        • Opcode Fuzzy Hash: cdee3cde51396e93f4c423ee816820b1e80bb8b7fbcaa39bde33027fa1e04888
                        • Instruction Fuzzy Hash: 24123A75A00129EFDB14DF94D884EAEBBB5FF49324F248098E905AB251C771FD42DBA0
                        APIs
                        • GetMenuItemCount.USER32(00F71990), ref: 00EE2F8D
                        • GetMenuItemCount.USER32(00F71990), ref: 00EE303D
                        • GetCursorPos.USER32(?), ref: 00EE3081
                        • SetForegroundWindow.USER32(00000000), ref: 00EE308A
                        • TrackPopupMenuEx.USER32(00F71990,00000000,?,00000000,00000000,00000000), ref: 00EE309D
                        • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00EE30A9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                        • String ID: 0
                        • API String ID: 36266755-4108050209
                        • Opcode ID: 6ad4238b20b451b0d9dca0f786cd403514042a84c18be6ad9d1e21fb2a22525e
                        • Instruction ID: c4791b538da4e6861e6aed7450fd3307ac6aa7f2834256d41cb90a97be2ce97d
                        • Opcode Fuzzy Hash: 6ad4238b20b451b0d9dca0f786cd403514042a84c18be6ad9d1e21fb2a22525e
                        • Instruction Fuzzy Hash: 35711731644259BEEB218F35CC49FAABF69FF05368F244206F6147A1E0C7B1AD50DB90
                        APIs
                        • DestroyWindow.USER32(00000000,?), ref: 00F36DEB
                          • Part of subcall function 00EA6B57: _wcslen.LIBCMT ref: 00EA6B6A
                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00F36E5F
                        • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00F36E81
                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00F36E94
                        • DestroyWindow.USER32(?), ref: 00F36EB5
                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00EA0000,00000000), ref: 00F36EE4
                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00F36EFD
                        • GetDesktopWindow.USER32 ref: 00F36F16
                        • GetWindowRect.USER32(00000000), ref: 00F36F1D
                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00F36F35
                        • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00F36F4D
                          • Part of subcall function 00EB9944: GetWindowLongW.USER32(?,000000EB), ref: 00EB9952
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                        • String ID: 0$tooltips_class32
                        • API String ID: 2429346358-3619404913
                        • Opcode ID: 52839a9fb1340a41db45f3b064105374a97d1a7cad76d93eb6c9e02de273753e
                        • Instruction ID: aaac000ff774c922d7b98091148891982702e40ba6871b69293124b324155937
                        • Opcode Fuzzy Hash: 52839a9fb1340a41db45f3b064105374a97d1a7cad76d93eb6c9e02de273753e
                        • Instruction Fuzzy Hash: 8D717C74504244AFDB21CF28D844B6ABBF9FB89324F04441DFA89D7261D770E94AEB26
                        APIs
                          • Part of subcall function 00EB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00EB9BB2
                        • DragQueryPoint.SHELL32(?,?), ref: 00F39147
                          • Part of subcall function 00F37674: ClientToScreen.USER32(?,?), ref: 00F3769A
                          • Part of subcall function 00F37674: GetWindowRect.USER32(?,?), ref: 00F37710
                          • Part of subcall function 00F37674: PtInRect.USER32(?,?,00F38B89), ref: 00F37720
                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00F391B0
                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00F391BB
                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00F391DE
                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00F39225
                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00F3923E
                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00F39255
                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00F39277
                        • DragFinish.SHELL32(?), ref: 00F3927E
                        • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00F39371
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                        • API String ID: 221274066-3440237614
                        • Opcode ID: a39100156e0972d24a14409bdd55910c06d9bf41fb1c2d4bb207397a0efa0129
                        • Instruction ID: 323ca1d413b25bdb7bddc2ea99b6fb70c07b6da3d505f3dff82850da098d4252
                        • Opcode Fuzzy Hash: a39100156e0972d24a14409bdd55910c06d9bf41fb1c2d4bb207397a0efa0129
                        • Instruction Fuzzy Hash: CE619C71108304AFD300EF54DC85DAFBBE9EF89360F00091EF595A72A1DB70AA49DB92
                        APIs
                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00F1C4B0
                        • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00F1C4C3
                        • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00F1C4D7
                        • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00F1C4F0
                        • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00F1C533
                        • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00F1C549
                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00F1C554
                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00F1C584
                        • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00F1C5DC
                        • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00F1C5F0
                        • InternetCloseHandle.WININET(00000000), ref: 00F1C5FB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                        • String ID:
                        • API String ID: 3800310941-3916222277
                        • Opcode ID: 3f1c30919355722f6560466d04211ded12f3776667878ec9620dc4cbc49d9b05
                        • Instruction ID: db2d77aa44316c04a9e5efbad82545c44be1ecfe77004e1d82d91dc3d5f89224
                        • Opcode Fuzzy Hash: 3f1c30919355722f6560466d04211ded12f3776667878ec9620dc4cbc49d9b05
                        • Instruction Fuzzy Hash: CF514AB1540209BFDB218F64C988ABB7BFEFF08764F044419F945A6210DB35E984ABA0
                        APIs
                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00F38592
                        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00F385A2
                        • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00F385AD
                        • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00F385BA
                        • GlobalLock.KERNEL32(00000000), ref: 00F385C8
                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00F385D7
                        • GlobalUnlock.KERNEL32(00000000), ref: 00F385E0
                        • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00F385E7
                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00F385F8
                        • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,00F3FC38,?), ref: 00F38611
                        • GlobalFree.KERNEL32(00000000), ref: 00F38621
                        • GetObjectW.GDI32(?,00000018,?), ref: 00F38641
                        • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00F38671
                        • DeleteObject.GDI32(?), ref: 00F38699
                        • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00F386AF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                        • String ID:
                        • API String ID: 3840717409-0
                        • Opcode ID: 827249dfd8d41a8c53d6daf985a58b1f8579c3bf7d228d47679c0d111c3e909e
                        • Instruction ID: 8838185befdabe70d90f45c8df2e60d4a5508e38b4bec77d1a4957090babbd3f
                        • Opcode Fuzzy Hash: 827249dfd8d41a8c53d6daf985a58b1f8579c3bf7d228d47679c0d111c3e909e
                        • Instruction Fuzzy Hash: F241FB75600208AFDB119FA5DC89EAB7BB9FF89761F148058F905E7260DB349D01EB60
                        APIs
                        • VariantInit.OLEAUT32(00000000), ref: 00F11502
                        • VariantCopy.OLEAUT32(?,?), ref: 00F1150B
                        • VariantClear.OLEAUT32(?), ref: 00F11517
                        • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00F115FB
                        • VarR8FromDec.OLEAUT32(?,?), ref: 00F11657
                        • VariantInit.OLEAUT32(?), ref: 00F11708
                        • SysFreeString.OLEAUT32(?), ref: 00F1178C
                        • VariantClear.OLEAUT32(?), ref: 00F117D8
                        • VariantClear.OLEAUT32(?), ref: 00F117E7
                        • VariantInit.OLEAUT32(00000000), ref: 00F11823
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                        • String ID: %4d%02d%02d%02d%02d%02d$Default
                        • API String ID: 1234038744-3931177956
                        • Opcode ID: e2f56bc6095178a6f2e406bf97ef79c4906cf872ba28de8d219979824c5383c0
                        • Instruction ID: da4b243611e3fbbbb34805477fac7db864ed972eaaa311703914a8d1882b9053
                        • Opcode Fuzzy Hash: e2f56bc6095178a6f2e406bf97ef79c4906cf872ba28de8d219979824c5383c0
                        • Instruction Fuzzy Hash: 75D10132A10115DBDB109F65D884BFEB7F6BF45710F188156F646AB280DB34EC84EBA2
                        APIs
                          • Part of subcall function 00EA9CB3: _wcslen.LIBCMT ref: 00EA9CBD
                          • Part of subcall function 00F2C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F2B6AE,?,?), ref: 00F2C9B5
                          • Part of subcall function 00F2C998: _wcslen.LIBCMT ref: 00F2C9F1
                          • Part of subcall function 00F2C998: _wcslen.LIBCMT ref: 00F2CA68
                          • Part of subcall function 00F2C998: _wcslen.LIBCMT ref: 00F2CA9E
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F2B6F4
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00F2B772
                        • RegDeleteValueW.ADVAPI32(?,?), ref: 00F2B80A
                        • RegCloseKey.ADVAPI32(?), ref: 00F2B87E
                        • RegCloseKey.ADVAPI32(?), ref: 00F2B89C
                        • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00F2B8F2
                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00F2B904
                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00F2B922
                        • FreeLibrary.KERNEL32(00000000), ref: 00F2B983
                        • RegCloseKey.ADVAPI32(00000000), ref: 00F2B994
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                        • String ID: RegDeleteKeyExW$advapi32.dll
                        • API String ID: 146587525-4033151799
                        • Opcode ID: cc6461d1a422e7a26a42806bfebb2097fefe54b8035e8fd251fb110d84448bcc
                        • Instruction ID: 97d79bb65d68e949fbe1469e9afb363db00da70d5d4f6cd4123362fbb3f4d5bd
                        • Opcode Fuzzy Hash: cc6461d1a422e7a26a42806bfebb2097fefe54b8035e8fd251fb110d84448bcc
                        • Instruction Fuzzy Hash: F1C1C035604211AFD714DF14D494F2ABBE1FF89318F18849CF89A9B2A2CB35EC46DB81
                        APIs
                        • GetDC.USER32(00000000), ref: 00F225D8
                        • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00F225E8
                        • CreateCompatibleDC.GDI32(?), ref: 00F225F4
                        • SelectObject.GDI32(00000000,?), ref: 00F22601
                        • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00F2266D
                        • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00F226AC
                        • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00F226D0
                        • SelectObject.GDI32(?,?), ref: 00F226D8
                        • DeleteObject.GDI32(?), ref: 00F226E1
                        • DeleteDC.GDI32(?), ref: 00F226E8
                        • ReleaseDC.USER32(00000000,?), ref: 00F226F3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                        • String ID: (
                        • API String ID: 2598888154-3887548279
                        • Opcode ID: ba4b14e11f506d95ea696067efef5426f20b195aea15839634bc10666fb313d3
                        • Instruction ID: 8222f786dd87b60b279a0216ebaea069c2c788d96717f40ab80b72190e6329f9
                        • Opcode Fuzzy Hash: ba4b14e11f506d95ea696067efef5426f20b195aea15839634bc10666fb313d3
                        • Instruction Fuzzy Hash: D161E376D00219EFCF14CFA4DC85AAEBBB6FF48310F208529E955A7250D774A941EF90
                        APIs
                        • ___free_lconv_mon.LIBCMT ref: 00EDDAA1
                          • Part of subcall function 00EDD63C: _free.LIBCMT ref: 00EDD659
                          • Part of subcall function 00EDD63C: _free.LIBCMT ref: 00EDD66B
                          • Part of subcall function 00EDD63C: _free.LIBCMT ref: 00EDD67D
                          • Part of subcall function 00EDD63C: _free.LIBCMT ref: 00EDD68F
                          • Part of subcall function 00EDD63C: _free.LIBCMT ref: 00EDD6A1
                          • Part of subcall function 00EDD63C: _free.LIBCMT ref: 00EDD6B3
                          • Part of subcall function 00EDD63C: _free.LIBCMT ref: 00EDD6C5
                          • Part of subcall function 00EDD63C: _free.LIBCMT ref: 00EDD6D7
                          • Part of subcall function 00EDD63C: _free.LIBCMT ref: 00EDD6E9
                          • Part of subcall function 00EDD63C: _free.LIBCMT ref: 00EDD6FB
                          • Part of subcall function 00EDD63C: _free.LIBCMT ref: 00EDD70D
                          • Part of subcall function 00EDD63C: _free.LIBCMT ref: 00EDD71F
                          • Part of subcall function 00EDD63C: _free.LIBCMT ref: 00EDD731
                        • _free.LIBCMT ref: 00EDDA96
                          • Part of subcall function 00ED29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00EDD7D1,00000000,00000000,00000000,00000000,?,00EDD7F8,00000000,00000007,00000000,?,00EDDBF5,00000000), ref: 00ED29DE
                          • Part of subcall function 00ED29C8: GetLastError.KERNEL32(00000000,?,00EDD7D1,00000000,00000000,00000000,00000000,?,00EDD7F8,00000000,00000007,00000000,?,00EDDBF5,00000000,00000000), ref: 00ED29F0
                        • _free.LIBCMT ref: 00EDDAB8
                        • _free.LIBCMT ref: 00EDDACD
                        • _free.LIBCMT ref: 00EDDAD8
                        • _free.LIBCMT ref: 00EDDAFA
                        • _free.LIBCMT ref: 00EDDB0D
                        • _free.LIBCMT ref: 00EDDB1B
                        • _free.LIBCMT ref: 00EDDB26
                        • _free.LIBCMT ref: 00EDDB5E
                        • _free.LIBCMT ref: 00EDDB65
                        • _free.LIBCMT ref: 00EDDB82
                        • _free.LIBCMT ref: 00EDDB9A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                        • String ID:
                        • API String ID: 161543041-0
                        • Opcode ID: 1d1087ed3f86e960b80f141e9035582ae26a47d1fc18f4711907058c0f495d66
                        • Instruction ID: 6f60d30af5b674fcc3bcf8116bb9ee69b6094341eccde52cfe91689a6b754ebe
                        • Opcode Fuzzy Hash: 1d1087ed3f86e960b80f141e9035582ae26a47d1fc18f4711907058c0f495d66
                        • Instruction Fuzzy Hash: 50315C316086049FEB21AA38EC45B5677E8FF50318F15641BE559EB391DA32AC429720
                        APIs
                        • GetClassNameW.USER32(?,?,00000100), ref: 00F0369C
                        • _wcslen.LIBCMT ref: 00F036A7
                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00F03797
                        • GetClassNameW.USER32(?,?,00000400), ref: 00F0380C
                        • GetDlgCtrlID.USER32(?), ref: 00F0385D
                        • GetWindowRect.USER32(?,?), ref: 00F03882
                        • GetParent.USER32(?), ref: 00F038A0
                        • ScreenToClient.USER32(00000000), ref: 00F038A7
                        • GetClassNameW.USER32(?,?,00000100), ref: 00F03921
                        • GetWindowTextW.USER32(?,?,00000400), ref: 00F0395D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                        • String ID: %s%u
                        • API String ID: 4010501982-679674701
                        • Opcode ID: 830cd0e078a64c1546e698ada07d9a8d7448ef5e97f026bce8a82b687af231f0
                        • Instruction ID: b247c90e7a4fb77b93cc51f52908d4cfe79fd151d0d130c7a41705977684c462
                        • Opcode Fuzzy Hash: 830cd0e078a64c1546e698ada07d9a8d7448ef5e97f026bce8a82b687af231f0
                        • Instruction Fuzzy Hash: 5E91AD72604606AFD719DF24C885FAAF7EDFF44360F008629F99992190DB30EA45EB91
                        APIs
                        • GetClassNameW.USER32(?,?,00000400), ref: 00F04994
                        • GetWindowTextW.USER32(?,?,00000400), ref: 00F049DA
                        • _wcslen.LIBCMT ref: 00F049EB
                        • CharUpperBuffW.USER32(?,00000000), ref: 00F049F7
                        • _wcsstr.LIBVCRUNTIME ref: 00F04A2C
                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00F04A64
                        • GetWindowTextW.USER32(?,?,00000400), ref: 00F04A9D
                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00F04AE6
                        • GetClassNameW.USER32(?,?,00000400), ref: 00F04B20
                        • GetWindowRect.USER32(?,?), ref: 00F04B8B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                        • String ID: ThumbnailClass
                        • API String ID: 1311036022-1241985126
                        • Opcode ID: 622f1155c396891e0780756b57e51c322a9b43b832ea6272ce299da95a2555b7
                        • Instruction ID: 9eac6447e64b36ab3fdfb49466d9523121128926483e480dd77b8b8e9689cde2
                        • Opcode Fuzzy Hash: 622f1155c396891e0780756b57e51c322a9b43b832ea6272ce299da95a2555b7
                        • Instruction Fuzzy Hash: F091BEB25042059BDB04CF14C981FAA77E9FF84324F048469FE859A0D6DB34FD45EBA1
                        APIs
                          • Part of subcall function 00EB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00EB9BB2
                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00F38D5A
                        • GetFocus.USER32 ref: 00F38D6A
                        • GetDlgCtrlID.USER32(00000000), ref: 00F38D75
                        • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00F38E1D
                        • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00F38ECF
                        • GetMenuItemCount.USER32(?), ref: 00F38EEC
                        • GetMenuItemID.USER32(?,00000000), ref: 00F38EFC
                        • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00F38F2E
                        • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00F38F70
                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00F38FA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                        • String ID: 0
                        • API String ID: 1026556194-4108050209
                        • Opcode ID: aadb55a4cb1bef0092880ece0188ce424aa2f16ab64f08a5b289953e9645cd09
                        • Instruction ID: 1c29dc92a64b6b51e946b328742a3d698126e01e1d8e33cc2e13e5b2b6a7ae32
                        • Opcode Fuzzy Hash: aadb55a4cb1bef0092880ece0188ce424aa2f16ab64f08a5b289953e9645cd09
                        • Instruction Fuzzy Hash: 7481B2719043059FD710DF24C884AAB7BE9FF883B4F14051DF985A7291DB38D946EBA2
                        APIs
                        • GetMenuItemInfoW.USER32(00F71990,000000FF,00000000,00000030), ref: 00F0BFAC
                        • SetMenuItemInfoW.USER32(00F71990,00000004,00000000,00000030), ref: 00F0BFE1
                        • Sleep.KERNEL32(000001F4), ref: 00F0BFF3
                        • GetMenuItemCount.USER32(?), ref: 00F0C039
                        • GetMenuItemID.USER32(?,00000000), ref: 00F0C056
                        • GetMenuItemID.USER32(?,-00000001), ref: 00F0C082
                        • GetMenuItemID.USER32(?,?), ref: 00F0C0C9
                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00F0C10F
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F0C124
                        • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F0C145
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ItemMenu$Info$CheckCountRadioSleep
                        • String ID: 0
                        • API String ID: 1460738036-4108050209
                        • Opcode ID: 7b681f4dfbec532cae0348a8911fd9f88e216c3bcf08256c8e3f127b4c7eb264
                        • Instruction ID: 7379761cbb64fc414aee917f1b2fe6994a1db84b1679262ed2fe40f32e6d8e07
                        • Opcode Fuzzy Hash: 7b681f4dfbec532cae0348a8911fd9f88e216c3bcf08256c8e3f127b4c7eb264
                        • Instruction Fuzzy Hash: EF619DB190024AEFDF11CF68CD88AEEBBA9EB05364F044215F811A32D1C735AD45FBA1
                        APIs
                        • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00F0DC20
                        • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00F0DC46
                        • _wcslen.LIBCMT ref: 00F0DC50
                        • _wcsstr.LIBVCRUNTIME ref: 00F0DCA0
                        • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00F0DCBC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                        • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                        • API String ID: 1939486746-1459072770
                        • Opcode ID: b021c3f4a9eef532de143470c02395a05a83d18a28111282ac1da50c09240ab6
                        • Instruction ID: a33bc0726015942af6b594129b77cdfffb6868de26579031e2cf7fe9474374ad
                        • Opcode Fuzzy Hash: b021c3f4a9eef532de143470c02395a05a83d18a28111282ac1da50c09240ab6
                        • Instruction Fuzzy Hash: C441F2729402057ADB14A7B49C47FFF77ACEF41720F101069F900B61D2EA72DA02A7A5
                        APIs
                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00F2CC64
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00F2CC8D
                        • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00F2CD48
                          • Part of subcall function 00F2CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00F2CCAA
                          • Part of subcall function 00F2CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00F2CCBD
                          • Part of subcall function 00F2CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00F2CCCF
                          • Part of subcall function 00F2CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00F2CD05
                          • Part of subcall function 00F2CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00F2CD28
                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00F2CCF3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                        • String ID: RegDeleteKeyExW$advapi32.dll
                        • API String ID: 2734957052-4033151799
                        • Opcode ID: d4e02a57a4715c97e93851d97b7acdbf8f1ca69d843cb4b65cdbecef66f349e0
                        • Instruction ID: 3fa0ab2b51337e84b72f327f105ec997f0e5f1c607c34f0a14570fb501a8b29e
                        • Opcode Fuzzy Hash: d4e02a57a4715c97e93851d97b7acdbf8f1ca69d843cb4b65cdbecef66f349e0
                        • Instruction Fuzzy Hash: FB316BB6941128BBDB209B61EC88EEFBB7DEF05764F000165A915E3240DA749A45BBE0
                        APIs
                        • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00F13D40
                        • _wcslen.LIBCMT ref: 00F13D6D
                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00F13D9D
                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00F13DBE
                        • RemoveDirectoryW.KERNEL32(?), ref: 00F13DCE
                        • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00F13E55
                        • CloseHandle.KERNEL32(00000000), ref: 00F13E60
                        • CloseHandle.KERNEL32(00000000), ref: 00F13E6B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                        • String ID: :$\$\??\%s
                        • API String ID: 1149970189-3457252023
                        • Opcode ID: b98fb98bdc7333b51b91ef4c43af6539ea06dc9beb6784323a9da4ed531b2bc8
                        • Instruction ID: d59dd7e9a788ed63c659b71e642e58937f08c70041bc6ede7a34611d8d2def84
                        • Opcode Fuzzy Hash: b98fb98bdc7333b51b91ef4c43af6539ea06dc9beb6784323a9da4ed531b2bc8
                        • Instruction Fuzzy Hash: FB31927290021DABDB219BA0DC89FEF37BDEF88710F1041B9F505E60A0EB7497849B64
                        APIs
                        • timeGetTime.WINMM ref: 00F0E6B4
                          • Part of subcall function 00EBE551: timeGetTime.WINMM(?,?,00F0E6D4), ref: 00EBE555
                        • Sleep.KERNEL32(0000000A), ref: 00F0E6E1
                        • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 00F0E705
                        • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00F0E727
                        • SetActiveWindow.USER32 ref: 00F0E746
                        • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00F0E754
                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 00F0E773
                        • Sleep.KERNEL32(000000FA), ref: 00F0E77E
                        • IsWindow.USER32 ref: 00F0E78A
                        • EndDialog.USER32(00000000), ref: 00F0E79B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                        • String ID: BUTTON
                        • API String ID: 1194449130-3405671355
                        • Opcode ID: c531d91e156f188f0899843e4cad16fd232637ce9c55cdc3296bfdda32c7dc24
                        • Instruction ID: 23013e08469aca46b4f2cf44b843a89e998355eea8f501aacf4fde8715506bda
                        • Opcode Fuzzy Hash: c531d91e156f188f0899843e4cad16fd232637ce9c55cdc3296bfdda32c7dc24
                        • Instruction Fuzzy Hash: 8E21A87130020CAFEB406F24FC89B257B6AF754769F140825F51A911F1DB759C40BB56
                        APIs
                          • Part of subcall function 00EA9CB3: _wcslen.LIBCMT ref: 00EA9CBD
                        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00F0EA5D
                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00F0EA73
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F0EA84
                        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00F0EA96
                        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00F0EAA7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: SendString$_wcslen
                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                        • API String ID: 2420728520-1007645807
                        • Opcode ID: a3f5cac3c2c4cd2202007b0ed00fc62dc2617564806ff33991fe9b318af8fd99
                        • Instruction ID: 98c8df3c7e5ba0f5f5b831fa4e41137b6540c0af1e78bf66fa3bcc89d54ad2cd
                        • Opcode Fuzzy Hash: a3f5cac3c2c4cd2202007b0ed00fc62dc2617564806ff33991fe9b318af8fd99
                        • Instruction Fuzzy Hash: FC117331B5021979D720A7A1DC4AEFFAABCEBD6B50F0408297811E60D1EFB05905EAB1
                        APIs
                        • GetKeyboardState.USER32(?), ref: 00F0A012
                        • SetKeyboardState.USER32(?), ref: 00F0A07D
                        • GetAsyncKeyState.USER32(000000A0), ref: 00F0A09D
                        • GetKeyState.USER32(000000A0), ref: 00F0A0B4
                        • GetAsyncKeyState.USER32(000000A1), ref: 00F0A0E3
                        • GetKeyState.USER32(000000A1), ref: 00F0A0F4
                        • GetAsyncKeyState.USER32(00000011), ref: 00F0A120
                        • GetKeyState.USER32(00000011), ref: 00F0A12E
                        • GetAsyncKeyState.USER32(00000012), ref: 00F0A157
                        • GetKeyState.USER32(00000012), ref: 00F0A165
                        • GetAsyncKeyState.USER32(0000005B), ref: 00F0A18E
                        • GetKeyState.USER32(0000005B), ref: 00F0A19C
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: State$Async$Keyboard
                        • String ID:
                        • API String ID: 541375521-0
                        • Opcode ID: f71a2c5e85ad2c4e5d7b2ad1782092cf2f82bcf6009b820fcdf9ccb0e2eae6a7
                        • Instruction ID: a4f13a171bcbfd3b74abe8f167508ed09687649091cbe77ffe44eac781023b44
                        • Opcode Fuzzy Hash: f71a2c5e85ad2c4e5d7b2ad1782092cf2f82bcf6009b820fcdf9ccb0e2eae6a7
                        • Instruction Fuzzy Hash: 9851FD30D0878869FB35DB7089117EABFF55F11390F088599D5C2571C3EA949A4CFBA2
                        APIs
                        • GetDlgItem.USER32(?,00000001), ref: 00F05CE2
                        • GetWindowRect.USER32(00000000,?), ref: 00F05CFB
                        • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00F05D59
                        • GetDlgItem.USER32(?,00000002), ref: 00F05D69
                        • GetWindowRect.USER32(00000000,?), ref: 00F05D7B
                        • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00F05DCF
                        • GetDlgItem.USER32(?,000003E9), ref: 00F05DDD
                        • GetWindowRect.USER32(00000000,?), ref: 00F05DEF
                        • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00F05E31
                        • GetDlgItem.USER32(?,000003EA), ref: 00F05E44
                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00F05E5A
                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00F05E67
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Window$ItemMoveRect$Invalidate
                        • String ID:
                        • API String ID: 3096461208-0
                        • Opcode ID: 4a4fc91ecc46d9de464b64af92ded74bd74d4345fa4e19ca287ec91c3d9c9d9e
                        • Instruction ID: 553db9a0d2cb775e1e226a8869c577f49947a5d6561acec92e6e6418269a9cd2
                        • Opcode Fuzzy Hash: 4a4fc91ecc46d9de464b64af92ded74bd74d4345fa4e19ca287ec91c3d9c9d9e
                        • Instruction Fuzzy Hash: 0551FDB1E00619AFDF18CF68DD89AAEBBB6EB48710F148129F915E7290D7709E04DF50
                        APIs
                          • Part of subcall function 00EB8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00EB8BE8,?,00000000,?,?,?,?,00EB8BBA,00000000,?), ref: 00EB8FC5
                        • DestroyWindow.USER32(?), ref: 00EB8C81
                        • KillTimer.USER32(00000000,?,?,?,?,00EB8BBA,00000000,?), ref: 00EB8D1B
                        • DestroyAcceleratorTable.USER32(00000000), ref: 00EF6973
                        • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00EB8BBA,00000000,?), ref: 00EF69A1
                        • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00EB8BBA,00000000,?), ref: 00EF69B8
                        • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00EB8BBA,00000000), ref: 00EF69D4
                        • DeleteObject.GDI32(00000000), ref: 00EF69E6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                        • String ID:
                        • API String ID: 641708696-0
                        • Opcode ID: c005b08b363a33d1e406051f6295cc24fd73824f5a237f84a767866d2349df6f
                        • Instruction ID: b14ab805676d22a2db93a0ee48a7d39fdaa616d7b83a668b881e420821dbd6a0
                        • Opcode Fuzzy Hash: c005b08b363a33d1e406051f6295cc24fd73824f5a237f84a767866d2349df6f
                        • Instruction Fuzzy Hash: FB61EE71101608DFDB258F18DA48BB6BBF5FB4031AF14641DE246BA660CB71ACC5EF92
                        APIs
                          • Part of subcall function 00EB9944: GetWindowLongW.USER32(?,000000EB), ref: 00EB9952
                        • GetSysColor.USER32(0000000F), ref: 00EB9862
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ColorLongWindow
                        • String ID:
                        • API String ID: 259745315-0
                        • Opcode ID: b6d6f632ad1c1151e294c004d6a5d3cda8ce041ec4c0b621d276216baf5395aa
                        • Instruction ID: 4ba13f8ff1e8daf3acd8e59b92071cd7d2f3bfdb54da77271740074232b57675
                        • Opcode Fuzzy Hash: b6d6f632ad1c1151e294c004d6a5d3cda8ce041ec4c0b621d276216baf5395aa
                        • Instruction Fuzzy Hash: 3A41B231104648AFDB255F389C84BFA3BB6EB46334F145619FBA2A71E2D7319C42EB50
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID: .
                        • API String ID: 0-3963672497
                        • Opcode ID: bcb4e84b754706eaa012ab9e5c4fac0e1a64c0d46ea88310f41f507371dbd9a4
                        • Instruction ID: 3b5049b49cd6fc100058200ade4f8b845d9fcb9ac9fec2020244cb79249a33dc
                        • Opcode Fuzzy Hash: bcb4e84b754706eaa012ab9e5c4fac0e1a64c0d46ea88310f41f507371dbd9a4
                        • Instruction Fuzzy Hash: 90C1F274A04249AFDB11DFA8DD41BEDBBF1EF09310F08605AE918B7392CB318942DB61
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,00EEF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00F09717
                        • LoadStringW.USER32(00000000,?,00EEF7F8,00000001), ref: 00F09720
                          • Part of subcall function 00EA9CB3: _wcslen.LIBCMT ref: 00EA9CBD
                        • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00EEF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00F09742
                        • LoadStringW.USER32(00000000,?,00EEF7F8,00000001), ref: 00F09745
                        • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00F09866
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: HandleLoadModuleString$Message_wcslen
                        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                        • API String ID: 747408836-2268648507
                        • Opcode ID: 794b470d729137a35cc318c95b7441f9879982f218a048993a0d0f7626dd1660
                        • Instruction ID: ebed174ce0ceb93b5cdcaebe881406b3462625d214df48c249d3126811b9504e
                        • Opcode Fuzzy Hash: 794b470d729137a35cc318c95b7441f9879982f218a048993a0d0f7626dd1660
                        • Instruction Fuzzy Hash: B8416272804219AACF04EBE0CD42DEEB7B8EF5A340F505065F505B6092EF756F48EB61
                        APIs
                          • Part of subcall function 00EA6B57: _wcslen.LIBCMT ref: 00EA6B6A
                        • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00F007A2
                        • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00F007BE
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00F007DA
                        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00F00804
                        • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00F0082C
                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00F00837
                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00F0083C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                        • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                        • API String ID: 323675364-22481851
                        • Opcode ID: bbf841242f5f3a3fc9b6da8f33b3b983e4452dd3502397e623d7691212900f8e
                        • Instruction ID: 74b6b316a51464cb733712b71fcdcb8fc865f40841ad312597627186185d05c6
                        • Opcode Fuzzy Hash: bbf841242f5f3a3fc9b6da8f33b3b983e4452dd3502397e623d7691212900f8e
                        • Instruction Fuzzy Hash: 9D410972C10229ABDF15EBA4DC85DEDB7B8BF48750F044169F911B71A1EB34AE04DBA0
                        APIs
                        • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00F3403B
                        • CreateCompatibleDC.GDI32(00000000), ref: 00F34042
                        • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00F34055
                        • SelectObject.GDI32(00000000,00000000), ref: 00F3405D
                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 00F34068
                        • DeleteDC.GDI32(00000000), ref: 00F34072
                        • GetWindowLongW.USER32(?,000000EC), ref: 00F3407C
                        • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00F34092
                        • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 00F3409E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                        • String ID: static
                        • API String ID: 2559357485-2160076837
                        • Opcode ID: 5e9071e6c45677a654b14523a2409314188c94bbc825f6c0aa5efc5e1c753068
                        • Instruction ID: ec69dcce65532572511ec61a999ae576796862cea488178123335fd0a7876a4c
                        • Opcode Fuzzy Hash: 5e9071e6c45677a654b14523a2409314188c94bbc825f6c0aa5efc5e1c753068
                        • Instruction Fuzzy Hash: 0F316C72501219ABDF219FA4DC49FDA3BA9FF0D330F110211FA18E61A0C775E861EBA0
                        APIs
                        • VariantInit.OLEAUT32(?), ref: 00F23C5C
                        • CoInitialize.OLE32(00000000), ref: 00F23C8A
                        • CoUninitialize.OLE32 ref: 00F23C94
                        • _wcslen.LIBCMT ref: 00F23D2D
                        • GetRunningObjectTable.OLE32(00000000,?), ref: 00F23DB1
                        • SetErrorMode.KERNEL32(00000001,00000029), ref: 00F23ED5
                        • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00F23F0E
                        • CoGetObject.OLE32(?,00000000,00F3FB98,?), ref: 00F23F2D
                        • SetErrorMode.KERNEL32(00000000), ref: 00F23F40
                        • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00F23FC4
                        • VariantClear.OLEAUT32(?), ref: 00F23FD8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                        • String ID:
                        • API String ID: 429561992-0
                        • Opcode ID: 504298bbb9c605d72a073c738399c5840255a97f13ffaa27f90fdc0294843195
                        • Instruction ID: 7187813f059395f5dedc586cb096cdef5fe896bac3b41ac1d697fb080472ccda
                        • Opcode Fuzzy Hash: 504298bbb9c605d72a073c738399c5840255a97f13ffaa27f90fdc0294843195
                        • Instruction Fuzzy Hash: 50C167B1A083159FC700DF68D88492BB7E9FF89754F00491DF98AAB251DB34EE05DB92
                        APIs
                        • CoInitialize.OLE32(00000000), ref: 00F17AF3
                        • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00F17B8F
                        • SHGetDesktopFolder.SHELL32(?), ref: 00F17BA3
                        • CoCreateInstance.OLE32(00F3FD08,00000000,00000001,00F66E6C,?), ref: 00F17BEF
                        • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00F17C74
                        • CoTaskMemFree.OLE32(?,?), ref: 00F17CCC
                        • SHBrowseForFolderW.SHELL32(?), ref: 00F17D57
                        • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00F17D7A
                        • CoTaskMemFree.OLE32(00000000), ref: 00F17D81
                        • CoTaskMemFree.OLE32(00000000), ref: 00F17DD6
                        • CoUninitialize.OLE32 ref: 00F17DDC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                        • String ID:
                        • API String ID: 2762341140-0
                        • Opcode ID: a624922f8b727b3eafeb528f6401c3fea25d4c52c8a8a703e4904f4f8afe3c29
                        • Instruction ID: a9a81bad5270bc94690b5cbe214d4997f9aac949cb6e16c8377e863b00fbccc5
                        • Opcode Fuzzy Hash: a624922f8b727b3eafeb528f6401c3fea25d4c52c8a8a703e4904f4f8afe3c29
                        • Instruction Fuzzy Hash: 68C11D75A04209AFCB14DF64C884DAEBBF9FF48314B148499F919EB261D731EE81DB90
                        APIs
                        • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00F35504
                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00F35515
                        • CharNextW.USER32(00000158), ref: 00F35544
                        • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00F35585
                        • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00F3559B
                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00F355AC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$CharNext
                        • String ID:
                        • API String ID: 1350042424-0
                        • Opcode ID: ec65f50fdb37641d3e702e8e50e8ee0134e8dba4a2288da9ed6f29de1f0c5b17
                        • Instruction ID: 0edb08559a78a44bb9ba3c88bbad807c9598bafef2cdee78deb100eedff765ea
                        • Opcode Fuzzy Hash: ec65f50fdb37641d3e702e8e50e8ee0134e8dba4a2288da9ed6f29de1f0c5b17
                        • Instruction Fuzzy Hash: 9C61AB71901608EBDF10DF54CC85AFE3BB9EB89B34F148145F925AA290D7749A80EBA1
                        APIs
                        • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00EFFAAF
                        • SafeArrayAllocData.OLEAUT32(?), ref: 00EFFB08
                        • VariantInit.OLEAUT32(?), ref: 00EFFB1A
                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 00EFFB3A
                        • VariantCopy.OLEAUT32(?,?), ref: 00EFFB8D
                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 00EFFBA1
                        • VariantClear.OLEAUT32(?), ref: 00EFFBB6
                        • SafeArrayDestroyData.OLEAUT32(?), ref: 00EFFBC3
                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00EFFBCC
                        • VariantClear.OLEAUT32(?), ref: 00EFFBDE
                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00EFFBE9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                        • String ID:
                        • API String ID: 2706829360-0
                        • Opcode ID: 673916094edc272854d24a5bfdfe008736eea049b26b571b523263b0a19bf0de
                        • Instruction ID: 9808c76b062e91376ddb03e1704c9689722c0c0b8965b2c31f671590716686c6
                        • Opcode Fuzzy Hash: 673916094edc272854d24a5bfdfe008736eea049b26b571b523263b0a19bf0de
                        • Instruction Fuzzy Hash: 3D413D35A0021D9FCB04DFA4D8649FEBBB9EF48354F009069E956B7261DB30A945DBA0
                        APIs
                        • GetKeyboardState.USER32(?), ref: 00F09CA1
                        • GetAsyncKeyState.USER32(000000A0), ref: 00F09D22
                        • GetKeyState.USER32(000000A0), ref: 00F09D3D
                        • GetAsyncKeyState.USER32(000000A1), ref: 00F09D57
                        • GetKeyState.USER32(000000A1), ref: 00F09D6C
                        • GetAsyncKeyState.USER32(00000011), ref: 00F09D84
                        • GetKeyState.USER32(00000011), ref: 00F09D96
                        • GetAsyncKeyState.USER32(00000012), ref: 00F09DAE
                        • GetKeyState.USER32(00000012), ref: 00F09DC0
                        • GetAsyncKeyState.USER32(0000005B), ref: 00F09DD8
                        • GetKeyState.USER32(0000005B), ref: 00F09DEA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: State$Async$Keyboard
                        • String ID:
                        • API String ID: 541375521-0
                        • Opcode ID: 7866a642e3e7bf19edc6d980407066bf9d7d211c18896e9678779d86a7e92086
                        • Instruction ID: ae9b0f9194fef29562568d7ef72caf6aeeff6d3b33bf6d9df89f7bd56b603258
                        • Opcode Fuzzy Hash: 7866a642e3e7bf19edc6d980407066bf9d7d211c18896e9678779d86a7e92086
                        • Instruction Fuzzy Hash: 4441C534E4D7CA69FF308760C8043A5BEA16B11364F48805ADAC6565C3FBE49DC8F7A2
                        APIs
                        • WSAStartup.WSOCK32(00000101,?), ref: 00F205BC
                        • inet_addr.WSOCK32(?), ref: 00F2061C
                        • gethostbyname.WSOCK32(?), ref: 00F20628
                        • IcmpCreateFile.IPHLPAPI ref: 00F20636
                        • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00F206C6
                        • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00F206E5
                        • IcmpCloseHandle.IPHLPAPI(?), ref: 00F207B9
                        • WSACleanup.WSOCK32 ref: 00F207BF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                        • String ID: Ping
                        • API String ID: 1028309954-2246546115
                        • Opcode ID: 1af8aa1709df1f2a0832a50845ab9bd767fbc7454972a2eda916e3a537ecbf70
                        • Instruction ID: 2362bd4e06c286d60d3a8bf6c84249bb3a1af08994854606fb66c72e1ff72792
                        • Opcode Fuzzy Hash: 1af8aa1709df1f2a0832a50845ab9bd767fbc7454972a2eda916e3a537ecbf70
                        • Instruction Fuzzy Hash: A3919036A042119FD720DF15D889F1ABBE1AF48328F1485A9F4699B6A3CB30FD41DF91
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _wcslen$BuffCharLower
                        • String ID: cdecl$none$stdcall$winapi
                        • API String ID: 707087890-567219261
                        • Opcode ID: 02c68af1f41fb9f31ae0ddbd13ef82b71050649df218f369d8ef97ef1a1a063a
                        • Instruction ID: f57eb8e83c27acb4fe446ba998c952c7162ddde914dfe6c4d38a4efa2097a02c
                        • Opcode Fuzzy Hash: 02c68af1f41fb9f31ae0ddbd13ef82b71050649df218f369d8ef97ef1a1a063a
                        • Instruction Fuzzy Hash: 2B510532E015269BCF14DFACD9409BEB7E1BF643A0B614229E416EB2C5DB31DD42E790
                        APIs
                        • CoInitialize.OLE32 ref: 00F23774
                        • CoUninitialize.OLE32 ref: 00F2377F
                        • CoCreateInstance.OLE32(?,00000000,00000017,00F3FB78,?), ref: 00F237D9
                        • IIDFromString.OLE32(?,?), ref: 00F2384C
                        • VariantInit.OLEAUT32(?), ref: 00F238E4
                        • VariantClear.OLEAUT32(?), ref: 00F23936
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                        • API String ID: 636576611-1287834457
                        • Opcode ID: 1b80ad53d74d9c22ff10b2c7f054f00fa1e26853852bc022d2256cdda23ff680
                        • Instruction ID: 8c83f44cb170f164de057b6fa0c8e28563f4cf6accacc7977f49d508a93ca1c2
                        • Opcode Fuzzy Hash: 1b80ad53d74d9c22ff10b2c7f054f00fa1e26853852bc022d2256cdda23ff680
                        • Instruction Fuzzy Hash: F361D4B2608321AFD710DF54D848F9AB7E9EF49714F10080DF5859B291D778EE48EB92
                        APIs
                        • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00F133CF
                          • Part of subcall function 00EA9CB3: _wcslen.LIBCMT ref: 00EA9CBD
                        • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00F133F0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: LoadString$_wcslen
                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                        • API String ID: 4099089115-3080491070
                        • Opcode ID: 0c5b3f5d02c0b7ec170ed37f28cf12f99b0a4048efb601fd27ca4362e32e2c61
                        • Instruction ID: c34c64637c081492ff9140d2459465f747ea0aae90bbd9ddc7174bc6ff2e6646
                        • Opcode Fuzzy Hash: 0c5b3f5d02c0b7ec170ed37f28cf12f99b0a4048efb601fd27ca4362e32e2c61
                        • Instruction Fuzzy Hash: C851B371D00209AADF15EBE0CD42EEEB7B9EF09740F145065F405B6092EB356F98EB61
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _wcslen$BuffCharUpper
                        • String ID: APPEND$EXISTS$KEYS$REMOVE
                        • API String ID: 1256254125-769500911
                        • Opcode ID: 15000f4e0212fd863c2e2a73e5e7238422ab1a6105122d5a366da16ccb207c6a
                        • Instruction ID: 8648e9ff04364eeee8d82f328772cd4c9a5ad09a5f5e38cb0f296579bcddeb62
                        • Opcode Fuzzy Hash: 15000f4e0212fd863c2e2a73e5e7238422ab1a6105122d5a366da16ccb207c6a
                        • Instruction Fuzzy Hash: 0141D832E001279BCB105F7DC9905BE77A5AFA1B74B244269E421DB2C4EB32CD81F790
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 00F153A0
                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00F15416
                        • GetLastError.KERNEL32 ref: 00F15420
                        • SetErrorMode.KERNEL32(00000000,READY), ref: 00F154A7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Error$Mode$DiskFreeLastSpace
                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                        • API String ID: 4194297153-14809454
                        • Opcode ID: 1657341a62f0a4019a0c20d50e0d66f8bff547bfacc4a7e6150cbb00081695dd
                        • Instruction ID: 8854ce3b565d0b8d2082343214ea5194694ed8c4b030611475178552af1fc766
                        • Opcode Fuzzy Hash: 1657341a62f0a4019a0c20d50e0d66f8bff547bfacc4a7e6150cbb00081695dd
                        • Instruction Fuzzy Hash: F9319D35A00604DFD710DF68C894BEABBB4EB89725F148069E405DF292DB71EDC2EB90
                        APIs
                        • CreateMenu.USER32 ref: 00F33C79
                        • SetMenu.USER32(?,00000000), ref: 00F33C88
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F33D10
                        • IsMenu.USER32(?), ref: 00F33D24
                        • CreatePopupMenu.USER32 ref: 00F33D2E
                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00F33D5B
                        • DrawMenuBar.USER32 ref: 00F33D63
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Menu$CreateItem$DrawInfoInsertPopup
                        • String ID: 0$F
                        • API String ID: 161812096-3044882817
                        • Opcode ID: e72388397b328e0a474aae70c475c8b923068b6f74fa1e1e41588365722a28a8
                        • Instruction ID: ffb4d94f6c6757ae5bf226d6f3e3aa9748a7fb7a4eef04fc3dde3ef65c18a1e1
                        • Opcode Fuzzy Hash: e72388397b328e0a474aae70c475c8b923068b6f74fa1e1e41588365722a28a8
                        • Instruction Fuzzy Hash: 4D411975A01209EFDB14CF64D844BEA7BB6FF49360F140029FA46A7360D771AA14EF94
                        APIs
                          • Part of subcall function 00EA9CB3: _wcslen.LIBCMT ref: 00EA9CBD
                          • Part of subcall function 00F03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F03CCA
                        • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00F01F64
                        • GetDlgCtrlID.USER32 ref: 00F01F6F
                        • GetParent.USER32 ref: 00F01F8B
                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F01F8E
                        • GetDlgCtrlID.USER32(?), ref: 00F01F97
                        • GetParent.USER32(?), ref: 00F01FAB
                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F01FAE
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$CtrlParent$ClassName_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 711023334-1403004172
                        • Opcode ID: 62ce2d0cc8095688f2e8d00e234e7314bf68830e1ddce240a3dde0465ed1f3d6
                        • Instruction ID: 4ab77623ae479202d5e1776d0ca5510ed33ce45f62e961f02cf582e82f7bf78d
                        • Opcode Fuzzy Hash: 62ce2d0cc8095688f2e8d00e234e7314bf68830e1ddce240a3dde0465ed1f3d6
                        • Instruction Fuzzy Hash: E321B371900218BBCF04AFA0DC859EEBBB9EF0A360F104115F955B72D1CB385904BB60
                        APIs
                          • Part of subcall function 00EA9CB3: _wcslen.LIBCMT ref: 00EA9CBD
                          • Part of subcall function 00F03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F03CCA
                        • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 00F02043
                        • GetDlgCtrlID.USER32 ref: 00F0204E
                        • GetParent.USER32 ref: 00F0206A
                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F0206D
                        • GetDlgCtrlID.USER32(?), ref: 00F02076
                        • GetParent.USER32(?), ref: 00F0208A
                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F0208D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$CtrlParent$ClassName_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 711023334-1403004172
                        • Opcode ID: 633894afa80c943798054d3017d847ec5ad55d110e81475d6d8f003f51d44ffe
                        • Instruction ID: 8237e2ea078f8843726f07908778ec37346fdee8effe9d1934d14bda85620a83
                        • Opcode Fuzzy Hash: 633894afa80c943798054d3017d847ec5ad55d110e81475d6d8f003f51d44ffe
                        • Instruction Fuzzy Hash: BF21BE71900218BBDB14AFA0CC89AEEBBB9EB09350F104005B955A71A1CA799914FB60
                        APIs
                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00F33A9D
                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00F33AA0
                        • GetWindowLongW.USER32(?,000000F0), ref: 00F33AC7
                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00F33AEA
                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00F33B62
                        • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00F33BAC
                        • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00F33BC7
                        • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00F33BE2
                        • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00F33BF6
                        • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00F33C13
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$LongWindow
                        • String ID:
                        • API String ID: 312131281-0
                        • Opcode ID: 21fefc281f041b8d849022f0541364ff4bee52f7f55a2ab46d8eac21f534d116
                        • Instruction ID: 7fac2dddccc1b7effbbde07aeb3587d9c3129862d92e8b56874fee7d0f0a3344
                        • Opcode Fuzzy Hash: 21fefc281f041b8d849022f0541364ff4bee52f7f55a2ab46d8eac21f534d116
                        • Instruction Fuzzy Hash: 52616B75900248AFDB10DFA8CC81EEE77F8EF49720F104199FA15A72A1D774AE85EB50
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 00F0B151
                        • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00F0A1E1,?,00000001), ref: 00F0B165
                        • GetWindowThreadProcessId.USER32(00000000), ref: 00F0B16C
                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00F0A1E1,?,00000001), ref: 00F0B17B
                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00F0B18D
                        • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00F0A1E1,?,00000001), ref: 00F0B1A6
                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00F0A1E1,?,00000001), ref: 00F0B1B8
                        • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00F0A1E1,?,00000001), ref: 00F0B1FD
                        • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00F0A1E1,?,00000001), ref: 00F0B212
                        • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00F0A1E1,?,00000001), ref: 00F0B21D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                        • String ID:
                        • API String ID: 2156557900-0
                        • Opcode ID: a0274033a1e0f81bb1a20e7c68e71cd22d96e77a2d3425a8eff2e62368f6a2c1
                        • Instruction ID: f514c6a8bbfa810f83ee35ab6dc0d31c511b1f82d44467872d4bda33e93cad6d
                        • Opcode Fuzzy Hash: a0274033a1e0f81bb1a20e7c68e71cd22d96e77a2d3425a8eff2e62368f6a2c1
                        • Instruction Fuzzy Hash: 9B31AD71900208BFDB119F24DC49B6D7BAABB61325F104405FA09E62D0D7B49E80BFA1
                        APIs
                        • _free.LIBCMT ref: 00ED2C94
                          • Part of subcall function 00ED29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00EDD7D1,00000000,00000000,00000000,00000000,?,00EDD7F8,00000000,00000007,00000000,?,00EDDBF5,00000000), ref: 00ED29DE
                          • Part of subcall function 00ED29C8: GetLastError.KERNEL32(00000000,?,00EDD7D1,00000000,00000000,00000000,00000000,?,00EDD7F8,00000000,00000007,00000000,?,00EDDBF5,00000000,00000000), ref: 00ED29F0
                        • _free.LIBCMT ref: 00ED2CA0
                        • _free.LIBCMT ref: 00ED2CAB
                        • _free.LIBCMT ref: 00ED2CB6
                        • _free.LIBCMT ref: 00ED2CC1
                        • _free.LIBCMT ref: 00ED2CCC
                        • _free.LIBCMT ref: 00ED2CD7
                        • _free.LIBCMT ref: 00ED2CE2
                        • _free.LIBCMT ref: 00ED2CED
                        • _free.LIBCMT ref: 00ED2CFB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 9d3ecd0ce38caca86c68a4f4edd194f5890ce6d98cb50651e71d9ec4d1df64b3
                        • Instruction ID: aaf502842a91508c01066a8243d020aaf5f97e45a140bcbbe8f884deae2c58a3
                        • Opcode Fuzzy Hash: 9d3ecd0ce38caca86c68a4f4edd194f5890ce6d98cb50651e71d9ec4d1df64b3
                        • Instruction Fuzzy Hash: BF11B976500108BFCB02EF54D852CDD3BA5FF55350F4154AAFA486F322D632EE51AB90
                        APIs
                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F17FAD
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00F17FC1
                        • GetFileAttributesW.KERNEL32(?), ref: 00F17FEB
                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 00F18005
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00F18017
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00F18060
                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00F180B0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CurrentDirectory$AttributesFile
                        • String ID: *.*
                        • API String ID: 769691225-438819550
                        • Opcode ID: 7cc31f5cf79ef1d40ef4eedc6b5b42fbe99f9af3e90879eeb75c57d974a8dd5c
                        • Instruction ID: a6fef30af27cd7ae9710dfcf2e1bb25482d1cfff2d61f51e19ed22397dae788f
                        • Opcode Fuzzy Hash: 7cc31f5cf79ef1d40ef4eedc6b5b42fbe99f9af3e90879eeb75c57d974a8dd5c
                        • Instruction Fuzzy Hash: C481C4729083459BCB20EF14C844AEAB3E9BF89320F144C5EF489D7250DB75ED85EB92
                        APIs
                        • SetWindowLongW.USER32(?,000000EB), ref: 00EA5C7A
                          • Part of subcall function 00EA5D0A: GetClientRect.USER32(?,?), ref: 00EA5D30
                          • Part of subcall function 00EA5D0A: GetWindowRect.USER32(?,?), ref: 00EA5D71
                          • Part of subcall function 00EA5D0A: ScreenToClient.USER32(?,?), ref: 00EA5D99
                        • GetDC.USER32 ref: 00EE46F5
                        • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00EE4708
                        • SelectObject.GDI32(00000000,00000000), ref: 00EE4716
                        • SelectObject.GDI32(00000000,00000000), ref: 00EE472B
                        • ReleaseDC.USER32(?,00000000), ref: 00EE4733
                        • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00EE47C4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                        • String ID: U
                        • API String ID: 4009187628-3372436214
                        • Opcode ID: ae9da6042807d3e11f78b555e4da658e38d0a0124f67e021aaaa6c4e51bac9ab
                        • Instruction ID: fb4537bb23b52673b45d5089199b256cf215839df0280705c65c44bd0faa0b80
                        • Opcode Fuzzy Hash: ae9da6042807d3e11f78b555e4da658e38d0a0124f67e021aaaa6c4e51bac9ab
                        • Instruction Fuzzy Hash: 6971F471400249DFCF218F65C984AFA7BB5FF4A328F14526AED557A1A6C330D841EF90
                        APIs
                        • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00F135E4
                          • Part of subcall function 00EA9CB3: _wcslen.LIBCMT ref: 00EA9CBD
                        • LoadStringW.USER32(00F72390,?,00000FFF,?), ref: 00F1360A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: LoadString$_wcslen
                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                        • API String ID: 4099089115-2391861430
                        • Opcode ID: e821730296d975bee7fee4feec9c67e37376e99e1675a47b43dbd33d9c598416
                        • Instruction ID: 6ce05feb97e721e92a70761e64661d577a306e018ff18fd6d824fac58c7e0c64
                        • Opcode Fuzzy Hash: e821730296d975bee7fee4feec9c67e37376e99e1675a47b43dbd33d9c598416
                        • Instruction Fuzzy Hash: 1F519071C04219BADF14EBA0CC42EEEBBB4EF09350F145125F105760A2EB346B99EFA1
                        APIs
                          • Part of subcall function 00EB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00EB9BB2
                          • Part of subcall function 00EB912D: GetCursorPos.USER32(?), ref: 00EB9141
                          • Part of subcall function 00EB912D: ScreenToClient.USER32(00000000,?), ref: 00EB915E
                          • Part of subcall function 00EB912D: GetAsyncKeyState.USER32(00000001), ref: 00EB9183
                          • Part of subcall function 00EB912D: GetAsyncKeyState.USER32(00000002), ref: 00EB919D
                        • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00F38B6B
                        • ImageList_EndDrag.COMCTL32 ref: 00F38B71
                        • ReleaseCapture.USER32 ref: 00F38B77
                        • SetWindowTextW.USER32(?,00000000), ref: 00F38C12
                        • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00F38C25
                        • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00F38CFF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                        • String ID: @GUI_DRAGFILE$@GUI_DROPID
                        • API String ID: 1924731296-2107944366
                        • Opcode ID: 6762fc2da57bdd18c2905a806547b311719f1397b07dbc88e7d7e5e1a9d5a85b
                        • Instruction ID: a5ddded39ca754db366cf8d47e260471244b54c3158d7e4ffd37fce020ce7a79
                        • Opcode Fuzzy Hash: 6762fc2da57bdd18c2905a806547b311719f1397b07dbc88e7d7e5e1a9d5a85b
                        • Instruction Fuzzy Hash: 5D51CE71504304AFD704DF14DC56FAA77E5FB88760F00162DF956AB2E2CB34A948EBA2
                        APIs
                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00F1C272
                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00F1C29A
                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00F1C2CA
                        • GetLastError.KERNEL32 ref: 00F1C322
                        • SetEvent.KERNEL32(?), ref: 00F1C336
                        • InternetCloseHandle.WININET(00000000), ref: 00F1C341
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                        • String ID:
                        • API String ID: 3113390036-3916222277
                        • Opcode ID: f9f2e37ce45a6e4944c0503b78844b300d68ee5f210a303eda4198c1e0cbc0a6
                        • Instruction ID: 08698bb639c0a32c4619b8a93d88f45d4f19768c3866218376b1e69e260e3492
                        • Opcode Fuzzy Hash: f9f2e37ce45a6e4944c0503b78844b300d68ee5f210a303eda4198c1e0cbc0a6
                        • Instruction Fuzzy Hash: BD317FB1540208AFD7219F658C88AAB7BFDEB49764F10851DF456E2200DB34DD85ABE1
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00EE3AAF,?,?,Bad directive syntax error,00F3CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00F098BC
                        • LoadStringW.USER32(00000000,?,00EE3AAF,?), ref: 00F098C3
                          • Part of subcall function 00EA9CB3: _wcslen.LIBCMT ref: 00EA9CBD
                        • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00F09987
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: HandleLoadMessageModuleString_wcslen
                        • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                        • API String ID: 858772685-4153970271
                        • Opcode ID: 92dfe2cd00af60c51b9185dc165970970c497862cb8dc200dc6b421b5a622f62
                        • Instruction ID: 2a9054180828c957db2ea7e94c9febcce4b2d0661c5e3093d1a097e208e03f8a
                        • Opcode Fuzzy Hash: 92dfe2cd00af60c51b9185dc165970970c497862cb8dc200dc6b421b5a622f62
                        • Instruction Fuzzy Hash: E4217C3280421EABCF15AF90CC06EEE7BB5FF19300F045469F515760A2EB75AA18EB51
                        APIs
                        • GetParent.USER32 ref: 00F020AB
                        • GetClassNameW.USER32(00000000,?,00000100), ref: 00F020C0
                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00F0214D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ClassMessageNameParentSend
                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                        • API String ID: 1290815626-3381328864
                        • Opcode ID: d312a42e6e35811c49462e458095153e1b91dab4f970f07d3de07aa109417dbc
                        • Instruction ID: 45c6eed496444887d94a5c521df9c350ad8dbc362445297cba2eed33c0bb894b
                        • Opcode Fuzzy Hash: d312a42e6e35811c49462e458095153e1b91dab4f970f07d3de07aa109417dbc
                        • Instruction Fuzzy Hash: 8B112977688706B9FA152620DC0FEA677DCCF05734F20111AFB08B50E2FF62A8427664
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                        • String ID:
                        • API String ID: 1282221369-0
                        • Opcode ID: 8b00d74c6cba4e202df0e9a6c517c15cf0605a6bbf60472129c211adb0888e89
                        • Instruction ID: 396ca5f77c4a0bdbbf74163b474320aa7183998694c44ce71ca3ef9c871c56f6
                        • Opcode Fuzzy Hash: 8b00d74c6cba4e202df0e9a6c517c15cf0605a6bbf60472129c211adb0888e89
                        • Instruction Fuzzy Hash: 376177B1A04306AFDB21AFB49C81AA97BE6EF01394F24516FF904B7381DA329D03D750
                        APIs
                        • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00EF6890
                        • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00EF68A9
                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00EF68B9
                        • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00EF68D1
                        • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00EF68F2
                        • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00EB8874,00000000,00000000,00000000,000000FF,00000000), ref: 00EF6901
                        • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00EF691E
                        • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00EB8874,00000000,00000000,00000000,000000FF,00000000), ref: 00EF692D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Icon$DestroyExtractImageLoadMessageSend
                        • String ID:
                        • API String ID: 1268354404-0
                        • Opcode ID: e42a872f20e0e0b13bc5300ef49125d20c4914d3a531029a4530af772e4f4ae4
                        • Instruction ID: 59a222e6ddeaadb1a443ed162f8f9365eea332f068edc318230524537b7ab1c6
                        • Opcode Fuzzy Hash: e42a872f20e0e0b13bc5300ef49125d20c4914d3a531029a4530af772e4f4ae4
                        • Instruction Fuzzy Hash: CA516C74600209EFDB24CF24CC95BAA7BB6FB48764F105518FA56A72A0DB70E990EB50
                        APIs
                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00F1C182
                        • GetLastError.KERNEL32 ref: 00F1C195
                        • SetEvent.KERNEL32(?), ref: 00F1C1A9
                          • Part of subcall function 00F1C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00F1C272
                          • Part of subcall function 00F1C253: GetLastError.KERNEL32 ref: 00F1C322
                          • Part of subcall function 00F1C253: SetEvent.KERNEL32(?), ref: 00F1C336
                          • Part of subcall function 00F1C253: InternetCloseHandle.WININET(00000000), ref: 00F1C341
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                        • String ID:
                        • API String ID: 337547030-0
                        • Opcode ID: a80f34a28a79d0a326447d6d9a6471f0ed04d52c68807195628cb09d75d16469
                        • Instruction ID: 86ba0becf2f277aa26dfb9f03af40c1af02c6a2a05f1883c90d37b6f7d106ffb
                        • Opcode Fuzzy Hash: a80f34a28a79d0a326447d6d9a6471f0ed04d52c68807195628cb09d75d16469
                        • Instruction Fuzzy Hash: DA318C71680645BFDB219FA5DC48AABBBF9FF18320B00441DF95A93610D730E894BBE0
                        APIs
                          • Part of subcall function 00F03A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00F03A57
                          • Part of subcall function 00F03A3D: GetCurrentThreadId.KERNEL32 ref: 00F03A5E
                          • Part of subcall function 00F03A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00F025B3), ref: 00F03A65
                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00F025BD
                        • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00F025DB
                        • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00F025DF
                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00F025E9
                        • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00F02601
                        • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00F02605
                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00F0260F
                        • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00F02623
                        • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00F02627
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                        • String ID:
                        • API String ID: 2014098862-0
                        • Opcode ID: 64f94a93a9be67e04bbeb0a58bf20656006d2698cbd7206d5e3e1f70ac29b95b
                        • Instruction ID: 5f33a6581be45d64bc27ac3c3417f74092f5ef9c0f084d69700842e830f39df2
                        • Opcode Fuzzy Hash: 64f94a93a9be67e04bbeb0a58bf20656006d2698cbd7206d5e3e1f70ac29b95b
                        • Instruction Fuzzy Hash: B601D431390214BBFB1067699C8EF593F5ADB4EB22F100001F318BE0D1C9F22444BAA9
                        APIs
                        • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00F01449,?,?,00000000), ref: 00F0180C
                        • HeapAlloc.KERNEL32(00000000,?,00F01449,?,?,00000000), ref: 00F01813
                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00F01449,?,?,00000000), ref: 00F01828
                        • GetCurrentProcess.KERNEL32(?,00000000,?,00F01449,?,?,00000000), ref: 00F01830
                        • DuplicateHandle.KERNEL32(00000000,?,00F01449,?,?,00000000), ref: 00F01833
                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00F01449,?,?,00000000), ref: 00F01843
                        • GetCurrentProcess.KERNEL32(00F01449,00000000,?,00F01449,?,?,00000000), ref: 00F0184B
                        • DuplicateHandle.KERNEL32(00000000,?,00F01449,?,?,00000000), ref: 00F0184E
                        • CreateThread.KERNEL32(00000000,00000000,00F01874,00000000,00000000,00000000), ref: 00F01868
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                        • String ID:
                        • API String ID: 1957940570-0
                        • Opcode ID: 5daa3c5c03204c769e815d0036bd3fc1fc726903964ad32819900731a884cbdb
                        • Instruction ID: 31af81833cb89f718bcce1a156f4238576b88f147c81d1667980a72b1f933d5d
                        • Opcode Fuzzy Hash: 5daa3c5c03204c769e815d0036bd3fc1fc726903964ad32819900731a884cbdb
                        • Instruction Fuzzy Hash: A801BF75240308BFE710AB65DC4DF5B3BADEB89B11F004411FA05DB192C670D810EB60
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: __alldvrm$_strrchr
                        • String ID: }}$}}$}}
                        • API String ID: 1036877536-1495402609
                        • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                        • Instruction ID: a851fecfb54ea695eb3c263a158a7b95b9c5e9b79c2804f61fdc81e0a9e1320f
                        • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                        • Instruction Fuzzy Hash: 9EA128B1E0138A9FDB258F28C8917AEBBE5EF71354F18516EE585AB381C2348982C751
                        APIs
                          • Part of subcall function 00F0D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00F0D501
                          • Part of subcall function 00F0D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00F0D50F
                          • Part of subcall function 00F0D4DC: CloseHandle.KERNELBASE(00000000), ref: 00F0D5DC
                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00F2A16D
                        • GetLastError.KERNEL32 ref: 00F2A180
                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00F2A1B3
                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 00F2A268
                        • GetLastError.KERNEL32(00000000), ref: 00F2A273
                        • CloseHandle.KERNEL32(00000000), ref: 00F2A2C4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                        • String ID: SeDebugPrivilege
                        • API String ID: 2533919879-2896544425
                        • Opcode ID: b0be2eaa3b08489abde749904794867067d14468a80d09c8d8994a19dfb24712
                        • Instruction ID: 650b7694d3c95fcb3d6db4ebedd56bba241c86566bc70b0357608adb6684bea3
                        • Opcode Fuzzy Hash: b0be2eaa3b08489abde749904794867067d14468a80d09c8d8994a19dfb24712
                        • Instruction Fuzzy Hash: E861CE306042129FD720DF14D894F16BBE1AF45328F18848CE4669F7A3C776EC49EB92
                        APIs
                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00F33925
                        • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00F3393A
                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00F33954
                        • _wcslen.LIBCMT ref: 00F33999
                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 00F339C6
                        • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00F339F4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$Window_wcslen
                        • String ID: SysListView32
                        • API String ID: 2147712094-78025650
                        • Opcode ID: 661df2d451396f9daa9c15fb323b80f6cf16c9039378f3c43e6acf6429e5a8bc
                        • Instruction ID: ca4baa57eef156c1f1df750cc321c4a3a821ca2faec68b71a9e4ce1360db47d2
                        • Opcode Fuzzy Hash: 661df2d451396f9daa9c15fb323b80f6cf16c9039378f3c43e6acf6429e5a8bc
                        • Instruction Fuzzy Hash: D5417071E00219ABEB21DF64CC45BEA77AAFF08364F100526F958A7281D7759984DB90
                        APIs
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F0BCFD
                        • IsMenu.USER32(00000000), ref: 00F0BD1D
                        • CreatePopupMenu.USER32 ref: 00F0BD53
                        • GetMenuItemCount.USER32(008A7D38), ref: 00F0BDA4
                        • InsertMenuItemW.USER32(008A7D38,?,00000001,00000030), ref: 00F0BDCC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Menu$Item$CountCreateInfoInsertPopup
                        • String ID: 0$2
                        • API String ID: 93392585-3793063076
                        • Opcode ID: 8c986af6dd7dcce5cc2e512a53eda449d502cf2f043d22383f68fe7de3f982c1
                        • Instruction ID: a4880106381ca3a8712af098ffdc8bdf0d63e9ccd3ebf76a638a3bc4370285ec
                        • Opcode Fuzzy Hash: 8c986af6dd7dcce5cc2e512a53eda449d502cf2f043d22383f68fe7de3f982c1
                        • Instruction Fuzzy Hash: 1551A071A0220ADBDB10DFA8D888BAEFBF5EF45324F148219E811A72D1D7749941FB61
                        APIs
                        • _ValidateLocalCookies.LIBCMT ref: 00EC2D4B
                        • ___except_validate_context_record.LIBVCRUNTIME ref: 00EC2D53
                        • _ValidateLocalCookies.LIBCMT ref: 00EC2DE1
                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00EC2E0C
                        • _ValidateLocalCookies.LIBCMT ref: 00EC2E61
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                        • String ID: &H$csm
                        • API String ID: 1170836740-1242228090
                        • Opcode ID: b73ec54b8663883c5e32d268aa7a80cbf7758848f1971b22b7a7fc5d7a95c601
                        • Instruction ID: 56f836cfae9162266de0751b7ef221a15646d5db96fc4d02af156af792ca1754
                        • Opcode Fuzzy Hash: b73ec54b8663883c5e32d268aa7a80cbf7758848f1971b22b7a7fc5d7a95c601
                        • Instruction Fuzzy Hash: 49419334A00209ABCF14DF68C945F9EBFA5BF54328F14915DEA157B392DB329A02CBD1
                        APIs
                        • LoadIconW.USER32(00000000,00007F03), ref: 00F0C913
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: IconLoad
                        • String ID: blank$info$question$stop$warning
                        • API String ID: 2457776203-404129466
                        • Opcode ID: 0716afc60e0e4ea122c845d97f4a9ea92c53851323b8688d835eefeee4a85da8
                        • Instruction ID: 2e72a90662c17da1c84a877407a34a81b737a594d622f61a1f6769e62467a1dd
                        • Opcode Fuzzy Hash: 0716afc60e0e4ea122c845d97f4a9ea92c53851323b8688d835eefeee4a85da8
                        • Instruction Fuzzy Hash: 0A112B32A89306BAE7049B149D82EAA3BDCDF15724B10412EF904F61C2EB719D0172E9
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                        • String ID: 0.0.0.0
                        • API String ID: 642191829-3771769585
                        • Opcode ID: a48bd434f1508478a923e314b15a4203be6f6eba2077d83841177866fb1a72ee
                        • Instruction ID: fd52d40fe0c43f29e939c9d9e9b96a8a42fe778d0d303a3ac3ebb387100e2bae
                        • Opcode Fuzzy Hash: a48bd434f1508478a923e314b15a4203be6f6eba2077d83841177866fb1a72ee
                        • Instruction Fuzzy Hash: EA11E472904219ABCB20AB60DC0AEEE77BDDF50720F000169F405BA0D1EF71CA81BBA0
                        APIs
                          • Part of subcall function 00EB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00EB9BB2
                        • GetSystemMetrics.USER32(0000000F), ref: 00F39FC7
                        • GetSystemMetrics.USER32(0000000F), ref: 00F39FE7
                        • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00F3A224
                        • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00F3A242
                        • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00F3A263
                        • ShowWindow.USER32(00000003,00000000), ref: 00F3A282
                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00F3A2A7
                        • DefDlgProcW.USER32(?,00000005,?,?), ref: 00F3A2CA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                        • String ID:
                        • API String ID: 1211466189-0
                        • Opcode ID: ac89e14382d76b35e70e9c79dc1863ca8d7b5e223f1cf91337d8bba1ae2c0a27
                        • Instruction ID: 0b14dbd9db992e1d4730118485e67dbb1f55ad0500ab98572d5f8b12c15c1ae1
                        • Opcode Fuzzy Hash: ac89e14382d76b35e70e9c79dc1863ca8d7b5e223f1cf91337d8bba1ae2c0a27
                        • Instruction Fuzzy Hash: 9DB1AD31A00219DFDF14CF69C9857AE7BF2FF44721F098069EC89AB295D731A940EB61
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _wcslen$LocalTime
                        • String ID:
                        • API String ID: 952045576-0
                        • Opcode ID: 738625176a33ca27bb8fdbb68363a720c3f73ab9c807a00649e26860119085a4
                        • Instruction ID: 4863f099a92cbe4ee408dc2b7131b465d2baeb6b24a2cfbdc0f4b936c7a68fac
                        • Opcode Fuzzy Hash: 738625176a33ca27bb8fdbb68363a720c3f73ab9c807a00649e26860119085a4
                        • Instruction Fuzzy Hash: 8D419F65C1021865CB11EBB4CD8AECFB7ECAF45310F50986AE518F31A1EB35E246D3A5
                        APIs
                        • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00EF682C,00000004,00000000,00000000), ref: 00EBF953
                        • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00EF682C,00000004,00000000,00000000), ref: 00EFF3D1
                        • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00EF682C,00000004,00000000,00000000), ref: 00EFF454
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ShowWindow
                        • String ID:
                        • API String ID: 1268545403-0
                        • Opcode ID: b9303d8c6f06ecda9275532419a1b647af898e4a0fadcca238a9c4104f2fea52
                        • Instruction ID: 97ad38a3566e5926fccace47ed629fd7eef1426917e9b39a9937a43ef6441d1c
                        • Opcode Fuzzy Hash: b9303d8c6f06ecda9275532419a1b647af898e4a0fadcca238a9c4104f2fea52
                        • Instruction Fuzzy Hash: 84412C31608684FAC7398BAC8C887FB7BA2AFD6328F14603CE18772560C631D880DB51
                        APIs
                        • DeleteObject.GDI32(00000000), ref: 00F32D1B
                        • GetDC.USER32(00000000), ref: 00F32D23
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F32D2E
                        • ReleaseDC.USER32(00000000,00000000), ref: 00F32D3A
                        • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00F32D76
                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00F32D87
                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00F35A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00F32DC2
                        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00F32DE1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                        • String ID:
                        • API String ID: 3864802216-0
                        • Opcode ID: c837cf1da6905ab942ca17b23e7402cdd546730bb714501964a52c7aca28cf8d
                        • Instruction ID: d37a767b0d5fdaf84735e9adae69e044913fa2ddf24113e4fb60d367f5d251a9
                        • Opcode Fuzzy Hash: c837cf1da6905ab942ca17b23e7402cdd546730bb714501964a52c7aca28cf8d
                        • Instruction Fuzzy Hash: A8317C72201214BFEB218F54CC8AFEB3BAAEF09725F044055FE08EA291C6759C51DBA4
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _memcmp
                        • String ID:
                        • API String ID: 2931989736-0
                        • Opcode ID: 9aad152ad2d216785d49a504b6736bbf9d7fda6ccdcd44b48a7a78d0ee6c6eac
                        • Instruction ID: 771183cbe454c25d1def84736b7f1d597bc1afd7ac5786031ac87241c46f0c5c
                        • Opcode Fuzzy Hash: 9aad152ad2d216785d49a504b6736bbf9d7fda6ccdcd44b48a7a78d0ee6c6eac
                        • Instruction Fuzzy Hash: 8321DA62E40A09B7D71455148F82FBB339CAF21BA4F441024FD05AA6C2F7A2EE15BDA5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID: NULL Pointer assignment$Not an Object type
                        • API String ID: 0-572801152
                        • Opcode ID: 58fe922e58eda597e52a0e0779928bf42c40c8b1d9c6618198614546b0bf5126
                        • Instruction ID: f9015687aeb73fd3380e40f836f746b45b00d1c87231f3102f266c66107d3994
                        • Opcode Fuzzy Hash: 58fe922e58eda597e52a0e0779928bf42c40c8b1d9c6618198614546b0bf5126
                        • Instruction Fuzzy Hash: 3FD1C071E0062AAFDF10CFA8DC80BAEB7B5BF48754F148069E915AB280E771DD45DB90
                        APIs
                        • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,00EE17FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 00EE15CE
                        • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00EE17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00EE1651
                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00EE17FB,?,00EE17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00EE16E4
                        • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00EE17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00EE16FB
                          • Part of subcall function 00ED3820: RtlAllocateHeap.NTDLL(00000000,?,00F71444,?,00EBFDF5,?,?,00EAA976,00000010,00F71440,00EA13FC,?,00EA13C6,?,00EA1129), ref: 00ED3852
                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00EE17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00EE1777
                        • __freea.LIBCMT ref: 00EE17A2
                        • __freea.LIBCMT ref: 00EE17AE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                        • String ID:
                        • API String ID: 2829977744-0
                        • Opcode ID: 11b27775b0c7081c930f2f963c7948da034cf4f100708e32fa2395e2fa49bbb9
                        • Instruction ID: d05dc850d4eb52a623fc9f530275b778cc681a98d4f77c6a06fd3c4c9b19ea5a
                        • Opcode Fuzzy Hash: 11b27775b0c7081c930f2f963c7948da034cf4f100708e32fa2395e2fa49bbb9
                        • Instruction Fuzzy Hash: 8C91B271E0029E9ADB208E76C841EEE7BB5AF45714F18669AE811F7281D735CC84C7A0
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Variant$ClearInit
                        • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                        • API String ID: 2610073882-625585964
                        • Opcode ID: 1498ce12912180c2476228285d36269998bc5b9a961761f9ab2e0e0a576bee99
                        • Instruction ID: 36b182e8cecc9f7df8008453fb056f829facf5d8aa5a2ccdf68b4c842bccd1fb
                        • Opcode Fuzzy Hash: 1498ce12912180c2476228285d36269998bc5b9a961761f9ab2e0e0a576bee99
                        • Instruction Fuzzy Hash: 56918471E00225ABDF20CFA5DC44FAEBBB8EF46724F108559F515AB280D7B0A941DFA0
                        APIs
                        • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 00F1125C
                        • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00F11284
                        • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 00F112A8
                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00F112D8
                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00F1135F
                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00F113C4
                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00F11430
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ArraySafe$Data$Access$UnaccessVartype
                        • String ID:
                        • API String ID: 2550207440-0
                        • Opcode ID: aa6412918e16b3b4ecb5807b3e545a180db5d5f7706d8e9e898d8343a08f5d9d
                        • Instruction ID: ac04b7f5ee776bb3fd435b6b494a5376dcefc30087cf9869e51780c36caacdea
                        • Opcode Fuzzy Hash: aa6412918e16b3b4ecb5807b3e545a180db5d5f7706d8e9e898d8343a08f5d9d
                        • Instruction Fuzzy Hash: 71910476E00219AFDB00DFA4D884BFEB7B5FF45724F104129EA11EB291D774A981EB90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ObjectSelect$BeginCreatePath
                        • String ID:
                        • API String ID: 3225163088-0
                        • Opcode ID: 8f09668e73166e0024df98de8be70bbcecc418cd2feb7ec631bb5dae303ee735
                        • Instruction ID: bea0c7c89c41368222b317844e9e8d75f7c8b0a49214eac5d3345a566c920754
                        • Opcode Fuzzy Hash: 8f09668e73166e0024df98de8be70bbcecc418cd2feb7ec631bb5dae303ee735
                        • Instruction Fuzzy Hash: 06916971D40219EFCB14CFA9CC84AEEBBB9FF49320F149055E615B7252D374AA41CBA0
                        APIs
                        • VariantInit.OLEAUT32(?), ref: 00F2396B
                        • CharUpperBuffW.USER32(?,?), ref: 00F23A7A
                        • _wcslen.LIBCMT ref: 00F23A8A
                        • VariantClear.OLEAUT32(?), ref: 00F23C1F
                          • Part of subcall function 00F10CDF: VariantInit.OLEAUT32(00000000), ref: 00F10D1F
                          • Part of subcall function 00F10CDF: VariantCopy.OLEAUT32(?,?), ref: 00F10D28
                          • Part of subcall function 00F10CDF: VariantClear.OLEAUT32(?), ref: 00F10D34
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                        • String ID: AUTOIT.ERROR$Incorrect Parameter format
                        • API String ID: 4137639002-1221869570
                        • Opcode ID: 5e351580b243b59764b81bb9005739b5295c938e462a52a1e055cf24d4baaca0
                        • Instruction ID: 8588fd08db2eaadf80813c8db00056a11c63790f71e9e287b310a6df91374263
                        • Opcode Fuzzy Hash: 5e351580b243b59764b81bb9005739b5295c938e462a52a1e055cf24d4baaca0
                        • Instruction Fuzzy Hash: 769178B5A083159FC704EF24D48096AB7E5FF89314F04892DF88A9B351DB38EE45DB92
                        APIs
                          • Part of subcall function 00F0000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00EFFF41,80070057,?,?,?,00F0035E), ref: 00F0002B
                          • Part of subcall function 00F0000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00EFFF41,80070057,?,?), ref: 00F00046
                          • Part of subcall function 00F0000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00EFFF41,80070057,?,?), ref: 00F00054
                          • Part of subcall function 00F0000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00EFFF41,80070057,?), ref: 00F00064
                        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00F24C51
                        • _wcslen.LIBCMT ref: 00F24D59
                        • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00F24DCF
                        • CoTaskMemFree.OLE32(?), ref: 00F24DDA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                        • String ID: NULL Pointer assignment
                        • API String ID: 614568839-2785691316
                        • Opcode ID: 5cc6f337ab3ad2408d3d97199757c838c8f6249ab4d68e2f8890e927da279a45
                        • Instruction ID: 35a433ab8e4188b6e6ccfae23d7f6caa408f291760be95adf141f6bed0519901
                        • Opcode Fuzzy Hash: 5cc6f337ab3ad2408d3d97199757c838c8f6249ab4d68e2f8890e927da279a45
                        • Instruction Fuzzy Hash: 00912971D0022D9FDF14DFA4D891AEEB7B9BF08310F108169E915BB291DB746A44DFA0
                        APIs
                        • GetMenu.USER32(?), ref: 00F32183
                        • GetMenuItemCount.USER32(00000000), ref: 00F321B5
                        • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00F321DD
                        • _wcslen.LIBCMT ref: 00F32213
                        • GetMenuItemID.USER32(?,?), ref: 00F3224D
                        • GetSubMenu.USER32(?,?), ref: 00F3225B
                          • Part of subcall function 00F03A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00F03A57
                          • Part of subcall function 00F03A3D: GetCurrentThreadId.KERNEL32 ref: 00F03A5E
                          • Part of subcall function 00F03A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00F025B3), ref: 00F03A65
                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00F322E3
                          • Part of subcall function 00F0E97B: Sleep.KERNEL32 ref: 00F0E9F3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                        • String ID:
                        • API String ID: 4196846111-0
                        • Opcode ID: 346004a7e8a70f635be2cccbea7cbb46cf5bb4067b6009722b04dfa9e29bbf81
                        • Instruction ID: 24c3dc23a270cfd3b057e2f049170ea2dbc2217447ea3290dc477c74fa5bf7b4
                        • Opcode Fuzzy Hash: 346004a7e8a70f635be2cccbea7cbb46cf5bb4067b6009722b04dfa9e29bbf81
                        • Instruction Fuzzy Hash: 45717D76E00205AFCB50EF68C885AAEB7F5EF48320F148459E816FB351DB34EE419B90
                        APIs
                        • IsWindow.USER32(008A7D60), ref: 00F37F37
                        • IsWindowEnabled.USER32(008A7D60), ref: 00F37F43
                        • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00F3801E
                        • SendMessageW.USER32(008A7D60,000000B0,?,?), ref: 00F38051
                        • IsDlgButtonChecked.USER32(?,?), ref: 00F38089
                        • GetWindowLongW.USER32(008A7D60,000000EC), ref: 00F380AB
                        • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00F380C3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                        • String ID:
                        • API String ID: 4072528602-0
                        • Opcode ID: 153bc3ecebbf63b0a39ed1f175c3af1890eb26d9352936de3b71c7f3e44b6610
                        • Instruction ID: 508be7fa4494c65bfb17129568335c15a71406411e8a1b8774eabbac4bd0847b
                        • Opcode Fuzzy Hash: 153bc3ecebbf63b0a39ed1f175c3af1890eb26d9352936de3b71c7f3e44b6610
                        • Instruction Fuzzy Hash: 957190B4A08348AFEB35AF64CC84FAABBB5FF09370F144059F95557261CB31A845EB90
                        APIs
                        • GetParent.USER32(?), ref: 00F0AEF9
                        • GetKeyboardState.USER32(?), ref: 00F0AF0E
                        • SetKeyboardState.USER32(?), ref: 00F0AF6F
                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 00F0AF9D
                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 00F0AFBC
                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 00F0AFFD
                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00F0B020
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessagePost$KeyboardState$Parent
                        • String ID:
                        • API String ID: 87235514-0
                        • Opcode ID: 2d93d43ba1e8239d8554dc86eec14ac982eab282d4fbafe023de94c26589664d
                        • Instruction ID: c298050984cafd8d59adb9788a446a89d6eff53dd0b0c314f67583c67d4c5feb
                        • Opcode Fuzzy Hash: 2d93d43ba1e8239d8554dc86eec14ac982eab282d4fbafe023de94c26589664d
                        • Instruction Fuzzy Hash: AE51A1A1A047D63DFB368334CC45BBABEA95B06314F088589E1D9958C2D3D9ACC4F751
                        APIs
                        • GetParent.USER32(00000000), ref: 00F0AD19
                        • GetKeyboardState.USER32(?), ref: 00F0AD2E
                        • SetKeyboardState.USER32(?), ref: 00F0AD8F
                        • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00F0ADBB
                        • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00F0ADD8
                        • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00F0AE17
                        • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00F0AE38
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessagePost$KeyboardState$Parent
                        • String ID:
                        • API String ID: 87235514-0
                        • Opcode ID: c93cd2aea0bf0dd1a74a782b1eadb1fcdc11297b2d5819fb88f5b67195744408
                        • Instruction ID: fef215e74de32044806af56f7638b3b8562c0e37e9bc17555b5da0621187aa75
                        • Opcode Fuzzy Hash: c93cd2aea0bf0dd1a74a782b1eadb1fcdc11297b2d5819fb88f5b67195744408
                        • Instruction Fuzzy Hash: 815103A1D087D53DFB338334CC55BBABEA96B06310F088489E1D9568C3D294EC98F762
                        APIs
                        • GetConsoleCP.KERNEL32(00EE3CD6,?,?,?,?,?,?,?,?,00ED5BA3,?,?,00EE3CD6,?,?), ref: 00ED5470
                        • __fassign.LIBCMT ref: 00ED54EB
                        • __fassign.LIBCMT ref: 00ED5506
                        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00EE3CD6,00000005,00000000,00000000), ref: 00ED552C
                        • WriteFile.KERNEL32(?,00EE3CD6,00000000,00ED5BA3,00000000,?,?,?,?,?,?,?,?,?,00ED5BA3,?), ref: 00ED554B
                        • WriteFile.KERNEL32(?,?,00000001,00ED5BA3,00000000,?,?,?,?,?,?,?,?,?,00ED5BA3,?), ref: 00ED5584
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                        • String ID:
                        • API String ID: 1324828854-0
                        • Opcode ID: 98f70f22615f09a3376373f060bcfa51f6d89406d27b0cd39ee3395d870326fe
                        • Instruction ID: 28a0fefedcac251b7115995815a5c5bc77b9cb28d3065b1ce00020660007e48c
                        • Opcode Fuzzy Hash: 98f70f22615f09a3376373f060bcfa51f6d89406d27b0cd39ee3395d870326fe
                        • Instruction Fuzzy Hash: 4751B071A00649AFDB11CFA8E845AEEBBF9EF08300F14511BE556F7391D6319A82CF61
                        APIs
                          • Part of subcall function 00F2304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00F2307A
                          • Part of subcall function 00F2304E: _wcslen.LIBCMT ref: 00F2309B
                        • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00F21112
                        • WSAGetLastError.WSOCK32 ref: 00F21121
                        • WSAGetLastError.WSOCK32 ref: 00F211C9
                        • closesocket.WSOCK32(00000000), ref: 00F211F9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                        • String ID:
                        • API String ID: 2675159561-0
                        • Opcode ID: 6f1cf3533c5bd1e1af5a5ec018bc3afa47d09ce2e8b666719a54b8ddfaa40203
                        • Instruction ID: dbde30f2b46c2419e74a57067bd0d42548562b9eb9743e298bd3b18442972aea
                        • Opcode Fuzzy Hash: 6f1cf3533c5bd1e1af5a5ec018bc3afa47d09ce2e8b666719a54b8ddfaa40203
                        • Instruction Fuzzy Hash: D9410536600218AFDB109F24DC84BAAB7EAFF45324F148059FD05AB291C774EE41DBE5
                        APIs
                          • Part of subcall function 00F0DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00F0CF22,?), ref: 00F0DDFD
                          • Part of subcall function 00F0DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00F0CF22,?), ref: 00F0DE16
                        • lstrcmpiW.KERNEL32(?,?), ref: 00F0CF45
                        • MoveFileW.KERNEL32(?,?), ref: 00F0CF7F
                        • _wcslen.LIBCMT ref: 00F0D005
                        • _wcslen.LIBCMT ref: 00F0D01B
                        • SHFileOperationW.SHELL32(?), ref: 00F0D061
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                        • String ID: \*.*
                        • API String ID: 3164238972-1173974218
                        • Opcode ID: 6f01dbb920d6f8cfb348cd7bf7fbb59c19ad6b25da546cef6c0f28d06d13d3b6
                        • Instruction ID: 03091c6c4a82f5ce38f9bad48dc05371c8c7d0a50583edf456c0991abdce1e75
                        • Opcode Fuzzy Hash: 6f01dbb920d6f8cfb348cd7bf7fbb59c19ad6b25da546cef6c0f28d06d13d3b6
                        • Instruction Fuzzy Hash: 794178B1D052195FDF12EBA4CD81EDEB7F9AF48380F0000E6E505EB182EA34A644EB51
                        APIs
                        • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00F32E1C
                        • GetWindowLongW.USER32(?,000000F0), ref: 00F32E4F
                        • GetWindowLongW.USER32(?,000000F0), ref: 00F32E84
                        • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00F32EB6
                        • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00F32EE0
                        • GetWindowLongW.USER32(?,000000F0), ref: 00F32EF1
                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00F32F0B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: LongWindow$MessageSend
                        • String ID:
                        • API String ID: 2178440468-0
                        • Opcode ID: df77c00c2cb3327c80e42715c91bd060404da3d8baba427109e335529d1b03bd
                        • Instruction ID: f3c05e7b743c12b93b32c041c182e6e87d7b80aff7408d5a1328679e8aab429d
                        • Opcode Fuzzy Hash: df77c00c2cb3327c80e42715c91bd060404da3d8baba427109e335529d1b03bd
                        • Instruction Fuzzy Hash: 84310535A04258DFEB61CF58DC86F6537E1FB4A730F150164FA089B2B1CB71A885EB41
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F07769
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F0778F
                        • SysAllocString.OLEAUT32(00000000), ref: 00F07792
                        • SysAllocString.OLEAUT32(?), ref: 00F077B0
                        • SysFreeString.OLEAUT32(?), ref: 00F077B9
                        • StringFromGUID2.OLE32(?,?,00000028), ref: 00F077DE
                        • SysAllocString.OLEAUT32(?), ref: 00F077EC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                        • String ID:
                        • API String ID: 3761583154-0
                        • Opcode ID: 16a80455081f5aa199d227bfe9b3b67b7466bd033a511bfd49ffeaa6f3d3b515
                        • Instruction ID: d5334bdb2136deed68a5942b9d38b721cb5dd628816eb86553be3960f8e4bb6a
                        • Opcode Fuzzy Hash: 16a80455081f5aa199d227bfe9b3b67b7466bd033a511bfd49ffeaa6f3d3b515
                        • Instruction Fuzzy Hash: CC21B276A04219AFDB10EFA8CC88DBB73ADEB093B47008065FA04DB190D670EC41A7A0
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F07842
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F07868
                        • SysAllocString.OLEAUT32(00000000), ref: 00F0786B
                        • SysAllocString.OLEAUT32 ref: 00F0788C
                        • SysFreeString.OLEAUT32 ref: 00F07895
                        • StringFromGUID2.OLE32(?,?,00000028), ref: 00F078AF
                        • SysAllocString.OLEAUT32(?), ref: 00F078BD
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                        • String ID:
                        • API String ID: 3761583154-0
                        • Opcode ID: 5bdd257d1f045faba80c83efcf68d1d12a556851e1012c9b589ff9fbe21d0d95
                        • Instruction ID: 636acf6087849f4442b5c5362d322e8a7c5f224a0235c34ccd9e65024896f67b
                        • Opcode Fuzzy Hash: 5bdd257d1f045faba80c83efcf68d1d12a556851e1012c9b589ff9fbe21d0d95
                        • Instruction Fuzzy Hash: 36217732A04208AFDB10AFB8DC88DBA77EDEB09770750C165F915DB1A1D674EC41EB64
                        APIs
                        • GetStdHandle.KERNEL32(0000000C), ref: 00F104F2
                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00F1052E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CreateHandlePipe
                        • String ID: nul
                        • API String ID: 1424370930-2873401336
                        • Opcode ID: 7067a16b74510557f037e600e6dcc79551b3a9f46350a97149d4c74463a83c96
                        • Instruction ID: b1a7ece3d144dc5c5bc056f4ab4a0f28f32f9015005722dfdcbe90ad50ce9d9a
                        • Opcode Fuzzy Hash: 7067a16b74510557f037e600e6dcc79551b3a9f46350a97149d4c74463a83c96
                        • Instruction Fuzzy Hash: E9218075900305ABDB209F29DC44ADA77A6AF44734F244A19F8A1E62E0DBB0D9D0EF60
                        APIs
                        • GetStdHandle.KERNEL32(000000F6), ref: 00F105C6
                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00F10601
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CreateHandlePipe
                        • String ID: nul
                        • API String ID: 1424370930-2873401336
                        • Opcode ID: b6051ee7ef93e68f5c3d49898e1710a57d362117029e20ce242a5212fe075071
                        • Instruction ID: ccb4b608bf887235f628773f6da66d142d2d78a7c38143f4327d728a8e439c49
                        • Opcode Fuzzy Hash: b6051ee7ef93e68f5c3d49898e1710a57d362117029e20ce242a5212fe075071
                        • Instruction Fuzzy Hash: 412165759003059BDB209F69DC44ADA77E5BF95730F204A19F8A1E72D0DBF099E0EB60
                        APIs
                          • Part of subcall function 00EA600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00EA604C
                          • Part of subcall function 00EA600E: GetStockObject.GDI32(00000011), ref: 00EA6060
                          • Part of subcall function 00EA600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00EA606A
                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00F34112
                        • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00F3411F
                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00F3412A
                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00F34139
                        • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00F34145
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$CreateObjectStockWindow
                        • String ID: Msctls_Progress32
                        • API String ID: 1025951953-3636473452
                        • Opcode ID: 1044876df94998bbad8a3d1d4c3c4424815e9cebe58dd1fc1c2030591ef2ac9e
                        • Instruction ID: a6ad03ac65491d0bd6f2b988c7338c48d9a3ee8b2c11bedf11b14e8069defa4b
                        • Opcode Fuzzy Hash: 1044876df94998bbad8a3d1d4c3c4424815e9cebe58dd1fc1c2030591ef2ac9e
                        • Instruction Fuzzy Hash: 1211B6B214021DBEEF219F64CC86EE77F5DEF097A8F014111F618A6050C676EC61EBA4
                        APIs
                          • Part of subcall function 00EDD7A3: _free.LIBCMT ref: 00EDD7CC
                        • _free.LIBCMT ref: 00EDD82D
                          • Part of subcall function 00ED29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00EDD7D1,00000000,00000000,00000000,00000000,?,00EDD7F8,00000000,00000007,00000000,?,00EDDBF5,00000000), ref: 00ED29DE
                          • Part of subcall function 00ED29C8: GetLastError.KERNEL32(00000000,?,00EDD7D1,00000000,00000000,00000000,00000000,?,00EDD7F8,00000000,00000007,00000000,?,00EDDBF5,00000000,00000000), ref: 00ED29F0
                        • _free.LIBCMT ref: 00EDD838
                        • _free.LIBCMT ref: 00EDD843
                        • _free.LIBCMT ref: 00EDD897
                        • _free.LIBCMT ref: 00EDD8A2
                        • _free.LIBCMT ref: 00EDD8AD
                        • _free.LIBCMT ref: 00EDD8B8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                        • Instruction ID: ab0d89a65862553a6a421d9dcc92f3ffa2d2f7870044ef8ea9e3117118154ad4
                        • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                        • Instruction Fuzzy Hash: ED115E71544B04AAD621BFB0CC47FCB7BDCEF50700F40282BB29DB6292DA66B5079760
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00F0DA74
                        • LoadStringW.USER32(00000000), ref: 00F0DA7B
                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00F0DA91
                        • LoadStringW.USER32(00000000), ref: 00F0DA98
                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00F0DADC
                        Strings
                        • %s (%d) : ==> %s: %s %s, xrefs: 00F0DAB9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: HandleLoadModuleString$Message
                        • String ID: %s (%d) : ==> %s: %s %s
                        • API String ID: 4072794657-3128320259
                        • Opcode ID: 35fd98dc3cd542b25eb483d5cb3401fea6ed92a1e70c507fd647f3a3d7d84ca1
                        • Instruction ID: e7e2abc4fce3fbd03ab06773d4797bfa26ef41562aef43cd4060a50b6ee3d63c
                        • Opcode Fuzzy Hash: 35fd98dc3cd542b25eb483d5cb3401fea6ed92a1e70c507fd647f3a3d7d84ca1
                        • Instruction Fuzzy Hash: 530162F290020C7FE710ABA09D89EE7326CE708711F401495B706F2082EA749E846FB4
                        APIs
                        • InterlockedExchange.KERNEL32(008A0910,008A0910), ref: 00F1097B
                        • EnterCriticalSection.KERNEL32(008A08F0,00000000), ref: 00F1098D
                        • TerminateThread.KERNEL32(?,000001F6), ref: 00F1099B
                        • WaitForSingleObject.KERNEL32(?,000003E8), ref: 00F109A9
                        • CloseHandle.KERNEL32(?), ref: 00F109B8
                        • InterlockedExchange.KERNEL32(008A0910,000001F6), ref: 00F109C8
                        • LeaveCriticalSection.KERNEL32(008A08F0), ref: 00F109CF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                        • String ID:
                        • API String ID: 3495660284-0
                        • Opcode ID: 5c837b8461092286d5e61c0b24310697612e5f7bd531bf2d4ba48042abd63984
                        • Instruction ID: 973ec0795fac275c519b201864607e7d48acde898086409167ce31e344f2d1bc
                        • Opcode Fuzzy Hash: 5c837b8461092286d5e61c0b24310697612e5f7bd531bf2d4ba48042abd63984
                        • Instruction Fuzzy Hash: CBF0CD31442516BBD7515B94EE89ADA7A36BF05722F801015F141608A1CBB5D4B5EFD0
                        APIs
                        • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00F21DC0
                        • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00F21DE1
                        • WSAGetLastError.WSOCK32 ref: 00F21DF2
                        • htons.WSOCK32(?,?,?,?,?), ref: 00F21EDB
                        • inet_ntoa.WSOCK32(?), ref: 00F21E8C
                          • Part of subcall function 00F039E8: _strlen.LIBCMT ref: 00F039F2
                          • Part of subcall function 00F23224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,00F1EC0C), ref: 00F23240
                        • _strlen.LIBCMT ref: 00F21F35
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                        • String ID:
                        • API String ID: 3203458085-0
                        • Opcode ID: 17fe4125d3a250b3384f8ce0120806e535f79ca9b8b153eabaf0faf5f232f7fe
                        • Instruction ID: c4a3463b88f1b0661c1cec0fb13f5835b5be33ef61786f857d23ec61c15a2995
                        • Opcode Fuzzy Hash: 17fe4125d3a250b3384f8ce0120806e535f79ca9b8b153eabaf0faf5f232f7fe
                        • Instruction Fuzzy Hash: C1B1CD31604310AFC324DF24D891E6A7BE5BF99328F58855CF4666F2A2CB31ED42DB91
                        APIs
                        • GetClientRect.USER32(?,?), ref: 00EA5D30
                        • GetWindowRect.USER32(?,?), ref: 00EA5D71
                        • ScreenToClient.USER32(?,?), ref: 00EA5D99
                        • GetClientRect.USER32(?,?), ref: 00EA5ED7
                        • GetWindowRect.USER32(?,?), ref: 00EA5EF8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Rect$Client$Window$Screen
                        • String ID:
                        • API String ID: 1296646539-0
                        • Opcode ID: ff08cd7d84761d8b0b40b082f7e636e72371bbafbae408b95dcabeaf68ec5c9c
                        • Instruction ID: 62788ee43b976cf10d4a0f183cd541db3f109bf732aad182c53e3e3d5bef042b
                        • Opcode Fuzzy Hash: ff08cd7d84761d8b0b40b082f7e636e72371bbafbae408b95dcabeaf68ec5c9c
                        • Instruction Fuzzy Hash: 3FB19D75A00B8ADBDB14CFA9C4407EEB7F1FF58314F14A41AE8A9E7290D730AA40DB54
                        APIs
                        • __allrem.LIBCMT ref: 00ED00BA
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00ED00D6
                        • __allrem.LIBCMT ref: 00ED00ED
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00ED010B
                        • __allrem.LIBCMT ref: 00ED0122
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00ED0140
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                        • String ID:
                        • API String ID: 1992179935-0
                        • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                        • Instruction ID: a53c2cbd4f30b7c14ed329b642c5e3f8d64c061cf440ff309c4175b238238686
                        • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                        • Instruction Fuzzy Hash: CB81E572A01706ABE7249E29CC41BAA73EAEF41364F28653FF551F7381E771D9028790
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00EC82D9,00EC82D9,?,?,?,00ED644F,00000001,00000001,?), ref: 00ED6258
                        • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00ED644F,00000001,00000001,?,?,?,?), ref: 00ED62DE
                        • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00ED63D8
                        • __freea.LIBCMT ref: 00ED63E5
                          • Part of subcall function 00ED3820: RtlAllocateHeap.NTDLL(00000000,?,00F71444,?,00EBFDF5,?,?,00EAA976,00000010,00F71440,00EA13FC,?,00EA13C6,?,00EA1129), ref: 00ED3852
                        • __freea.LIBCMT ref: 00ED63EE
                        • __freea.LIBCMT ref: 00ED6413
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide__freea$AllocateHeap
                        • String ID:
                        • API String ID: 1414292761-0
                        • Opcode ID: 7f64401b741ea84923d331a33a328fca7920b7928913344d35a0ed0ff565f56b
                        • Instruction ID: 67403dd8fba07035f229311303498ce4d438cfd094c2b4f6234a52c34b7737e0
                        • Opcode Fuzzy Hash: 7f64401b741ea84923d331a33a328fca7920b7928913344d35a0ed0ff565f56b
                        • Instruction Fuzzy Hash: 5A510272A00216ABDB258F64DC81EBF77AAEF94714F14522AFC05F7291DB34DC42D6A0
                        APIs
                          • Part of subcall function 00EA9CB3: _wcslen.LIBCMT ref: 00EA9CBD
                          • Part of subcall function 00F2C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F2B6AE,?,?), ref: 00F2C9B5
                          • Part of subcall function 00F2C998: _wcslen.LIBCMT ref: 00F2C9F1
                          • Part of subcall function 00F2C998: _wcslen.LIBCMT ref: 00F2CA68
                          • Part of subcall function 00F2C998: _wcslen.LIBCMT ref: 00F2CA9E
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F2BCCA
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00F2BD25
                        • RegCloseKey.ADVAPI32(00000000), ref: 00F2BD6A
                        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00F2BD99
                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00F2BDF3
                        • RegCloseKey.ADVAPI32(?), ref: 00F2BDFF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                        • String ID:
                        • API String ID: 1120388591-0
                        • Opcode ID: ffd02620d78d9a4e0c40f2fd5cee81ac10812ee92a05d273e507afa13aa6b595
                        • Instruction ID: 4e8cfa2eb6f71d7e01bf9cc9f684346af1cdf7dec1c4129cf8b8d93379316d2d
                        • Opcode Fuzzy Hash: ffd02620d78d9a4e0c40f2fd5cee81ac10812ee92a05d273e507afa13aa6b595
                        • Instruction Fuzzy Hash: 1D81E031608241EFC714DF24D881E6ABBE5FF85318F14886CF8599B2A2CB31ED45DB92
                        APIs
                        • VariantInit.OLEAUT32(00000035), ref: 00EFF7B9
                        • SysAllocString.OLEAUT32(00000001), ref: 00EFF860
                        • VariantCopy.OLEAUT32(00EFFA64,00000000), ref: 00EFF889
                        • VariantClear.OLEAUT32(00EFFA64), ref: 00EFF8AD
                        • VariantCopy.OLEAUT32(00EFFA64,00000000), ref: 00EFF8B1
                        • VariantClear.OLEAUT32(?), ref: 00EFF8BB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Variant$ClearCopy$AllocInitString
                        • String ID:
                        • API String ID: 3859894641-0
                        • Opcode ID: 3bcb0ee154c00406cf9bec39629e2d204d005fa22880eb73c73132779b25ac31
                        • Instruction ID: 4430577f7f3f6b8b82b42853b8f8379432c82d3f302e099b3909e7cbd8fc502b
                        • Opcode Fuzzy Hash: 3bcb0ee154c00406cf9bec39629e2d204d005fa22880eb73c73132779b25ac31
                        • Instruction Fuzzy Hash: AF51E931500318BACF24ABA5D895B79B3E5EF85310F24B467EA05FF292DBB09C40D796
                        APIs
                          • Part of subcall function 00EA7620: _wcslen.LIBCMT ref: 00EA7625
                          • Part of subcall function 00EA6B57: _wcslen.LIBCMT ref: 00EA6B6A
                        • GetOpenFileNameW.COMDLG32(00000058), ref: 00F194E5
                        • _wcslen.LIBCMT ref: 00F19506
                        • _wcslen.LIBCMT ref: 00F1952D
                        • GetSaveFileNameW.COMDLG32(00000058), ref: 00F19585
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _wcslen$FileName$OpenSave
                        • String ID: X
                        • API String ID: 83654149-3081909835
                        • Opcode ID: d4e7971d7d7bb36d7d5626550133776cac14ccaced8d7e762586c29748e75ddb
                        • Instruction ID: 0a082dd9b73093f40696a213cc38b5efb45159a9aab7cd48014aef30ad7f4b99
                        • Opcode Fuzzy Hash: d4e7971d7d7bb36d7d5626550133776cac14ccaced8d7e762586c29748e75ddb
                        • Instruction Fuzzy Hash: 19E1D6319083408FD714DF24C891BAEB7E5BF89314F04856DF899AB292DB71ED45CB92
                        APIs
                          • Part of subcall function 00EB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00EB9BB2
                        • BeginPaint.USER32(?,?,?), ref: 00EB9241
                        • GetWindowRect.USER32(?,?), ref: 00EB92A5
                        • ScreenToClient.USER32(?,?), ref: 00EB92C2
                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00EB92D3
                        • EndPaint.USER32(?,?,?,?,?), ref: 00EB9321
                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00EF71EA
                          • Part of subcall function 00EB9339: BeginPath.GDI32(00000000), ref: 00EB9357
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                        • String ID:
                        • API String ID: 3050599898-0
                        • Opcode ID: b7ea906b69d30a4387cbdcb34cb60b4a40cd5a719e60e031057fb066f6ebdc24
                        • Instruction ID: 697fcb3a3758090f5c0f6d1fcfb4786a1aa33d92d00a40784f36b5993df2a441
                        • Opcode Fuzzy Hash: b7ea906b69d30a4387cbdcb34cb60b4a40cd5a719e60e031057fb066f6ebdc24
                        • Instruction Fuzzy Hash: 92419F31105204AFD711DF28DC85FBB7BF9EB45724F140229FA98A71A2C7319849EB62
                        APIs
                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 00F1080C
                        • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00F10847
                        • EnterCriticalSection.KERNEL32(?), ref: 00F10863
                        • LeaveCriticalSection.KERNEL32(?), ref: 00F108DC
                        • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00F108F3
                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00F10921
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                        • String ID:
                        • API String ID: 3368777196-0
                        • Opcode ID: 294018b7044bd3efdbdd5f91fcbb8e21db7b13c1f50f2fd57af1c9a709e7d8f0
                        • Instruction ID: 2a14975a0e52014234f6c9f44a44d9dc3683077d2512be3cd23ff893444286f7
                        • Opcode Fuzzy Hash: 294018b7044bd3efdbdd5f91fcbb8e21db7b13c1f50f2fd57af1c9a709e7d8f0
                        • Instruction Fuzzy Hash: 25418271900205EFDF149F54DC85AAA77B9FF04320F1440A9ED00AA297DB71DE91EBA4
                        APIs
                        • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,00EFF3AB,00000000,?,?,00000000,?,00EF682C,00000004,00000000,00000000), ref: 00F3824C
                        • EnableWindow.USER32(?,00000000), ref: 00F38272
                        • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00F382D1
                        • ShowWindow.USER32(?,00000004), ref: 00F382E5
                        • EnableWindow.USER32(?,00000001), ref: 00F3830B
                        • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00F3832F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Window$Show$Enable$MessageSend
                        • String ID:
                        • API String ID: 642888154-0
                        • Opcode ID: ad2f6c54134a6063d663e5878574c1cfd7ad8c93c11b090a831b4006a47d4b71
                        • Instruction ID: 7f090588e6d2aac1a762320a8fcdc22a4b40c916d580e97fb84c25e3f42e8263
                        • Opcode Fuzzy Hash: ad2f6c54134a6063d663e5878574c1cfd7ad8c93c11b090a831b4006a47d4b71
                        • Instruction Fuzzy Hash: BE41B430A01748AFDB11CF15CC99BE97BF1BB0A774F184169FA084B262CB35A847EB51
                        APIs
                        • IsWindowVisible.USER32(?), ref: 00F04C95
                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00F04CB2
                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00F04CEA
                        • _wcslen.LIBCMT ref: 00F04D08
                        • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00F04D10
                        • _wcsstr.LIBVCRUNTIME ref: 00F04D1A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                        • String ID:
                        • API String ID: 72514467-0
                        • Opcode ID: acddc33f0ba9baabb017d820c2ff6b0de4902557d9fe6c3d2ceb702c7fc3ccd1
                        • Instruction ID: 984395d4732647be3c945a97eeb388d1e8c0b50e0451fb0824c1a878e25dcd98
                        • Opcode Fuzzy Hash: acddc33f0ba9baabb017d820c2ff6b0de4902557d9fe6c3d2ceb702c7fc3ccd1
                        • Instruction Fuzzy Hash: 442107B2605204BBEB155B35AC0AE7B7BDDDF45760F10803DF909DA1D1DA61EC01B7A0
                        APIs
                          • Part of subcall function 00EA3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00EA3A97,?,?,00EA2E7F,?,?,?,00000000), ref: 00EA3AC2
                        • _wcslen.LIBCMT ref: 00F1587B
                        • CoInitialize.OLE32(00000000), ref: 00F15995
                        • CoCreateInstance.OLE32(00F3FCF8,00000000,00000001,00F3FB68,?), ref: 00F159AE
                        • CoUninitialize.OLE32 ref: 00F159CC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                        • String ID: .lnk
                        • API String ID: 3172280962-24824748
                        • Opcode ID: 9f6c147a695c20d895c529a983c55aaf14d98ceaa39b183f8eec13e229616e9f
                        • Instruction ID: 8d9756424bfa0c17b4722992852997d134f7f4df2cf911cb10040f2c582827cf
                        • Opcode Fuzzy Hash: 9f6c147a695c20d895c529a983c55aaf14d98ceaa39b183f8eec13e229616e9f
                        • Instruction Fuzzy Hash: D8D16575A08601DFC714DF24C480A6ABBE2EFC9B20F14485DF889AB361D731ED85DB92
                        APIs
                          • Part of subcall function 00F00FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00F00FCA
                          • Part of subcall function 00F00FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00F00FD6
                          • Part of subcall function 00F00FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00F00FE5
                          • Part of subcall function 00F00FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00F00FEC
                          • Part of subcall function 00F00FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00F01002
                        • GetLengthSid.ADVAPI32(?,00000000,00F01335), ref: 00F017AE
                        • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00F017BA
                        • HeapAlloc.KERNEL32(00000000), ref: 00F017C1
                        • CopySid.ADVAPI32(00000000,00000000,?), ref: 00F017DA
                        • GetProcessHeap.KERNEL32(00000000,00000000,00F01335), ref: 00F017EE
                        • HeapFree.KERNEL32(00000000), ref: 00F017F5
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                        • String ID:
                        • API String ID: 3008561057-0
                        • Opcode ID: bf96822a7cac068ef0e2d71faf2e3e857f3419bb22d4a326d14e97e64b7ca258
                        • Instruction ID: f04d7b8394be0776cf0d0ff7432683c907ef08a94e72d71ab0528c11efb2e926
                        • Opcode Fuzzy Hash: bf96822a7cac068ef0e2d71faf2e3e857f3419bb22d4a326d14e97e64b7ca258
                        • Instruction Fuzzy Hash: 60118E72A00209FFDB149FA4CC49BAF7BEAFB45365F104118F481A7291D739A944FBA0
                        APIs
                        • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00F014FF
                        • OpenProcessToken.ADVAPI32(00000000), ref: 00F01506
                        • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00F01515
                        • CloseHandle.KERNEL32(00000004), ref: 00F01520
                        • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00F0154F
                        • DestroyEnvironmentBlock.USERENV(00000000), ref: 00F01563
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                        • String ID:
                        • API String ID: 1413079979-0
                        • Opcode ID: 9e5864426083ec789a378e50594fae2cdb79027c4844a93a5a78a9c196db761e
                        • Instruction ID: eb2c7f7a814c91c6684dda007dd0bd480ce07693e9392d1a6781a58abebd874f
                        • Opcode Fuzzy Hash: 9e5864426083ec789a378e50594fae2cdb79027c4844a93a5a78a9c196db761e
                        • Instruction Fuzzy Hash: D311297650024DABDF11CF98DD49BDE7BAAFF49764F044015FA05A20A0C3758E64FBA0
                        APIs
                        • GetLastError.KERNEL32(?,?,00EC3379,00EC2FE5), ref: 00EC3390
                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00EC339E
                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00EC33B7
                        • SetLastError.KERNEL32(00000000,?,00EC3379,00EC2FE5), ref: 00EC3409
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ErrorLastValue___vcrt_
                        • String ID:
                        • API String ID: 3852720340-0
                        • Opcode ID: 34a14624532f6c96fe33e79061cd1337e46e4cb4de81c35945aa107a5fe74c8f
                        • Instruction ID: 9ba1e28d576aa1e235d8fe1c20197d8a170999f2e281094ede08fc4af1393dbe
                        • Opcode Fuzzy Hash: 34a14624532f6c96fe33e79061cd1337e46e4cb4de81c35945aa107a5fe74c8f
                        • Instruction Fuzzy Hash: 2301D23260C355BEA61427787E95F663A94EB1537D320A22EF470A11F0EE534D036184
                        APIs
                        • GetLastError.KERNEL32(?,?,00ED5686,00EE3CD6,?,00000000,?,00ED5B6A,?,?,?,?,?,00ECE6D1,?,00F68A48), ref: 00ED2D78
                        • _free.LIBCMT ref: 00ED2DAB
                        • _free.LIBCMT ref: 00ED2DD3
                        • SetLastError.KERNEL32(00000000,?,?,?,?,00ECE6D1,?,00F68A48,00000010,00EA4F4A,?,?,00000000,00EE3CD6), ref: 00ED2DE0
                        • SetLastError.KERNEL32(00000000,?,?,?,?,00ECE6D1,?,00F68A48,00000010,00EA4F4A,?,?,00000000,00EE3CD6), ref: 00ED2DEC
                        • _abort.LIBCMT ref: 00ED2DF2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ErrorLast$_free$_abort
                        • String ID:
                        • API String ID: 3160817290-0
                        • Opcode ID: 60cfa637c6e229a797b97393044ba0d523642356cfb1431cf4cc28a7bc6566c9
                        • Instruction ID: 8c9de84fd994a5113036b2354eaae8276fd507e7ecbebfff1d3f2077c535e2d3
                        • Opcode Fuzzy Hash: 60cfa637c6e229a797b97393044ba0d523642356cfb1431cf4cc28a7bc6566c9
                        • Instruction Fuzzy Hash: 42F0CD3550460067C21227357C06E5F3597EFE27B5F24641FF664B23D1EF6588036271
                        APIs
                          • Part of subcall function 00EB9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00EB9693
                          • Part of subcall function 00EB9639: SelectObject.GDI32(?,00000000), ref: 00EB96A2
                          • Part of subcall function 00EB9639: BeginPath.GDI32(?), ref: 00EB96B9
                          • Part of subcall function 00EB9639: SelectObject.GDI32(?,00000000), ref: 00EB96E2
                        • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00F38A4E
                        • LineTo.GDI32(?,00000003,00000000), ref: 00F38A62
                        • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00F38A70
                        • LineTo.GDI32(?,00000000,00000003), ref: 00F38A80
                        • EndPath.GDI32(?), ref: 00F38A90
                        • StrokePath.GDI32(?), ref: 00F38AA0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                        • String ID:
                        • API String ID: 43455801-0
                        • Opcode ID: 2b0c5f51f0118362facc6e4aab00920d95c3424a4bffcdcd85c24bd721b3f2ad
                        • Instruction ID: b5e3bdaf2f9c033bf780b382b8927babfd4752ae4e0c302493d64dce3dbd26d2
                        • Opcode Fuzzy Hash: 2b0c5f51f0118362facc6e4aab00920d95c3424a4bffcdcd85c24bd721b3f2ad
                        • Instruction Fuzzy Hash: B011DB7640014DFFDF129F94DC88EAA7F6DEF083A4F048012BA19AA1A1C7719D55EFA0
                        APIs
                        • GetDC.USER32(00000000), ref: 00F05218
                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 00F05229
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F05230
                        • ReleaseDC.USER32(00000000,00000000), ref: 00F05238
                        • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00F0524F
                        • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00F05261
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CapsDevice$Release
                        • String ID:
                        • API String ID: 1035833867-0
                        • Opcode ID: d099e2d696c2ef1d035d850802ac72bf7db100726beb386dd5742df369f6a314
                        • Instruction ID: 267426b52b817ea35fe73c4216bde22ba8dcfd39793c2b3b2b6c29c10d48c8ae
                        • Opcode Fuzzy Hash: d099e2d696c2ef1d035d850802ac72bf7db100726beb386dd5742df369f6a314
                        • Instruction Fuzzy Hash: A3016276E00718BBEB109BA59C49E5EBFB9EF48761F044065FA04F7291D6709C00EFA0
                        APIs
                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00EA1BF4
                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 00EA1BFC
                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00EA1C07
                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00EA1C12
                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 00EA1C1A
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00EA1C22
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Virtual
                        • String ID:
                        • API String ID: 4278518827-0
                        • Opcode ID: 705bd83c85b2089c74c9ff3eb8793549eef73ffed9a12064727e10408ebf53ad
                        • Instruction ID: a407963604c5f8dacbd9f6e6cb22574b49e0f051351d3f8eed8bc5e1525848d1
                        • Opcode Fuzzy Hash: 705bd83c85b2089c74c9ff3eb8793549eef73ffed9a12064727e10408ebf53ad
                        • Instruction Fuzzy Hash: 7F0167B0902B5ABDE3008F6A8C85B52FFA8FF19354F00411BA15C4BA42C7F5A864CBE5
                        APIs
                        • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00F0EB30
                        • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00F0EB46
                        • GetWindowThreadProcessId.USER32(?,?), ref: 00F0EB55
                        • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00F0EB64
                        • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00F0EB6E
                        • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00F0EB75
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                        • String ID:
                        • API String ID: 839392675-0
                        • Opcode ID: c24117c50e2b2e969d6680d3b7e712b9d2bde1ae2d0b96f55c6695ac28af195a
                        • Instruction ID: f3a10d3ea2505ce3a1ba730de213b2941637de9e7e0d1d2ebacd82b79ac76624
                        • Opcode Fuzzy Hash: c24117c50e2b2e969d6680d3b7e712b9d2bde1ae2d0b96f55c6695ac28af195a
                        • Instruction Fuzzy Hash: 89F03A7264015CBBE7215B629C0EEEF3A7DEFCAB21F004158F601E1191D7A05A01EBF5
                        APIs
                        • GetClientRect.USER32(?), ref: 00EF7452
                        • SendMessageW.USER32(?,00001328,00000000,?), ref: 00EF7469
                        • GetWindowDC.USER32(?), ref: 00EF7475
                        • GetPixel.GDI32(00000000,?,?), ref: 00EF7484
                        • ReleaseDC.USER32(?,00000000), ref: 00EF7496
                        • GetSysColor.USER32(00000005), ref: 00EF74B0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ClientColorMessagePixelRectReleaseSendWindow
                        • String ID:
                        • API String ID: 272304278-0
                        • Opcode ID: 1a4f9b0036ad0ea2e02ac61e9723220a23a283bafa19ea542a6933c2219def21
                        • Instruction ID: d3b2746a80c54a57cbc77f77cb28224db89f94ab3a7af389726b2ff4cb2759a3
                        • Opcode Fuzzy Hash: 1a4f9b0036ad0ea2e02ac61e9723220a23a283bafa19ea542a6933c2219def21
                        • Instruction Fuzzy Hash: 65014B31400619EFEB515F64DC09BEA7BB6FB04321F550164FA69B21A1CB311E51BB91
                        APIs
                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00F0187F
                        • UnloadUserProfile.USERENV(?,?), ref: 00F0188B
                        • CloseHandle.KERNEL32(?), ref: 00F01894
                        • CloseHandle.KERNEL32(?), ref: 00F0189C
                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00F018A5
                        • HeapFree.KERNEL32(00000000), ref: 00F018AC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                        • String ID:
                        • API String ID: 146765662-0
                        • Opcode ID: 87852fea6ab162dd400e9326512879f381dc3bbf970ba24d341bc0b038cab255
                        • Instruction ID: 36624cc84ff6a9ca78d28fc8465a9b0412c039fe8d792157aa526ef0cba7d075
                        • Opcode Fuzzy Hash: 87852fea6ab162dd400e9326512879f381dc3bbf970ba24d341bc0b038cab255
                        • Instruction Fuzzy Hash: A1E0E536004109BBEB016FA2ED0C90ABF3AFF49B32B108220F265A1071CB329430FF90
                        APIs
                          • Part of subcall function 00EC0242: EnterCriticalSection.KERNEL32(00F7070C,00F71884,?,?,00EB198B,00F72518,?,?,?,00EA12F9,00000000), ref: 00EC024D
                          • Part of subcall function 00EC0242: LeaveCriticalSection.KERNEL32(00F7070C,?,00EB198B,00F72518,?,?,?,00EA12F9,00000000), ref: 00EC028A
                          • Part of subcall function 00EA9CB3: _wcslen.LIBCMT ref: 00EA9CBD
                          • Part of subcall function 00EC00A3: __onexit.LIBCMT ref: 00EC00A9
                        • __Init_thread_footer.LIBCMT ref: 00F27BFB
                          • Part of subcall function 00EC01F8: EnterCriticalSection.KERNEL32(00F7070C,?,?,00EB8747,00F72514), ref: 00EC0202
                          • Part of subcall function 00EC01F8: LeaveCriticalSection.KERNEL32(00F7070C,?,00EB8747,00F72514), ref: 00EC0235
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                        • String ID: +T$5$G$Variable must be of type 'Object'.
                        • API String ID: 535116098-4125810065
                        • Opcode ID: 5acfa89edc33270dc2b298992c19c015ffc0c71590af2b7d9f5f1b5a7c0641c5
                        • Instruction ID: c20bb8fd54d4d4550786c859d7f6e37c574f6527b2fe3da0528321752bf291a6
                        • Opcode Fuzzy Hash: 5acfa89edc33270dc2b298992c19c015ffc0c71590af2b7d9f5f1b5a7c0641c5
                        • Instruction Fuzzy Hash: F191BD71A04319EFCB04EF54E891DADB7B1FF49310F548059F806AB292DB31AE41EB52
                        APIs
                          • Part of subcall function 00EA7620: _wcslen.LIBCMT ref: 00EA7625
                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F0C6EE
                        • _wcslen.LIBCMT ref: 00F0C735
                        • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F0C79C
                        • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00F0C7CA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ItemMenu$Info_wcslen$Default
                        • String ID: 0
                        • API String ID: 1227352736-4108050209
                        • Opcode ID: b7b3efe00e33ded25bbc97f7cc902dcbb4b1cdb13d7ba2218c6bdfcd69fffaa4
                        • Instruction ID: 09b33b03bf1ae739045e641a198a16a562135d3c94ffeea8d4effe31eca877e6
                        • Opcode Fuzzy Hash: b7b3efe00e33ded25bbc97f7cc902dcbb4b1cdb13d7ba2218c6bdfcd69fffaa4
                        • Instruction Fuzzy Hash: 6751BF72A043019BD7659F28C885B6B77E8AF89320F040B2DF995E31E1DB75D904FB92
                        APIs
                        • ShellExecuteExW.SHELL32(0000003C), ref: 00F2AEA3
                          • Part of subcall function 00EA7620: _wcslen.LIBCMT ref: 00EA7625
                        • GetProcessId.KERNEL32(00000000), ref: 00F2AF38
                        • CloseHandle.KERNEL32(00000000), ref: 00F2AF67
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CloseExecuteHandleProcessShell_wcslen
                        • String ID: <$@
                        • API String ID: 146682121-1426351568
                        • Opcode ID: 9ba5d748c761b142367dca23f885ccd4c4b7a5d06da2123cd377fc43203e00ac
                        • Instruction ID: 1f12a4898a87cd46b582a7353a994d19fb5e4c8fc1a8f43cb5f744d73b6c3d8e
                        • Opcode Fuzzy Hash: 9ba5d748c761b142367dca23f885ccd4c4b7a5d06da2123cd377fc43203e00ac
                        • Instruction Fuzzy Hash: 14718971A00629DFCB14EF65D484A9EBBF1FF09310F048499E856AB392CB74ED45CB91
                        APIs
                        • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00F07206
                        • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00F0723C
                        • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00F0724D
                        • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00F072CF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ErrorMode$AddressCreateInstanceProc
                        • String ID: DllGetClassObject
                        • API String ID: 753597075-1075368562
                        • Opcode ID: 1cbd35e2696955405aa8b8a62e50894050072a5a332676abfec02547c78b8c1d
                        • Instruction ID: 301037d455b26b40b029641cb1945fbdcaf3198bae6d7d0d6a39d715b6cfcabc
                        • Opcode Fuzzy Hash: 1cbd35e2696955405aa8b8a62e50894050072a5a332676abfec02547c78b8c1d
                        • Instruction Fuzzy Hash: EB414C71E04304EFDB15EF54C884A9A7BA9EF44310F1580A9BD059F28AD7B0ED44FBA0
                        APIs
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F33E35
                        • IsMenu.USER32(?), ref: 00F33E4A
                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00F33E92
                        • DrawMenuBar.USER32 ref: 00F33EA5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Menu$Item$DrawInfoInsert
                        • String ID: 0
                        • API String ID: 3076010158-4108050209
                        • Opcode ID: 5fe4e70a09a404f9ae803fc86b1dfac100b6fcc82cf0ee88e667359471563caf
                        • Instruction ID: 62fb356099b946458c2c1e6ea8dc6c25ef818ff337791c68e96721231be38d07
                        • Opcode Fuzzy Hash: 5fe4e70a09a404f9ae803fc86b1dfac100b6fcc82cf0ee88e667359471563caf
                        • Instruction Fuzzy Hash: E6414875A00209AFDB10DF54D884EEABBB9FF49370F044129E905A7250D730AE89EFA0
                        APIs
                          • Part of subcall function 00EA9CB3: _wcslen.LIBCMT ref: 00EA9CBD
                          • Part of subcall function 00F03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F03CCA
                        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00F01E66
                        • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00F01E79
                        • SendMessageW.USER32(?,00000189,?,00000000), ref: 00F01EA9
                          • Part of subcall function 00EA6B57: _wcslen.LIBCMT ref: 00EA6B6A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$_wcslen$ClassName
                        • String ID: ComboBox$ListBox
                        • API String ID: 2081771294-1403004172
                        • Opcode ID: aa387643d0bec3e7ceb84b4b559f1b7597527cad3da4ed0b85b20f3d5b977108
                        • Instruction ID: 6ad31aec49ba9d5d7f30ad40eeb1d04a7c92115705ebe360d18f74c7c3a6f790
                        • Opcode Fuzzy Hash: aa387643d0bec3e7ceb84b4b559f1b7597527cad3da4ed0b85b20f3d5b977108
                        • Instruction Fuzzy Hash: 6121E572A00108BBDB14AB64DC46CFFB7F9EF46364B145119F825B71E1DB38690AB660
                        APIs
                        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00F32F8D
                        • LoadLibraryW.KERNEL32(?), ref: 00F32F94
                        • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00F32FA9
                        • DestroyWindow.USER32(?), ref: 00F32FB1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$DestroyLibraryLoadWindow
                        • String ID: SysAnimate32
                        • API String ID: 3529120543-1011021900
                        • Opcode ID: e4374966fa85b1c32b9d99f95d3232104aaed196b56a48f29a02236263a0b055
                        • Instruction ID: 5b6526a411edc08476c43d63626e1a6c803ceba041abd480cb4fcbb00bf00a88
                        • Opcode Fuzzy Hash: e4374966fa85b1c32b9d99f95d3232104aaed196b56a48f29a02236263a0b055
                        • Instruction Fuzzy Hash: 6321AC72B04209ABEB604F78DC81EBB77B9EB59374F100218FA50E6190D771DC91B7A0
                        APIs
                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00EC4D1E,00ED28E9,(,00EC4CBE,00000000,00F688B8,0000000C,00EC4E15,(,00000002), ref: 00EC4D8D
                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00EC4DA0
                        • FreeLibrary.KERNEL32(00000000,?,?,?,00EC4D1E,00ED28E9,(,00EC4CBE,00000000,00F688B8,0000000C,00EC4E15,(,00000002,00000000), ref: 00EC4DC3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: AddressFreeHandleLibraryModuleProc
                        • String ID: CorExitProcess$mscoree.dll
                        • API String ID: 4061214504-1276376045
                        • Opcode ID: 90181bcea6fed3b8c2dafc8e77e94a65d9c036ae6bf9c436487f8bdca70b548a
                        • Instruction ID: 781942e7b11d25b2995e0cf51f0ef58ba3c8e7034bdcd906ccf135ffa35d31f6
                        • Opcode Fuzzy Hash: 90181bcea6fed3b8c2dafc8e77e94a65d9c036ae6bf9c436487f8bdca70b548a
                        • Instruction Fuzzy Hash: F5F0313554020CFBDB11AB90DD49FADBFA5EF44755F000198E906B2190DB719941EBD1
                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00EA4EDD,?,00F71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00EA4E9C
                        • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00EA4EAE
                        • FreeLibrary.KERNEL32(00000000,?,?,00EA4EDD,?,00F71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00EA4EC0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                        • API String ID: 145871493-3689287502
                        • Opcode ID: b26388aef14993aabb6f1dc9c07d407d97576436183297bae45ff29b52adb484
                        • Instruction ID: f15fb87affd768abe2b9ac710c66efb66cf8fbca4f00def79d3988096fa8704c
                        • Opcode Fuzzy Hash: b26388aef14993aabb6f1dc9c07d407d97576436183297bae45ff29b52adb484
                        • Instruction Fuzzy Hash: 6AE08636A015229B922127256C18A5B7555AFC7B76B054116FC01FB240DBA0DD0162E1
                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00EE3CDE,?,00F71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00EA4E62
                        • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00EA4E74
                        • FreeLibrary.KERNEL32(00000000,?,?,00EE3CDE,?,00F71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00EA4E87
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                        • API String ID: 145871493-1355242751
                        • Opcode ID: 04d46f5d48dc0cc78dd25bd921171c48de4698fa8b31e891cc06cc1df22aed8a
                        • Instruction ID: 678acc69e50db4ddf8f12df02706d46d2a87dd9e66e056fbad11acbcb2a525ce
                        • Opcode Fuzzy Hash: 04d46f5d48dc0cc78dd25bd921171c48de4698fa8b31e891cc06cc1df22aed8a
                        • Instruction Fuzzy Hash: 3BD0C2365026229747222B247C08D8B7A19AFCAB393054111B801FB194CFA0CD01B2D0
                        APIs
                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00F12C05
                        • DeleteFileW.KERNEL32(?), ref: 00F12C87
                        • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00F12C9D
                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00F12CAE
                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00F12CC0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: File$Delete$Copy
                        • String ID:
                        • API String ID: 3226157194-0
                        • Opcode ID: e2738cb84ef246688003e24f5312b22cbcf48311f3d08c25fc683fcee8561ec5
                        • Instruction ID: 060c7b9184fa456e07bd81ffec2454e81fdcc71a685a26ea7589e9018cce2898
                        • Opcode Fuzzy Hash: e2738cb84ef246688003e24f5312b22cbcf48311f3d08c25fc683fcee8561ec5
                        • Instruction Fuzzy Hash: FBB17D72D00119ABDF10DBA4CD85EDFB7BDEF49350F0040AAF609F6141EA35AA949FA1
                        APIs
                        • GetCurrentProcessId.KERNEL32 ref: 00F2A427
                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00F2A435
                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00F2A468
                        • CloseHandle.KERNEL32(?), ref: 00F2A63D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Process$CloseCountersCurrentHandleOpen
                        • String ID:
                        • API String ID: 3488606520-0
                        • Opcode ID: 62e0997bb10d3ce4f53f5d5c886453b77c50d5d14293cf507057c9e3ce4cea63
                        • Instruction ID: 696e17a1abb21814429adda364f4d4070ecb85410f2be37f93fa5efe9fb80a75
                        • Opcode Fuzzy Hash: 62e0997bb10d3ce4f53f5d5c886453b77c50d5d14293cf507057c9e3ce4cea63
                        • Instruction Fuzzy Hash: EEA1A1716043019FD720DF24D886F2AB7E5AF88724F18985DF59AAB2D2D770EC41CB92
                        APIs
                        • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00F43700), ref: 00EDBB91
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00F7121C,000000FF,00000000,0000003F,00000000,?,?), ref: 00EDBC09
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00F71270,000000FF,?,0000003F,00000000,?), ref: 00EDBC36
                        • _free.LIBCMT ref: 00EDBB7F
                          • Part of subcall function 00ED29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00EDD7D1,00000000,00000000,00000000,00000000,?,00EDD7F8,00000000,00000007,00000000,?,00EDDBF5,00000000), ref: 00ED29DE
                          • Part of subcall function 00ED29C8: GetLastError.KERNEL32(00000000,?,00EDD7D1,00000000,00000000,00000000,00000000,?,00EDD7F8,00000000,00000007,00000000,?,00EDDBF5,00000000,00000000), ref: 00ED29F0
                        • _free.LIBCMT ref: 00EDBD4B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                        • String ID:
                        • API String ID: 1286116820-0
                        • Opcode ID: 0c690b7e542b50f9867021d18e105699831b9bf0538bbd9478fe0b33326f986b
                        • Instruction ID: eed75d0ed1a6d794ab01b3cf07c6edb5562edc0a97bb25e490a72f9e51531fc4
                        • Opcode Fuzzy Hash: 0c690b7e542b50f9867021d18e105699831b9bf0538bbd9478fe0b33326f986b
                        • Instruction Fuzzy Hash: 1251B471900209EFCB10EF699C419AAB7F8FB40314B11526BE554F7391FB709D46EB91
                        APIs
                          • Part of subcall function 00F0DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00F0CF22,?), ref: 00F0DDFD
                          • Part of subcall function 00F0DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00F0CF22,?), ref: 00F0DE16
                          • Part of subcall function 00F0E199: GetFileAttributesW.KERNEL32(?,00F0CF95), ref: 00F0E19A
                        • lstrcmpiW.KERNEL32(?,?), ref: 00F0E473
                        • MoveFileW.KERNEL32(?,?), ref: 00F0E4AC
                        • _wcslen.LIBCMT ref: 00F0E5EB
                        • _wcslen.LIBCMT ref: 00F0E603
                        • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00F0E650
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                        • String ID:
                        • API String ID: 3183298772-0
                        • Opcode ID: e9dbaf7d0023cb1855f2b838eac785d3be50908941471e1a3c512b340932e827
                        • Instruction ID: c819faf7ae59552493609abb0e09fa0950420885d383f597b22f990f768ac1ed
                        • Opcode Fuzzy Hash: e9dbaf7d0023cb1855f2b838eac785d3be50908941471e1a3c512b340932e827
                        • Instruction Fuzzy Hash: E05151B24083459BC724EB90DC81ADFB3ECAF85350F004D1EF589D3192EF75A688A766
                        APIs
                          • Part of subcall function 00EA9CB3: _wcslen.LIBCMT ref: 00EA9CBD
                          • Part of subcall function 00F2C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F2B6AE,?,?), ref: 00F2C9B5
                          • Part of subcall function 00F2C998: _wcslen.LIBCMT ref: 00F2C9F1
                          • Part of subcall function 00F2C998: _wcslen.LIBCMT ref: 00F2CA68
                          • Part of subcall function 00F2C998: _wcslen.LIBCMT ref: 00F2CA9E
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F2BAA5
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00F2BB00
                        • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00F2BB63
                        • RegCloseKey.ADVAPI32(?,?), ref: 00F2BBA6
                        • RegCloseKey.ADVAPI32(00000000), ref: 00F2BBB3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                        • String ID:
                        • API String ID: 826366716-0
                        • Opcode ID: 54e962b9735283ba9a8a1ab801716ea61cc6fcb474ad5b0358382fca7f8a3060
                        • Instruction ID: 577fd4178603c6c50ca3194393d99239a9b7776311d7122ff0bf30ea69d3b63e
                        • Opcode Fuzzy Hash: 54e962b9735283ba9a8a1ab801716ea61cc6fcb474ad5b0358382fca7f8a3060
                        • Instruction Fuzzy Hash: 2F61C131608241AFC314DF14D890E2ABBE5FF85318F1485ACF8998B2A2CB35ED45DF92
                        APIs
                        • VariantInit.OLEAUT32(?), ref: 00F08BCD
                        • VariantClear.OLEAUT32 ref: 00F08C3E
                        • VariantClear.OLEAUT32 ref: 00F08C9D
                        • VariantClear.OLEAUT32(?), ref: 00F08D10
                        • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00F08D3B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Variant$Clear$ChangeInitType
                        • String ID:
                        • API String ID: 4136290138-0
                        • Opcode ID: 7345647b9611bfc922ccb3c501b98d56ccf928fa5fd0f5f9d9e9931b82e89b53
                        • Instruction ID: 21d8d27aabbdf118056c034716cbd59776501e59f5301e2f0f9333404167c519
                        • Opcode Fuzzy Hash: 7345647b9611bfc922ccb3c501b98d56ccf928fa5fd0f5f9d9e9931b82e89b53
                        • Instruction Fuzzy Hash: D6517BB5A01219EFCB10CF68C884AAAB7F9FF89350B158559F945EB350E730E912DF90
                        APIs
                        • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00F18BAE
                        • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00F18BDA
                        • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00F18C32
                        • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00F18C57
                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00F18C5F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: PrivateProfile$SectionWrite$String
                        • String ID:
                        • API String ID: 2832842796-0
                        • Opcode ID: 53b302bc730e2b474283481b0002140c24eec00b1119b4b0a06ea411fb877f07
                        • Instruction ID: 3ef0be456e08d343be163d63eb0adb2568e09b9040416f15dc88a3b5091d09a2
                        • Opcode Fuzzy Hash: 53b302bc730e2b474283481b0002140c24eec00b1119b4b0a06ea411fb877f07
                        • Instruction Fuzzy Hash: 31512935A00219DFCB05DF64C881AAABBF6FF49354F088458E849AB362DB35FD51DB90
                        APIs
                        • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00F28F40
                        • GetProcAddress.KERNEL32(00000000,?), ref: 00F28FD0
                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00F28FEC
                        • GetProcAddress.KERNEL32(00000000,?), ref: 00F29032
                        • FreeLibrary.KERNEL32(00000000), ref: 00F29052
                          • Part of subcall function 00EBF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00F11043,?,7529E610), ref: 00EBF6E6
                          • Part of subcall function 00EBF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00EFFA64,00000000,00000000,?,?,00F11043,?,7529E610,?,00EFFA64), ref: 00EBF70D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                        • String ID:
                        • API String ID: 666041331-0
                        • Opcode ID: 4c0f520ef9878ff09a17c46aef45e9828bc2751434b04b8a397c31f533dc5c0e
                        • Instruction ID: 01c961c36612e6c0c62f9fcb93f7c1fd4e3f5ffecb823eb8b19c22cf4b2d3a11
                        • Opcode Fuzzy Hash: 4c0f520ef9878ff09a17c46aef45e9828bc2751434b04b8a397c31f533dc5c0e
                        • Instruction Fuzzy Hash: 58513835A05215DFC704DF64C4948A9BBF2FF49324F088099E805AB362DB31ED86DB90
                        APIs
                        • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00F36C33
                        • SetWindowLongW.USER32(?,000000EC,?), ref: 00F36C4A
                        • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00F36C73
                        • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00F1AB79,00000000,00000000), ref: 00F36C98
                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00F36CC7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Window$Long$MessageSendShow
                        • String ID:
                        • API String ID: 3688381893-0
                        • Opcode ID: 23472c82ebee7f8134c737c1556a54a901eb246f4d7d21da8b8e858d2e4e50d1
                        • Instruction ID: 757908d398811bbe1bc43e98de32b8e31ffbffa1e987168fb4bb2b4c39ec8812
                        • Opcode Fuzzy Hash: 23472c82ebee7f8134c737c1556a54a901eb246f4d7d21da8b8e858d2e4e50d1
                        • Instruction Fuzzy Hash: C741A435A04114BFDB24CF28CC55FA9BBA5EB093B1F159224F959E72A0C371ED41EA90
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _free
                        • String ID:
                        • API String ID: 269201875-0
                        • Opcode ID: 9fe0c32c9c7444f1ce0a50a6898ab14715bdcf2d2a95eb3c5a1471ec1a428532
                        • Instruction ID: 3e45faa6939f34bf2556cf89a0c25aba360c2a13ea75e6c62859ed3875fe5ec6
                        • Opcode Fuzzy Hash: 9fe0c32c9c7444f1ce0a50a6898ab14715bdcf2d2a95eb3c5a1471ec1a428532
                        • Instruction Fuzzy Hash: 6F41D432A00204AFCB24DF78C880A6EB3E5EF98714B1555ADE615FB351D631AD02DB80
                        APIs
                        • GetCursorPos.USER32(?), ref: 00EB9141
                        • ScreenToClient.USER32(00000000,?), ref: 00EB915E
                        • GetAsyncKeyState.USER32(00000001), ref: 00EB9183
                        • GetAsyncKeyState.USER32(00000002), ref: 00EB919D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: AsyncState$ClientCursorScreen
                        • String ID:
                        • API String ID: 4210589936-0
                        • Opcode ID: 845353aca7f9927721ed9cec09bb6719794b2768c52f62960310974c0188eda9
                        • Instruction ID: 2bc0add754270a9d9230434c22e6f26fd1ba4769b51fddd950b8dd8eb82ce6cb
                        • Opcode Fuzzy Hash: 845353aca7f9927721ed9cec09bb6719794b2768c52f62960310974c0188eda9
                        • Instruction Fuzzy Hash: 1B419C31A0920AEBCF059F68C848BFEB774FF05324F209219E569B7291C7346954EB91
                        APIs
                        • GetInputState.USER32 ref: 00F138CB
                        • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00F13922
                        • TranslateMessage.USER32(?), ref: 00F1394B
                        • DispatchMessageW.USER32(?), ref: 00F13955
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F13966
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                        • String ID:
                        • API String ID: 2256411358-0
                        • Opcode ID: 1b56002738336f9a36cc8d16ec530c2b25f9302ac3ef9b9798a974ab6264188c
                        • Instruction ID: e9f3072327278554f2fc063db93b8fe59fa3d637fcc531300eb99b32e5848b56
                        • Opcode Fuzzy Hash: 1b56002738336f9a36cc8d16ec530c2b25f9302ac3ef9b9798a974ab6264188c
                        • Instruction Fuzzy Hash: 4E31F771D043499EEB35CB349808FF63BAAEB05320F44046DE466920A0E3B4A6C8FB52
                        APIs
                        • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00F1C21E,00000000), ref: 00F1CF38
                        • InternetReadFile.WININET(?,00000000,?,?), ref: 00F1CF6F
                        • GetLastError.KERNEL32(?,00000000,?,?,?,00F1C21E,00000000), ref: 00F1CFB4
                        • SetEvent.KERNEL32(?,?,00000000,?,?,?,00F1C21E,00000000), ref: 00F1CFC8
                        • SetEvent.KERNEL32(?,?,00000000,?,?,?,00F1C21E,00000000), ref: 00F1CFF2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                        • String ID:
                        • API String ID: 3191363074-0
                        • Opcode ID: fe8d29b4e3c2b3d4a0e41b9b1760bf4f2f907f29de863edae7c20b34eadf1714
                        • Instruction ID: 7adc49bccc1e36eeb3aeeb83241e49d43f00366b3c686681b464694f150be446
                        • Opcode Fuzzy Hash: fe8d29b4e3c2b3d4a0e41b9b1760bf4f2f907f29de863edae7c20b34eadf1714
                        • Instruction Fuzzy Hash: 68315271940205EFDB24DFA5C884AEBBBFAEB14360B10442EF516E2140D730ED81EBB0
                        APIs
                        • GetWindowRect.USER32(?,?), ref: 00F01915
                        • PostMessageW.USER32(00000001,00000201,00000001), ref: 00F019C1
                        • Sleep.KERNEL32(00000000,?,?,?), ref: 00F019C9
                        • PostMessageW.USER32(00000001,00000202,00000000), ref: 00F019DA
                        • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00F019E2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessagePostSleep$RectWindow
                        • String ID:
                        • API String ID: 3382505437-0
                        • Opcode ID: 57e48fadef3d20a1fe611b808e034156d957d4e5d394d16cd24642ac1e3e687a
                        • Instruction ID: 294747d991a7f62365dfd602db9fffecbc3d4f63524b20ac5e0a3f4d4f0fb370
                        • Opcode Fuzzy Hash: 57e48fadef3d20a1fe611b808e034156d957d4e5d394d16cd24642ac1e3e687a
                        • Instruction Fuzzy Hash: BB31C072A0021DEFCB10CFA8CD99ADE7BB6FB05325F104229F925A72D1C7709954EB90
                        APIs
                        • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00F35745
                        • SendMessageW.USER32(?,00001074,?,00000001), ref: 00F3579D
                        • _wcslen.LIBCMT ref: 00F357AF
                        • _wcslen.LIBCMT ref: 00F357BA
                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00F35816
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$_wcslen
                        • String ID:
                        • API String ID: 763830540-0
                        • Opcode ID: e149ed1b56ecc2d6dd99a644b70fbe196454c19064ef90ba5af5bcd23999fbbd
                        • Instruction ID: e6dfbcd7af54c35e0ef30addaabb422061d3765f355fe372b2737753809a19eb
                        • Opcode Fuzzy Hash: e149ed1b56ecc2d6dd99a644b70fbe196454c19064ef90ba5af5bcd23999fbbd
                        • Instruction Fuzzy Hash: 93218271D04618DADB20DFA4CC85AEE7BB8FF84B34F108256E929EA1C0D7708A85DF51
                        APIs
                        • IsWindow.USER32(00000000), ref: 00F20951
                        • GetForegroundWindow.USER32 ref: 00F20968
                        • GetDC.USER32(00000000), ref: 00F209A4
                        • GetPixel.GDI32(00000000,?,00000003), ref: 00F209B0
                        • ReleaseDC.USER32(00000000,00000003), ref: 00F209E8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Window$ForegroundPixelRelease
                        • String ID:
                        • API String ID: 4156661090-0
                        • Opcode ID: 66ce5c5ab4f331cc7962e93496f9fbdd2a102fe6d32512021f49050cecefde96
                        • Instruction ID: 0fc151b174fc206d55485a1ffbed410c2a43e012b2d4a92e50c601b3aa1aa2ca
                        • Opcode Fuzzy Hash: 66ce5c5ab4f331cc7962e93496f9fbdd2a102fe6d32512021f49050cecefde96
                        • Instruction Fuzzy Hash: 2F218436A00214AFD714EF65DC45A9EB7FAEF49710F048068F84AA7762CB34AC44EB90
                        APIs
                        • GetEnvironmentStringsW.KERNEL32 ref: 00EDCDC6
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00EDCDE9
                          • Part of subcall function 00ED3820: RtlAllocateHeap.NTDLL(00000000,?,00F71444,?,00EBFDF5,?,?,00EAA976,00000010,00F71440,00EA13FC,?,00EA13C6,?,00EA1129), ref: 00ED3852
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00EDCE0F
                        • _free.LIBCMT ref: 00EDCE22
                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00EDCE31
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                        • String ID:
                        • API String ID: 336800556-0
                        • Opcode ID: 35b0e815f10f9b4cc096cc7faa30ef5b83ec5e459898bd5b64f8b5578e96353e
                        • Instruction ID: 115741904c5711f5f5250682cf2ecdab32e20d2d46fa2ac0c10d585a05b286bb
                        • Opcode Fuzzy Hash: 35b0e815f10f9b4cc096cc7faa30ef5b83ec5e459898bd5b64f8b5578e96353e
                        • Instruction Fuzzy Hash: 9A01B5B26012167F232116BA6C48D7BBB6DDEC6BE5325112BFD05E7340DA618D03E2F0
                        APIs
                        • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00EB9693
                        • SelectObject.GDI32(?,00000000), ref: 00EB96A2
                        • BeginPath.GDI32(?), ref: 00EB96B9
                        • SelectObject.GDI32(?,00000000), ref: 00EB96E2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ObjectSelect$BeginCreatePath
                        • String ID:
                        • API String ID: 3225163088-0
                        • Opcode ID: d6dbd2cb757d2844ed462f98198e799131c3bab7f4616a5c714cfe7cfbacf841
                        • Instruction ID: 0f0d9367861eb9ff360b2ff5e900f67768942e06b6c8d45819c844458f3002a7
                        • Opcode Fuzzy Hash: d6dbd2cb757d2844ed462f98198e799131c3bab7f4616a5c714cfe7cfbacf841
                        • Instruction Fuzzy Hash: 6221B37080230DEBDB119F28EC047EA7BB5BB14365F100216F614B60B5D370588AEB91
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _memcmp
                        • String ID:
                        • API String ID: 2931989736-0
                        • Opcode ID: b00cb007da26129f0ce21e9b83150703c6b2ddc5e0aff430f65f0c655b44b38a
                        • Instruction ID: 5e251a4f82b5204094790ab572682ee44c4a9ef760a32b568a3e781b9f07a012
                        • Opcode Fuzzy Hash: b00cb007da26129f0ce21e9b83150703c6b2ddc5e0aff430f65f0c655b44b38a
                        • Instruction Fuzzy Hash: CE01B9A2A8160DFBD71855149F42FBB739C9F61BB8F004024FD04AE2C2F7A1ED15B6A1
                        APIs
                        • GetLastError.KERNEL32(?,?,?,00ECF2DE,00ED3863,00F71444,?,00EBFDF5,?,?,00EAA976,00000010,00F71440,00EA13FC,?,00EA13C6), ref: 00ED2DFD
                        • _free.LIBCMT ref: 00ED2E32
                        • _free.LIBCMT ref: 00ED2E59
                        • SetLastError.KERNEL32(00000000,00EA1129), ref: 00ED2E66
                        • SetLastError.KERNEL32(00000000,00EA1129), ref: 00ED2E6F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ErrorLast$_free
                        • String ID:
                        • API String ID: 3170660625-0
                        • Opcode ID: 9e2a1d943db7be0cdcbe1f6780c0d087ddb421b2a4c13fc00dd346e7ee9dde18
                        • Instruction ID: 9c6b07cfec7fd3dbc85b6b7e17f41abc3439b4c59abf825a75a898b165b8b616
                        • Opcode Fuzzy Hash: 9e2a1d943db7be0cdcbe1f6780c0d087ddb421b2a4c13fc00dd346e7ee9dde18
                        • Instruction Fuzzy Hash: 370121326006006BC61322356C45D2B379AEBF13BAB20642FFE64B23D2EEA0C8032161
                        APIs
                        • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00EFFF41,80070057,?,?,?,00F0035E), ref: 00F0002B
                        • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00EFFF41,80070057,?,?), ref: 00F00046
                        • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00EFFF41,80070057,?,?), ref: 00F00054
                        • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00EFFF41,80070057,?), ref: 00F00064
                        • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00EFFF41,80070057,?,?), ref: 00F00070
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: From$Prog$FreeStringTasklstrcmpi
                        • String ID:
                        • API String ID: 3897988419-0
                        • Opcode ID: a74929f377893aa0e81bdc5fdf4167d92f5c86a4bcbd3f9a9414f783a342c4b9
                        • Instruction ID: b24a0971acb8add0b99e5e398ce0721ba56d544743dd139940dd5c8662ed6498
                        • Opcode Fuzzy Hash: a74929f377893aa0e81bdc5fdf4167d92f5c86a4bcbd3f9a9414f783a342c4b9
                        • Instruction Fuzzy Hash: 93016276A00218BFDB214F69DC48BAA7AEEEF44761F144124F905E6250DF75DE40BBA0
                        APIs
                        • QueryPerformanceCounter.KERNEL32(?), ref: 00F0E997
                        • QueryPerformanceFrequency.KERNEL32(?), ref: 00F0E9A5
                        • Sleep.KERNEL32(00000000), ref: 00F0E9AD
                        • QueryPerformanceCounter.KERNEL32(?), ref: 00F0E9B7
                        • Sleep.KERNEL32 ref: 00F0E9F3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: PerformanceQuery$CounterSleep$Frequency
                        • String ID:
                        • API String ID: 2833360925-0
                        • Opcode ID: a0cb89fb58f1e6240499c1e740a46ddefb5bed2f14632c9abbb1ab0cbeb661e4
                        • Instruction ID: 064d2482ca2a5e410051eb460a80d1fc3032cee31314400fb2c9aca4848d4095
                        • Opcode Fuzzy Hash: a0cb89fb58f1e6240499c1e740a46ddefb5bed2f14632c9abbb1ab0cbeb661e4
                        • Instruction Fuzzy Hash: E5011731D0162DDBCF00AFE5D959AEEBB79BB09721F000956E902B2291DB309654BBA1
                        APIs
                        • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00F01114
                        • GetLastError.KERNEL32(?,00000000,00000000,?,?,00F00B9B,?,?,?), ref: 00F01120
                        • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00F00B9B,?,?,?), ref: 00F0112F
                        • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00F00B9B,?,?,?), ref: 00F01136
                        • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00F0114D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                        • String ID:
                        • API String ID: 842720411-0
                        • Opcode ID: b71f5319eca7f250f66d0fc7ef232cc41eaf32bf850211c967f732390b687735
                        • Instruction ID: 208c153a3be686731c6c6ca1435d104fa3cd6e039bb5386e53c6ffa5074cfa70
                        • Opcode Fuzzy Hash: b71f5319eca7f250f66d0fc7ef232cc41eaf32bf850211c967f732390b687735
                        • Instruction Fuzzy Hash: CF011975600219BFDB155FA5DC49A6A3B6EFF893B0B214419FA45E73A0DA31DC00BBA0
                        APIs
                        • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00F00FCA
                        • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00F00FD6
                        • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00F00FE5
                        • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00F00FEC
                        • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00F01002
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: HeapInformationToken$AllocErrorLastProcess
                        • String ID:
                        • API String ID: 44706859-0
                        • Opcode ID: 77a3f4c2a6b45a804b5b2d309a5f6f8e60c3d1aa698c11013e38cb28bbe23682
                        • Instruction ID: ee0877910a06598dc2810d010411f359cce73c78cd8d20a9c9762b87ac62fd2f
                        • Opcode Fuzzy Hash: 77a3f4c2a6b45a804b5b2d309a5f6f8e60c3d1aa698c11013e38cb28bbe23682
                        • Instruction Fuzzy Hash: 40F04F75600305ABD7215FA59C49F5A3B6EFF89771F104414F985D7291CA70DC50ABA0
                        APIs
                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00F0102A
                        • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00F01036
                        • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F01045
                        • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00F0104C
                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F01062
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: HeapInformationToken$AllocErrorLastProcess
                        • String ID:
                        • API String ID: 44706859-0
                        • Opcode ID: af7546855cf1b73708d6a67c121e45a4f6fcc4597e5cf5cd297e6b8c0a467e56
                        • Instruction ID: 20aed5cabfe0ed219f6b15d05ab15d249a10bb28de96c2a93bb5df093b2133af
                        • Opcode Fuzzy Hash: af7546855cf1b73708d6a67c121e45a4f6fcc4597e5cf5cd297e6b8c0a467e56
                        • Instruction Fuzzy Hash: A5F06D75200309EBDB215FA5EC49F5A3BAEFF89771F100414FA85E7291CA70D850ABA0
                        APIs
                        • CloseHandle.KERNEL32(?,?,?,?,00F1017D,?,00F132FC,?,00000001,00EE2592,?), ref: 00F10324
                        • CloseHandle.KERNEL32(?,?,?,?,00F1017D,?,00F132FC,?,00000001,00EE2592,?), ref: 00F10331
                        • CloseHandle.KERNEL32(?,?,?,?,00F1017D,?,00F132FC,?,00000001,00EE2592,?), ref: 00F1033E
                        • CloseHandle.KERNEL32(?,?,?,?,00F1017D,?,00F132FC,?,00000001,00EE2592,?), ref: 00F1034B
                        • CloseHandle.KERNEL32(?,?,?,?,00F1017D,?,00F132FC,?,00000001,00EE2592,?), ref: 00F10358
                        • CloseHandle.KERNEL32(?,?,?,?,00F1017D,?,00F132FC,?,00000001,00EE2592,?), ref: 00F10365
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CloseHandle
                        • String ID:
                        • API String ID: 2962429428-0
                        • Opcode ID: 2180d84ec5db5ce403859d11cc63dfc13dcc010362d0bce396ea7f0b7210b8b8
                        • Instruction ID: 2d9ab064d990b7c6aed34da88c63bbae210975aa16ae8245ef60a0b3a839cfa0
                        • Opcode Fuzzy Hash: 2180d84ec5db5ce403859d11cc63dfc13dcc010362d0bce396ea7f0b7210b8b8
                        • Instruction Fuzzy Hash: DC01A272800B159FC730AF66D880452F7F5BF603253158A3FD1A652931C7B1A995EF80
                        APIs
                        • _free.LIBCMT ref: 00EDD752
                          • Part of subcall function 00ED29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00EDD7D1,00000000,00000000,00000000,00000000,?,00EDD7F8,00000000,00000007,00000000,?,00EDDBF5,00000000), ref: 00ED29DE
                          • Part of subcall function 00ED29C8: GetLastError.KERNEL32(00000000,?,00EDD7D1,00000000,00000000,00000000,00000000,?,00EDD7F8,00000000,00000007,00000000,?,00EDDBF5,00000000,00000000), ref: 00ED29F0
                        • _free.LIBCMT ref: 00EDD764
                        • _free.LIBCMT ref: 00EDD776
                        • _free.LIBCMT ref: 00EDD788
                        • _free.LIBCMT ref: 00EDD79A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 10e7c7a4ad5e89bea88af426c035bdff764ac74e2f93a781199c57f3ce2280a1
                        • Instruction ID: 997100fdb2db2e025c0d729cb27f43fa9b5c74f85b93dd4e0b39b66fc62ccd13
                        • Opcode Fuzzy Hash: 10e7c7a4ad5e89bea88af426c035bdff764ac74e2f93a781199c57f3ce2280a1
                        • Instruction Fuzzy Hash: CFF06232548208AB8621EB64FDC1C267BDDFB84314B94284BF1A8F7701C731FC819AA0
                        APIs
                        • GetDlgItem.USER32(?,000003E9), ref: 00F05C58
                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 00F05C6F
                        • MessageBeep.USER32(00000000), ref: 00F05C87
                        • KillTimer.USER32(?,0000040A), ref: 00F05CA3
                        • EndDialog.USER32(?,00000001), ref: 00F05CBD
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                        • String ID:
                        • API String ID: 3741023627-0
                        • Opcode ID: 5389c600f2f02d567123c09b847b06ca856f056e823ce6649724bd1580343904
                        • Instruction ID: f21f8e83e376d6d360314b34ee77c9734b61bfa55562ae6cfd95d43a36e751c2
                        • Opcode Fuzzy Hash: 5389c600f2f02d567123c09b847b06ca856f056e823ce6649724bd1580343904
                        • Instruction Fuzzy Hash: 7501D131500B08ABFB205B20EE4FFA67BB9BB00F15F005559A583B10E0DBF4A984AF90
                        APIs
                        • _free.LIBCMT ref: 00ED22BE
                          • Part of subcall function 00ED29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00EDD7D1,00000000,00000000,00000000,00000000,?,00EDD7F8,00000000,00000007,00000000,?,00EDDBF5,00000000), ref: 00ED29DE
                          • Part of subcall function 00ED29C8: GetLastError.KERNEL32(00000000,?,00EDD7D1,00000000,00000000,00000000,00000000,?,00EDD7F8,00000000,00000007,00000000,?,00EDDBF5,00000000,00000000), ref: 00ED29F0
                        • _free.LIBCMT ref: 00ED22D0
                        • _free.LIBCMT ref: 00ED22E3
                        • _free.LIBCMT ref: 00ED22F4
                        • _free.LIBCMT ref: 00ED2305
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 1f4988c066ac2a0deab227aa7af9d68fde5c4dbf530819348c5cdb02940601f4
                        • Instruction ID: c5f95ade4db7ec16215a460ededb5ec6ed9be56119615dd71ed4662ff282534d
                        • Opcode Fuzzy Hash: 1f4988c066ac2a0deab227aa7af9d68fde5c4dbf530819348c5cdb02940601f4
                        • Instruction Fuzzy Hash: 1BF05E708001288B8622BF68BC118593BA4FB68760700150FF558E33B2CB720892FFE6
                        APIs
                        • EndPath.GDI32(?), ref: 00EB95D4
                        • StrokeAndFillPath.GDI32(?,?,00EF71F7,00000000,?,?,?), ref: 00EB95F0
                        • SelectObject.GDI32(?,00000000), ref: 00EB9603
                        • DeleteObject.GDI32 ref: 00EB9616
                        • StrokePath.GDI32(?), ref: 00EB9631
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Path$ObjectStroke$DeleteFillSelect
                        • String ID:
                        • API String ID: 2625713937-0
                        • Opcode ID: 0cc2265bf11000da6c72cf6ac07f637511a43ec748c93b2d513d36968c62d6bc
                        • Instruction ID: 8d8be557ba02e898a23acb49c78a7e05010eb25ed9dc6137c4c52e1e146eeaa6
                        • Opcode Fuzzy Hash: 0cc2265bf11000da6c72cf6ac07f637511a43ec748c93b2d513d36968c62d6bc
                        • Instruction Fuzzy Hash: 14F0B23100624CEBDB265F69ED18BA53B76BB01376F048214E669A90F1C730899AEF61
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: __freea$_free
                        • String ID: a/p$am/pm
                        • API String ID: 3432400110-3206640213
                        • Opcode ID: f12fca06ec0e8272007874f395a44b4f9a5c20d94f1542a78fb9765ad4edd28e
                        • Instruction ID: 53cc326ec9763b5e21f814c8bf56133c8f797bf662f3dd7f8fa2cc274b1cec4f
                        • Opcode Fuzzy Hash: f12fca06ec0e8272007874f395a44b4f9a5c20d94f1542a78fb9765ad4edd28e
                        • Instruction Fuzzy Hash: BCD11231A00246EADB289F68C845BFEB7B1FF05304F29219BE901BB751D3759D82CB91
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID: JO
                        • API String ID: 0-1663374661
                        • Opcode ID: e16f5a9979f044122c0b7e2165944d10bd350fcd2601405fd4efb46606449612
                        • Instruction ID: 6c3b3e65f59a36a43cc42c449f62eb641838ffc75553e6a5e1b489f8ae74cec5
                        • Opcode Fuzzy Hash: e16f5a9979f044122c0b7e2165944d10bd350fcd2601405fd4efb46606449612
                        • Instruction Fuzzy Hash: 4151CD72910609AFDB249FA4C945FEEBBB8EF45314F14201BF405BB3A1D6718903DB61
                        APIs
                        • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 00ED8B6E
                        • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 00ED8B7A
                        • __dosmaperr.LIBCMT ref: 00ED8B81
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ByteCharErrorLastMultiWide__dosmaperr
                        • String ID: .
                        • API String ID: 2434981716-3963672497
                        • Opcode ID: 65c7fd5865df142ac7f122afa3d8a8ec584d9b516b2dc05c0bff4a322533bcad
                        • Instruction ID: 383a8b865931ee4b077eabc722b5090c6bafd374fd3895fa49fe9f7c8a46e16b
                        • Opcode Fuzzy Hash: 65c7fd5865df142ac7f122afa3d8a8ec584d9b516b2dc05c0bff4a322533bcad
                        • Instruction Fuzzy Hash: 97415C74604185AFD7249F28C990ABD7FE6DF85304B28619BF885A7352DE318C039790
                        APIs
                          • Part of subcall function 00F0B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00F021D0,?,?,00000034,00000800,?,00000034), ref: 00F0B42D
                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00F02760
                          • Part of subcall function 00F0B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00F021FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00F0B3F8
                          • Part of subcall function 00F0B32A: GetWindowThreadProcessId.USER32(?,?), ref: 00F0B355
                          • Part of subcall function 00F0B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00F02194,00000034,?,?,00001004,00000000,00000000), ref: 00F0B365
                          • Part of subcall function 00F0B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00F02194,00000034,?,?,00001004,00000000,00000000), ref: 00F0B37B
                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00F027CD
                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00F0281A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                        • String ID: @
                        • API String ID: 4150878124-2766056989
                        • Opcode ID: 16a9858fe7ea516c465ee3c4ca65023838a525acfd8d9f7914461edbb2033ea0
                        • Instruction ID: 0ba1460d1a406867709f40e56d0afe343a52798d19084cb0f17cf348f700e574
                        • Opcode Fuzzy Hash: 16a9858fe7ea516c465ee3c4ca65023838a525acfd8d9f7914461edbb2033ea0
                        • Instruction Fuzzy Hash: 04412E76D00218AFDB10DFA4CD46AEEBBB8EF09710F108095FA55B7181DB706E45EBA1
                        APIs
                        • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 00ED1769
                        • _free.LIBCMT ref: 00ED1834
                        • _free.LIBCMT ref: 00ED183E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _free$FileModuleName
                        • String ID: C:\Users\user\Desktop\file.exe
                        • API String ID: 2506810119-517116171
                        • Opcode ID: 702775aa12b67bf9dd344eee96f412b5a7999c1071f369433cbc3eef4aef92bb
                        • Instruction ID: d1d4d210df2c9939c368cd2669f65fa56b4e449a3b45c06069dba7074cdd9e5f
                        • Opcode Fuzzy Hash: 702775aa12b67bf9dd344eee96f412b5a7999c1071f369433cbc3eef4aef92bb
                        • Instruction Fuzzy Hash: 2D31A075A00208BFDB25DB99D885D9EBBFCEB85310B1051ABF404E7321D6708E46EB91
                        APIs
                        • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00F0C306
                        • DeleteMenu.USER32(?,00000007,00000000), ref: 00F0C34C
                        • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00F71990,008A7D38), ref: 00F0C395
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Menu$Delete$InfoItem
                        • String ID: 0
                        • API String ID: 135850232-4108050209
                        • Opcode ID: 127d7edc7fc5589ec614602eeeebbcbbd40194380bf88515cc33bb84eb655f52
                        • Instruction ID: fc8be7fa465ac50163a9f20427cb66395cfd2666c8b095d3a26fdc32c1d35c71
                        • Opcode Fuzzy Hash: 127d7edc7fc5589ec614602eeeebbcbbd40194380bf88515cc33bb84eb655f52
                        • Instruction Fuzzy Hash: 5F41A0316043019FD720DF25DC84B5ABBE4AF85320F148B1DF9A5972D2D734E904EBA2
                        APIs
                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00F3CC08,00000000,?,?,?,?), ref: 00F344AA
                        • GetWindowLongW.USER32 ref: 00F344C7
                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00F344D7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Window$Long
                        • String ID: SysTreeView32
                        • API String ID: 847901565-1698111956
                        • Opcode ID: 3869e08145503d71b34b2b9076a89bf793252ad3ea66d5cde904ce0085c023eb
                        • Instruction ID: 356233c7f6453234e89d220116bf390210b5bea98c993f3c2a97792124ef0311
                        • Opcode Fuzzy Hash: 3869e08145503d71b34b2b9076a89bf793252ad3ea66d5cde904ce0085c023eb
                        • Instruction Fuzzy Hash: 96318D32610205AFDB209E38DC45BEA77A9EB09334F254725F979A21D1D774FC50AB90
                        APIs
                          • Part of subcall function 00F2335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00F23077,?,?), ref: 00F23378
                        • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00F2307A
                        • _wcslen.LIBCMT ref: 00F2309B
                        • htons.WSOCK32(00000000,?,?,00000000), ref: 00F23106
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                        • String ID: 255.255.255.255
                        • API String ID: 946324512-2422070025
                        • Opcode ID: 0bedce712c6337d4da11a4b2e66e1ca7b3c1123a0a8348877dbc0e9967f23d45
                        • Instruction ID: 9ddd2bf619992a4f9f4fb87568f0b567d283b498ee0f232f013946e29a5f2db9
                        • Opcode Fuzzy Hash: 0bedce712c6337d4da11a4b2e66e1ca7b3c1123a0a8348877dbc0e9967f23d45
                        • Instruction Fuzzy Hash: 8A31F5B5A002259FC710CF68D485FA977E0EF14328F248059E8159B392DB3AEF41D770
                        APIs
                        • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00F33F40
                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00F33F54
                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00F33F78
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$Window
                        • String ID: SysMonthCal32
                        • API String ID: 2326795674-1439706946
                        • Opcode ID: ad9eef7e402d04ab5dca87591a35da9909dcca47079d2cb308e50f691fb5068b
                        • Instruction ID: 55646f9f386fafac593fd02fa4fe904261fc438ab1cdfd7ffcea2ade4d16c4fb
                        • Opcode Fuzzy Hash: ad9eef7e402d04ab5dca87591a35da9909dcca47079d2cb308e50f691fb5068b
                        • Instruction Fuzzy Hash: 3C21BF32A00219BBDF25DF60CC46FEA3B75EB48724F110214FA197B1D0D6B5A894AB90
                        APIs
                        • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00F34705
                        • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00F34713
                        • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00F3471A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$DestroyWindow
                        • String ID: msctls_updown32
                        • API String ID: 4014797782-2298589950
                        • Opcode ID: e4481c5cf4c6c44a5804ecdeb1f247152ae8578e87024381166522dd34c6ce2b
                        • Instruction ID: d5ece0b8f585319c180b23c6a7afe442c26daa47933b4bd3ddc1bf3b394021f1
                        • Opcode Fuzzy Hash: e4481c5cf4c6c44a5804ecdeb1f247152ae8578e87024381166522dd34c6ce2b
                        • Instruction Fuzzy Hash: F1215EB5600208AFEB10DF68DCC1DA737EDEB4A3B4B140059FA04AB251CB71FC52EA60
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _wcslen
                        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                        • API String ID: 176396367-2734436370
                        • Opcode ID: 9d61538736c9373a160c81ad093b8f3659c21f2024758b22876de9d26e826161
                        • Instruction ID: 67228bc49a1a545d07d5cdf365c25dcd39ca49261026359a009583235cd232e1
                        • Opcode Fuzzy Hash: 9d61538736c9373a160c81ad093b8f3659c21f2024758b22876de9d26e826161
                        • Instruction Fuzzy Hash: BC21687260C5116AC731AA25DD02FBB73D89F95320F44402AF989AB0C2FBD2ED46F291
                        APIs
                        • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00F33840
                        • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00F33850
                        • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00F33876
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$MoveWindow
                        • String ID: Listbox
                        • API String ID: 3315199576-2633736733
                        • Opcode ID: 359eba03b175931c26e6119a18b0cf74a60c37be12cc789d2b394dd2021953d8
                        • Instruction ID: d780be1b83507aebb6428b6f732c21b23e2cff124ab219e4f04a1f94390d7429
                        • Opcode Fuzzy Hash: 359eba03b175931c26e6119a18b0cf74a60c37be12cc789d2b394dd2021953d8
                        • Instruction Fuzzy Hash: 6C21BE72A10218BBEF21DF54CC85FAB376AEF89770F118124F904AB190C675EC52A7A0
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 00F14A08
                        • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00F14A5C
                        • SetErrorMode.KERNEL32(00000000,?,?,00F3CC08), ref: 00F14AD0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ErrorMode$InformationVolume
                        • String ID: %lu
                        • API String ID: 2507767853-685833217
                        • Opcode ID: 83d5604cf18a42c3587beb8161044690f19fe4f143a4640e0082b07ff5a881b9
                        • Instruction ID: fd943a0ba1b2289465f15e01961fc10bfe956825844bca49df76996c9d2e9fe3
                        • Opcode Fuzzy Hash: 83d5604cf18a42c3587beb8161044690f19fe4f143a4640e0082b07ff5a881b9
                        • Instruction Fuzzy Hash: 8831C171A00108AFCB10DF54C880EAABBF8EF08318F1480A5F908EF252D735EE41DBA1
                        APIs
                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00F3424F
                        • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00F34264
                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00F34271
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: msctls_trackbar32
                        • API String ID: 3850602802-1010561917
                        • Opcode ID: 4ac19547512f24b9c0f53cdd5868791dbe200b215e5b8fff5f88cc5ee31eee19
                        • Instruction ID: fbc212f448c728b27fbf272a62e2477c7ff7266f81d5ca83abe39d23767159f8
                        • Opcode Fuzzy Hash: 4ac19547512f24b9c0f53cdd5868791dbe200b215e5b8fff5f88cc5ee31eee19
                        • Instruction Fuzzy Hash: 4411E031640208BEEF205E29CC06FAB3BACEF95B74F010124FA55E60A0D271E851AB20
                        APIs
                          • Part of subcall function 00EA6B57: _wcslen.LIBCMT ref: 00EA6B6A
                          • Part of subcall function 00F02DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00F02DC5
                          • Part of subcall function 00F02DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00F02DD6
                          • Part of subcall function 00F02DA7: GetCurrentThreadId.KERNEL32 ref: 00F02DDD
                          • Part of subcall function 00F02DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00F02DE4
                        • GetFocus.USER32 ref: 00F02F78
                          • Part of subcall function 00F02DEE: GetParent.USER32(00000000), ref: 00F02DF9
                        • GetClassNameW.USER32(?,?,00000100), ref: 00F02FC3
                        • EnumChildWindows.USER32(?,00F0303B), ref: 00F02FEB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                        • String ID: %s%d
                        • API String ID: 1272988791-1110647743
                        • Opcode ID: 92916bc516f5db1cdf1bc893b4617ce1194f66ad1eb54b9873e7d664dc077739
                        • Instruction ID: 0b8de5f345090ea900bb53ccacad514a572bf7fb538dc46a6e45729794b7813d
                        • Opcode Fuzzy Hash: 92916bc516f5db1cdf1bc893b4617ce1194f66ad1eb54b9873e7d664dc077739
                        • Instruction Fuzzy Hash: 3711E4717002096BCF417F708C8AEEE77AEAF85318F045075F909AB292DE349905BB70
                        APIs
                        • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00F358C1
                        • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00F358EE
                        • DrawMenuBar.USER32(?), ref: 00F358FD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Menu$InfoItem$Draw
                        • String ID: 0
                        • API String ID: 3227129158-4108050209
                        • Opcode ID: df89530598798989af02cbbc20b59b3279ed0ce0759d2cbde701506ef3bf3f86
                        • Instruction ID: 99ba598935cca1f08b1e9476e93422ae19a59b304d9b7c9d756c8b9f56b91b77
                        • Opcode Fuzzy Hash: df89530598798989af02cbbc20b59b3279ed0ce0759d2cbde701506ef3bf3f86
                        • Instruction Fuzzy Hash: 71015B32500218EEDB619F11DC44BAFBBB5FB85770F1480A9E849E6151DB308A94EF61
                        APIs
                        • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 00EFD3BF
                        • FreeLibrary.KERNEL32 ref: 00EFD3E5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: AddressFreeLibraryProc
                        • String ID: GetSystemWow64DirectoryW$X64
                        • API String ID: 3013587201-2590602151
                        • Opcode ID: 56f0395d9d71d3c530d104cbbafc4938744dd6233bdf513f57b10d7da2476d19
                        • Instruction ID: 608d81c074675c24abd5da2a4ad08f35a7c6796883cae1226d7cddb9f8e471ff
                        • Opcode Fuzzy Hash: 56f0395d9d71d3c530d104cbbafc4938744dd6233bdf513f57b10d7da2476d19
                        • Instruction Fuzzy Hash: 4DF0552280E628DBF73122108C549FA3B12AF10B15F54A425E702F2129E720CC40B3C3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 32b3fa88fb3b346b4b0281e4bb58c6338c9b5923c9b64d0c7e3871cca326631b
                        • Instruction ID: 7a4f3d8dc8eca43529a16622fae1636463655cc0153383b855d8a5fa8622a439
                        • Opcode Fuzzy Hash: 32b3fa88fb3b346b4b0281e4bb58c6338c9b5923c9b64d0c7e3871cca326631b
                        • Instruction Fuzzy Hash: 21C12975A0020AAFDB15CFA4C894BAEB7B5FF48714F108598E505EB291DB31EE41EB90
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Variant$ClearInitInitializeUninitialize
                        • String ID:
                        • API String ID: 1998397398-0
                        • Opcode ID: 9c50e1010ec160c64de62c52b0850a0b1609587dca0b506e5eedcc0a2238f6c4
                        • Instruction ID: 46ff4f9978f018ac8a646e3e95963b4656154f7e73c417999bea2c9a23e4ec96
                        • Opcode Fuzzy Hash: 9c50e1010ec160c64de62c52b0850a0b1609587dca0b506e5eedcc0a2238f6c4
                        • Instruction Fuzzy Hash: B5A12B756042119FC710EF24D885A2AB7E5FF8D724F048859F98AAB362DB34FD01DB91
                        APIs
                        • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00F3FC08,?), ref: 00F005F0
                        • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00F3FC08,?), ref: 00F00608
                        • CLSIDFromProgID.OLE32(?,?,00000000,00F3CC40,000000FF,?,00000000,00000800,00000000,?,00F3FC08,?), ref: 00F0062D
                        • _memcmp.LIBVCRUNTIME ref: 00F0064E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: FromProg$FreeTask_memcmp
                        • String ID:
                        • API String ID: 314563124-0
                        • Opcode ID: bb482d5927168288c6e2705fcfb68cdb8d75b12b2f23212e93ad27961a05d8f8
                        • Instruction ID: 4235f48011882cba2e46a0a371dc0d5aa2d1832595514bac254324e1978c4eaf
                        • Opcode Fuzzy Hash: bb482d5927168288c6e2705fcfb68cdb8d75b12b2f23212e93ad27961a05d8f8
                        • Instruction Fuzzy Hash: 2B810B75A00109EFCB04DF94C984EEEB7BAFF89315F244558F506AB290DB71AE06DB60
                        APIs
                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00F2A6AC
                        • Process32FirstW.KERNEL32(00000000,?), ref: 00F2A6BA
                          • Part of subcall function 00EA9CB3: _wcslen.LIBCMT ref: 00EA9CBD
                        • Process32NextW.KERNEL32(00000000,?), ref: 00F2A79C
                        • CloseHandle.KERNEL32(00000000), ref: 00F2A7AB
                          • Part of subcall function 00EBCE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00EE3303,?), ref: 00EBCE8A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                        • String ID:
                        • API String ID: 1991900642-0
                        • Opcode ID: c838dafd7cec916ad01e66a764aae9c4881685371ab917a8c87834b9c1004969
                        • Instruction ID: 2c6dd7b95466d42a894523267d897da4d5f77c3fb9944d7aff1deb88b9538824
                        • Opcode Fuzzy Hash: c838dafd7cec916ad01e66a764aae9c4881685371ab917a8c87834b9c1004969
                        • Instruction Fuzzy Hash: 54519F715083109FD310EF24D886A6BBBF8FF89754F04992DF589A7252EB30E904CB92
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _free
                        • String ID:
                        • API String ID: 269201875-0
                        • Opcode ID: 5424cb079ae60b37dcd5e89bcf5e0c1b7a7ff0611bc83d08ee102f3ca27b7c86
                        • Instruction ID: 6728dad137996f48e019f35446855f440f62f3cc7b6f40d77a406bfe6a5ba19c
                        • Opcode Fuzzy Hash: 5424cb079ae60b37dcd5e89bcf5e0c1b7a7ff0611bc83d08ee102f3ca27b7c86
                        • Instruction Fuzzy Hash: 58414F316005586BDB257BBA8C45FFE3AE5EF41370F1422A9F439F63D2E63548C29261
                        APIs
                        • GetWindowRect.USER32(?,?), ref: 00F362E2
                        • ScreenToClient.USER32(?,?), ref: 00F36315
                        • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00F36382
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Window$ClientMoveRectScreen
                        • String ID:
                        • API String ID: 3880355969-0
                        • Opcode ID: 1411def4b6f288d0da88c6bfb6b5d72dbf3560dcc541caa3de58dd75300bc2ca
                        • Instruction ID: c13b4682496a5c7a34c9b1e729ee2c6af1dff1560465928c757913fd6897233e
                        • Opcode Fuzzy Hash: 1411def4b6f288d0da88c6bfb6b5d72dbf3560dcc541caa3de58dd75300bc2ca
                        • Instruction Fuzzy Hash: 1A510875A00209AFDF10DF68D881AAE7BB6FB45370F108169F955DB2A0D730ED81EB90
                        APIs
                        • socket.WSOCK32(00000002,00000002,00000011), ref: 00F21AFD
                        • WSAGetLastError.WSOCK32 ref: 00F21B0B
                        • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00F21B8A
                        • WSAGetLastError.WSOCK32 ref: 00F21B94
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ErrorLast$socket
                        • String ID:
                        • API String ID: 1881357543-0
                        • Opcode ID: 240ca8959711deea1510ab416fb36e2155221d54ec43264043b7ad8b479dac8e
                        • Instruction ID: 7883b6072ded62e14c8dce1d6f861b36b5f84114d3461cee4373016b1696eb79
                        • Opcode Fuzzy Hash: 240ca8959711deea1510ab416fb36e2155221d54ec43264043b7ad8b479dac8e
                        • Instruction Fuzzy Hash: 4F41E5346002106FE720AF24D886F6677E5AF89718F549448F95AAF3D3D772ED41CB90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3f3279d09408c18c4cd2c54150bdaf4be56c519b57b5359eb309d598eb5011ab
                        • Instruction ID: 3fa4e2e769577885ed7abb2308bac748426614b0e792214f3394766e51d3e7fd
                        • Opcode Fuzzy Hash: 3f3279d09408c18c4cd2c54150bdaf4be56c519b57b5359eb309d598eb5011ab
                        • Instruction Fuzzy Hash: 9D41D171A00244EFD724DF38C841BAABBE9EB88710F11566FF551EB392E77199428790
                        APIs
                        • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00F15783
                        • GetLastError.KERNEL32(?,00000000), ref: 00F157A9
                        • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00F157CE
                        • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00F157FA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CreateHardLink$DeleteErrorFileLast
                        • String ID:
                        • API String ID: 3321077145-0
                        • Opcode ID: 9fd2ad091770dacf7de18dd48cd72c6ff099b020101a956f96cb8d9b50653b88
                        • Instruction ID: 65f73b4b48c5ac9c36a6032356aa42d5268ff14dffc3bc97adaec13149e25f2f
                        • Opcode Fuzzy Hash: 9fd2ad091770dacf7de18dd48cd72c6ff099b020101a956f96cb8d9b50653b88
                        • Instruction Fuzzy Hash: D7411D39600614DFCB11EF15C545A5EBBE2EF89720B198488E84AAF362CB34FD40DB91
                        APIs
                        • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00EC82D9,?,00EC82D9,?,00000001,?,?,00000001,00EC82D9,00EC82D9), ref: 00EDD910
                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00EDD999
                        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00EDD9AB
                        • __freea.LIBCMT ref: 00EDD9B4
                          • Part of subcall function 00ED3820: RtlAllocateHeap.NTDLL(00000000,?,00F71444,?,00EBFDF5,?,?,00EAA976,00000010,00F71440,00EA13FC,?,00EA13C6,?,00EA1129), ref: 00ED3852
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                        • String ID:
                        • API String ID: 2652629310-0
                        • Opcode ID: 73072c944d318dd4c1e9d95495c46e9b7c453aa31d31cc11d14045803d8e12fb
                        • Instruction ID: 2cf2b8ac6bf5163b47632fce4903b6406baab47edda3bb4fbf616969aa6f4a4b
                        • Opcode Fuzzy Hash: 73072c944d318dd4c1e9d95495c46e9b7c453aa31d31cc11d14045803d8e12fb
                        • Instruction Fuzzy Hash: 9231E172A0020AABDF24DF64DC91EAE7BA5EB80314F050169FC04E7290EB76DD52DB90
                        APIs
                        • SendMessageW.USER32(?,00001024,00000000,?), ref: 00F35352
                        • GetWindowLongW.USER32(?,000000F0), ref: 00F35375
                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00F35382
                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00F353A8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: LongWindow$InvalidateMessageRectSend
                        • String ID:
                        • API String ID: 3340791633-0
                        • Opcode ID: deeeee613d592ebb334db5a7dbb256a5558def2c1fc318e04038ecfde3da25fd
                        • Instruction ID: 53a7ce2258aff926d7d4f9af4a896017a788026e48419539277c32f0fffe26b6
                        • Opcode Fuzzy Hash: deeeee613d592ebb334db5a7dbb256a5558def2c1fc318e04038ecfde3da25fd
                        • Instruction Fuzzy Hash: BC31C435E55A0CEFEB309A54CC46BE837A7EB84BB0F584101FA14961E1C7B19980FB92
                        APIs
                        • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 00F0ABF1
                        • SetKeyboardState.USER32(00000080,?,00008000), ref: 00F0AC0D
                        • PostMessageW.USER32(00000000,00000101,00000000), ref: 00F0AC74
                        • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 00F0ACC6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: KeyboardState$InputMessagePostSend
                        • String ID:
                        • API String ID: 432972143-0
                        • Opcode ID: c121d805af4fd1a80249ccb9345c35faec1820008944eacf3d370900bb5e8a97
                        • Instruction ID: 903e7a19d5f39a436742d7fbc166fa1c8afed9617361085510e049d60c996465
                        • Opcode Fuzzy Hash: c121d805af4fd1a80249ccb9345c35faec1820008944eacf3d370900bb5e8a97
                        • Instruction Fuzzy Hash: 61311431E04718AFFB358B648C097FE7BA6AB89320F05821AE485961D1D378C981B792
                        APIs
                        • ClientToScreen.USER32(?,?), ref: 00F3769A
                        • GetWindowRect.USER32(?,?), ref: 00F37710
                        • PtInRect.USER32(?,?,00F38B89), ref: 00F37720
                        • MessageBeep.USER32(00000000), ref: 00F3778C
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Rect$BeepClientMessageScreenWindow
                        • String ID:
                        • API String ID: 1352109105-0
                        • Opcode ID: 33b7b2220a9d4fc124d66d3ca75f91aaf09f22d2278eb05f51e94e13b158992c
                        • Instruction ID: 025dccd0189527df5095441772dd060d6d5620ced60f158c036416d1f1317474
                        • Opcode Fuzzy Hash: 33b7b2220a9d4fc124d66d3ca75f91aaf09f22d2278eb05f51e94e13b158992c
                        • Instruction Fuzzy Hash: 4441A0B5A05318EFDB21EF58C895FA9BBF5FB49330F1440A8E5149B261C330A946EF90
                        APIs
                        • GetForegroundWindow.USER32 ref: 00F316EB
                          • Part of subcall function 00F03A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00F03A57
                          • Part of subcall function 00F03A3D: GetCurrentThreadId.KERNEL32 ref: 00F03A5E
                          • Part of subcall function 00F03A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00F025B3), ref: 00F03A65
                        • GetCaretPos.USER32(?), ref: 00F316FF
                        • ClientToScreen.USER32(00000000,?), ref: 00F3174C
                        • GetForegroundWindow.USER32 ref: 00F31752
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                        • String ID:
                        • API String ID: 2759813231-0
                        • Opcode ID: 23ed299333757ed7d5e5a194503012f2f97d156ac3bd2d162b8f48a67f1c76ac
                        • Instruction ID: 9cf6e149c4904f343445ccfa03882ca231a779284acd17f739e785fdddf9be17
                        • Opcode Fuzzy Hash: 23ed299333757ed7d5e5a194503012f2f97d156ac3bd2d162b8f48a67f1c76ac
                        • Instruction Fuzzy Hash: 71315275E00149AFC700DFA9C881CAEBBFDFF49314B548069E415E7211D735AE45DBA0
                        APIs
                          • Part of subcall function 00EA7620: _wcslen.LIBCMT ref: 00EA7625
                        • _wcslen.LIBCMT ref: 00F0DFCB
                        • _wcslen.LIBCMT ref: 00F0DFE2
                        • _wcslen.LIBCMT ref: 00F0E00D
                        • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00F0E018
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _wcslen$ExtentPoint32Text
                        • String ID:
                        • API String ID: 3763101759-0
                        • Opcode ID: 9d2ee6d75aadeeb347fa69076a699c50453b8a8488f75ab216d94b539d5b5150
                        • Instruction ID: fbf99d187b54a05812bb10213cdffb4f64dd61a753f0a683f6e7ed6cd7fc8e63
                        • Opcode Fuzzy Hash: 9d2ee6d75aadeeb347fa69076a699c50453b8a8488f75ab216d94b539d5b5150
                        • Instruction Fuzzy Hash: 1621B571D00215AFCB20DFA8DD81BAEB7F8EF85760F144069E805BB385D6719E41DBA1
                        APIs
                          • Part of subcall function 00EB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00EB9BB2
                        • GetCursorPos.USER32(?), ref: 00F39001
                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00EF7711,?,?,?,?,?), ref: 00F39016
                        • GetCursorPos.USER32(?), ref: 00F3905E
                        • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00EF7711,?,?,?), ref: 00F39094
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Cursor$LongMenuPopupProcTrackWindow
                        • String ID:
                        • API String ID: 2864067406-0
                        • Opcode ID: 5af3f572903af7daee261e123f34ecbc66bd7044f9dd970060c679512f4319af
                        • Instruction ID: dd8181eb160b8e91c07f7480812ebce1720534d648530ad7ffe687686c24b34d
                        • Opcode Fuzzy Hash: 5af3f572903af7daee261e123f34ecbc66bd7044f9dd970060c679512f4319af
                        • Instruction Fuzzy Hash: 5421B175604118EFDB298FA4C858EEA3BB9FB49370F044055F60557261C3B19990FBA0
                        APIs
                        • GetFileAttributesW.KERNEL32(?,00F3CB68), ref: 00F0D2FB
                        • GetLastError.KERNEL32 ref: 00F0D30A
                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00F0D319
                        • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00F3CB68), ref: 00F0D376
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CreateDirectory$AttributesErrorFileLast
                        • String ID:
                        • API String ID: 2267087916-0
                        • Opcode ID: 7e6bd2ac92c4c5e46ee7bbc88d64b58b6b1c1dbdae82397ebad94c2fe6051266
                        • Instruction ID: 5a5dc11bc71652565c39a22f754d632e2b0ddc896062fec0ee554c4923527cb0
                        • Opcode Fuzzy Hash: 7e6bd2ac92c4c5e46ee7bbc88d64b58b6b1c1dbdae82397ebad94c2fe6051266
                        • Instruction Fuzzy Hash: D2219F719083019FC700DF68C88186BB7E4AE9A368F104A1DF899D72E1D731D946EB93
                        APIs
                          • Part of subcall function 00F01014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00F0102A
                          • Part of subcall function 00F01014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00F01036
                          • Part of subcall function 00F01014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F01045
                          • Part of subcall function 00F01014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00F0104C
                          • Part of subcall function 00F01014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F01062
                        • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00F015BE
                        • _memcmp.LIBVCRUNTIME ref: 00F015E1
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F01617
                        • HeapFree.KERNEL32(00000000), ref: 00F0161E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                        • String ID:
                        • API String ID: 1592001646-0
                        • Opcode ID: e6d3bc416fcc1e9e075a08898be03d3ab4f05af013a75ca188f5f30423e9c5c8
                        • Instruction ID: eded3a2291b8062b4b7bb88f0941c32f780175868a345f5fbbbfb5aa7b6641c2
                        • Opcode Fuzzy Hash: e6d3bc416fcc1e9e075a08898be03d3ab4f05af013a75ca188f5f30423e9c5c8
                        • Instruction Fuzzy Hash: C9217872E00108EFEB14DFA4CD45BEEB7B9FF44364F084459E441AB281E731AA45EBA0
                        APIs
                        • GetWindowLongW.USER32(?,000000EC), ref: 00F3280A
                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00F32824
                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00F32832
                        • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00F32840
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Window$Long$AttributesLayered
                        • String ID:
                        • API String ID: 2169480361-0
                        • Opcode ID: 506c2f0a2eff306cfd0159a05b4df5bb63113af8eeac782c2c314fa3b721c0d0
                        • Instruction ID: 345bf83b17284decfe3ad8fcc37f6217a62751a5cf018b6fdfbb5be1caa89504
                        • Opcode Fuzzy Hash: 506c2f0a2eff306cfd0159a05b4df5bb63113af8eeac782c2c314fa3b721c0d0
                        • Instruction Fuzzy Hash: 2721FF31604110AFD7549B24CC44FAA7B9AAF86334F188258F4268B2E2CB75FC82DBD0
                        APIs
                          • Part of subcall function 00F08D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00F0790A,?,000000FF,?,00F08754,00000000,?,0000001C,?,?), ref: 00F08D8C
                          • Part of subcall function 00F08D7D: lstrcpyW.KERNEL32(00000000,?,?,00F0790A,?,000000FF,?,00F08754,00000000,?,0000001C,?,?,00000000), ref: 00F08DB2
                          • Part of subcall function 00F08D7D: lstrcmpiW.KERNEL32(00000000,?,00F0790A,?,000000FF,?,00F08754,00000000,?,0000001C,?,?), ref: 00F08DE3
                        • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00F08754,00000000,?,0000001C,?,?,00000000), ref: 00F07923
                        • lstrcpyW.KERNEL32(00000000,?,?,00F08754,00000000,?,0000001C,?,?,00000000), ref: 00F07949
                        • lstrcmpiW.KERNEL32(00000002,cdecl,?,00F08754,00000000,?,0000001C,?,?,00000000), ref: 00F07984
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: lstrcmpilstrcpylstrlen
                        • String ID: cdecl
                        • API String ID: 4031866154-3896280584
                        • Opcode ID: e09270b1b2b9ce3b35fd63db135d7beba3b2079bd58615d647558392e02e23e6
                        • Instruction ID: 6852bd0f822b4cd5a77d30bddee8a3d799e1d6d248d860791866af2b4655746a
                        • Opcode Fuzzy Hash: e09270b1b2b9ce3b35fd63db135d7beba3b2079bd58615d647558392e02e23e6
                        • Instruction Fuzzy Hash: C011D63A600346ABCB256F34DC45D7B77A6FF453A0B50406AF946C72A4EB31D811F7A1
                        APIs
                        • GetWindowLongW.USER32(?,000000F0), ref: 00F37D0B
                        • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00F37D2A
                        • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00F37D42
                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00F1B7AD,00000000), ref: 00F37D6B
                          • Part of subcall function 00EB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00EB9BB2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Window$Long
                        • String ID:
                        • API String ID: 847901565-0
                        • Opcode ID: f21666eb9376ae2a794dde005cdd15b7cb2736427547666dc6b6acf5b1699f70
                        • Instruction ID: e975863a1b87eb6cf22c137c087b634806aa21e1584fe3d7699f0f292f5d6148
                        • Opcode Fuzzy Hash: f21666eb9376ae2a794dde005cdd15b7cb2736427547666dc6b6acf5b1699f70
                        • Instruction Fuzzy Hash: AE11C072504658AFCB20AF28DC04AAA3BA5BF45370F158324F939D72F0D7308951EB80
                        APIs
                        • SendMessageW.USER32(?,00001060,?,00000004), ref: 00F356BB
                        • _wcslen.LIBCMT ref: 00F356CD
                        • _wcslen.LIBCMT ref: 00F356D8
                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00F35816
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessageSend_wcslen
                        • String ID:
                        • API String ID: 455545452-0
                        • Opcode ID: f10be1d80b5ee352dd02380a91800f4fac8fba85718694232caf0edfcfefe44c
                        • Instruction ID: f9b966c42e752a89c60eb34992a56aa1c72f0260f6b1d813f35f1ac26e2ff0c7
                        • Opcode Fuzzy Hash: f10be1d80b5ee352dd02380a91800f4fac8fba85718694232caf0edfcfefe44c
                        • Instruction Fuzzy Hash: 9711D671A00619D6DF20DF65CC85BEE77ACEF91B70F50402AF915E6081E770CA84EB61
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0c33e0b598270197bc600052367e65d84ef360f6aef8c2abc148dac87ced5b77
                        • Instruction ID: 95541f3eb0f01ade6a02204aea0d30d84bf4bc2f61605d8641e2ea6d63bcc513
                        • Opcode Fuzzy Hash: 0c33e0b598270197bc600052367e65d84ef360f6aef8c2abc148dac87ced5b77
                        • Instruction Fuzzy Hash: 98018FB220961A7EF62126786CC0F67665EDF913B9B30236BF521713D2DB618C42A160
                        APIs
                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00F01A47
                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00F01A59
                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00F01A6F
                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00F01A8A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID:
                        • API String ID: 3850602802-0
                        • Opcode ID: 2a02a2c3a5526bded12fcd2b4b597e272660d75e5675f18ad64c6a3a7da536f8
                        • Instruction ID: d07b6a5658f7e0798f77a492c75ee26927054bc4cac4c340c49fb2c3ab0e6dad
                        • Opcode Fuzzy Hash: 2a02a2c3a5526bded12fcd2b4b597e272660d75e5675f18ad64c6a3a7da536f8
                        • Instruction Fuzzy Hash: 3011FA3AE01219FFEB119BA5CD85FADBB78FB04750F200091EA04B7290D6756E50EB94
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 00F0E1FD
                        • MessageBoxW.USER32(?,?,?,?), ref: 00F0E230
                        • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00F0E246
                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00F0E24D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                        • String ID:
                        • API String ID: 2880819207-0
                        • Opcode ID: 0d07b80f2fdfece9a7cd63e420e4e66c6c399d63c62c8349889e9f0c546fb50f
                        • Instruction ID: d88c43fb431ed2daf933fd384dd7713f97dc93c10e7ed13b97392c13fdd762c0
                        • Opcode Fuzzy Hash: 0d07b80f2fdfece9a7cd63e420e4e66c6c399d63c62c8349889e9f0c546fb50f
                        • Instruction Fuzzy Hash: 3C110472D04218BBC7019FACAC09A9E7FADAB45324F004629F828E32D0D2B1C904A7A1
                        APIs
                        • CreateThread.KERNEL32(00000000,?,00ECCFF9,00000000,00000004,00000000), ref: 00ECD218
                        • GetLastError.KERNEL32 ref: 00ECD224
                        • __dosmaperr.LIBCMT ref: 00ECD22B
                        • ResumeThread.KERNEL32(00000000), ref: 00ECD249
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Thread$CreateErrorLastResume__dosmaperr
                        • String ID:
                        • API String ID: 173952441-0
                        • Opcode ID: ebf7e474d6f14efb302bd39197ee9dfb8fb2e32276fdda550fb02237ad284230
                        • Instruction ID: 54c88dfcb336bdb575712511b9bcd7a041d3a7eea88e5325089cf0453df268d4
                        • Opcode Fuzzy Hash: ebf7e474d6f14efb302bd39197ee9dfb8fb2e32276fdda550fb02237ad284230
                        • Instruction Fuzzy Hash: 5301D676409208BBC7155BA5DD09FAE7AAEDF81330F20122DF925B21E0CB73C902D7A0
                        APIs
                          • Part of subcall function 00EB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00EB9BB2
                        • GetClientRect.USER32(?,?), ref: 00F39F31
                        • GetCursorPos.USER32(?), ref: 00F39F3B
                        • ScreenToClient.USER32(?,?), ref: 00F39F46
                        • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00F39F7A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Client$CursorLongProcRectScreenWindow
                        • String ID:
                        • API String ID: 4127811313-0
                        • Opcode ID: b9bc5fda722a9025a0df9eea9525e31253da4f270c2f9067524ad26d30d623df
                        • Instruction ID: 0f8a1ef9b46dde18119f642846136c7c58c71d467b5816830b10011536dd500b
                        • Opcode Fuzzy Hash: b9bc5fda722a9025a0df9eea9525e31253da4f270c2f9067524ad26d30d623df
                        • Instruction Fuzzy Hash: BA11573290421EABDB10EFA8D889DEE77BDFB05321F004451F911E3141D7B4BA81EBA1
                        APIs
                        • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00EA604C
                        • GetStockObject.GDI32(00000011), ref: 00EA6060
                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 00EA606A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CreateMessageObjectSendStockWindow
                        • String ID:
                        • API String ID: 3970641297-0
                        • Opcode ID: 5b1817c1e486a334530e6c296fb056b6980f14054da0cd4411cf52d5109e7a0c
                        • Instruction ID: e2950c103cad7593247559a57523cccc5053e1b1827ef39936412554873a1665
                        • Opcode Fuzzy Hash: 5b1817c1e486a334530e6c296fb056b6980f14054da0cd4411cf52d5109e7a0c
                        • Instruction Fuzzy Hash: 00115E7250154DBFEF225FA49C84AEA7B6AEF0E364F051115FA146A150D732ECA0AB90
                        APIs
                        • ___BuildCatchObject.LIBVCRUNTIME ref: 00EC3B56
                          • Part of subcall function 00EC3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00EC3AD2
                          • Part of subcall function 00EC3AA3: ___AdjustPointer.LIBCMT ref: 00EC3AED
                        • _UnwindNestedFrames.LIBCMT ref: 00EC3B6B
                        • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00EC3B7C
                        • CallCatchBlock.LIBVCRUNTIME ref: 00EC3BA4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                        • String ID:
                        • API String ID: 737400349-0
                        • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                        • Instruction ID: f4325880bb3b73f4623a2d0648f5bd5e0280390392d8c28dbc621e11767fbda5
                        • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                        • Instruction Fuzzy Hash: 37012D72100148BBDF115EA5CD42EEB7BBDEF58758F049018FE4866121C733D962DBA0
                        APIs
                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00EA13C6,00000000,00000000,?,00ED301A,00EA13C6,00000000,00000000,00000000,?,00ED328B,00000006,FlsSetValue), ref: 00ED30A5
                        • GetLastError.KERNEL32(?,00ED301A,00EA13C6,00000000,00000000,00000000,?,00ED328B,00000006,FlsSetValue,00F42290,FlsSetValue,00000000,00000364,?,00ED2E46), ref: 00ED30B1
                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00ED301A,00EA13C6,00000000,00000000,00000000,?,00ED328B,00000006,FlsSetValue,00F42290,FlsSetValue,00000000), ref: 00ED30BF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: LibraryLoad$ErrorLast
                        • String ID:
                        • API String ID: 3177248105-0
                        • Opcode ID: f044cc64ea05c91e4a131416f6773b197edbb7f63d189f32c38d01219f94fca2
                        • Instruction ID: c0be4568401d566db209e3cafa3358e90024be3465c55171eff337dc88e4e34f
                        • Opcode Fuzzy Hash: f044cc64ea05c91e4a131416f6773b197edbb7f63d189f32c38d01219f94fca2
                        • Instruction Fuzzy Hash: A1012B32301226EBCB314B79AC4499B7B99EF05B75B141622FD05F3340D721D902C7E1
                        APIs
                        • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00F0747F
                        • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00F07497
                        • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00F074AC
                        • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00F074CA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Type$Register$FileLoadModuleNameUser
                        • String ID:
                        • API String ID: 1352324309-0
                        • Opcode ID: 04003ccbf36ad6713653c898f8af904528373b0e47a5b9b4e6fb7f4323879e7a
                        • Instruction ID: b6fdd541e753b6da491fb2b70ada57d4deb1cf14e5dd156ff381be70dca82214
                        • Opcode Fuzzy Hash: 04003ccbf36ad6713653c898f8af904528373b0e47a5b9b4e6fb7f4323879e7a
                        • Instruction Fuzzy Hash: E311A1B9A05314DBE720EF14DC08B927BFDEB00B10F1085A9A656D61D1D7B0F904FBA0
                        APIs
                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00F0ACD3,?,00008000), ref: 00F0B0C4
                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00F0ACD3,?,00008000), ref: 00F0B0E9
                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00F0ACD3,?,00008000), ref: 00F0B0F3
                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00F0ACD3,?,00008000), ref: 00F0B126
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CounterPerformanceQuerySleep
                        • String ID:
                        • API String ID: 2875609808-0
                        • Opcode ID: 7475ea282bd0a629e16ea578bb8846e558d608a2ee004e62a8bff1228f49f180
                        • Instruction ID: 6fafb4a5876307296863e0145029b4403bb342f0bde35a58f6285ecaebfd4148
                        • Opcode Fuzzy Hash: 7475ea282bd0a629e16ea578bb8846e558d608a2ee004e62a8bff1228f49f180
                        • Instruction Fuzzy Hash: C6115B31C0152CE7CF00AFE5E958AEEBB78FF09721F104085D951B2281CB305660BB91
                        APIs
                        • GetWindowRect.USER32(?,?), ref: 00F37E33
                        • ScreenToClient.USER32(?,?), ref: 00F37E4B
                        • ScreenToClient.USER32(?,?), ref: 00F37E6F
                        • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00F37E8A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ClientRectScreen$InvalidateWindow
                        • String ID:
                        • API String ID: 357397906-0
                        • Opcode ID: e4c7ac8c994010c0e04b5944fb276e1441dc315ba372e7ab89136e43b3c3b805
                        • Instruction ID: a52f1e7f64e625640f4b8dce4c3e1888dead2e7da4a2d159ab7e68241fa2264e
                        • Opcode Fuzzy Hash: e4c7ac8c994010c0e04b5944fb276e1441dc315ba372e7ab89136e43b3c3b805
                        • Instruction Fuzzy Hash: F51143B9D0020EAFDB51DF98C8849EEBBF5FB08310F505056E915E3210D735AA54DF90
                        APIs
                        • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00F02DC5
                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00F02DD6
                        • GetCurrentThreadId.KERNEL32 ref: 00F02DDD
                        • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00F02DE4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                        • String ID:
                        • API String ID: 2710830443-0
                        • Opcode ID: 6f5a760a200976a81958f47062fd79f68272fb50cad34f0347f845d1d238ef4c
                        • Instruction ID: 984e33ab0ce2a8b3b9fb37df7940c4c263b79ae92a06d3ace5f93a00ff4f5597
                        • Opcode Fuzzy Hash: 6f5a760a200976a81958f47062fd79f68272fb50cad34f0347f845d1d238ef4c
                        • Instruction Fuzzy Hash: F0E0ED725026287ADB202B639C0EFEB7E6DEB56BB1F400115B509E10909AA5C941F7F1
                        APIs
                          • Part of subcall function 00EB9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00EB9693
                          • Part of subcall function 00EB9639: SelectObject.GDI32(?,00000000), ref: 00EB96A2
                          • Part of subcall function 00EB9639: BeginPath.GDI32(?), ref: 00EB96B9
                          • Part of subcall function 00EB9639: SelectObject.GDI32(?,00000000), ref: 00EB96E2
                        • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00F38887
                        • LineTo.GDI32(?,?,?), ref: 00F38894
                        • EndPath.GDI32(?), ref: 00F388A4
                        • StrokePath.GDI32(?), ref: 00F388B2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                        • String ID:
                        • API String ID: 1539411459-0
                        • Opcode ID: af08fb0e60dbfae0ded6a0f8982dbd0eede912fc899d6d640f3c48ed5fd7cd40
                        • Instruction ID: 2c2e054adb27f2a5c7257654152722f0eff663556b4e5fa0ea0cda2aad559acb
                        • Opcode Fuzzy Hash: af08fb0e60dbfae0ded6a0f8982dbd0eede912fc899d6d640f3c48ed5fd7cd40
                        • Instruction Fuzzy Hash: 27F03A36045658BADB126F98AC09FCA3B6AAF06320F048000FB12B51E2C7795552EBE5
                        APIs
                        • GetSysColor.USER32(00000008), ref: 00EB98CC
                        • SetTextColor.GDI32(?,?), ref: 00EB98D6
                        • SetBkMode.GDI32(?,00000001), ref: 00EB98E9
                        • GetStockObject.GDI32(00000005), ref: 00EB98F1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Color$ModeObjectStockText
                        • String ID:
                        • API String ID: 4037423528-0
                        • Opcode ID: 65af200b9a342e0d3ec3125f08d4eecd91f2361fed54b74d37e50302b699d05c
                        • Instruction ID: 25103991d3df58198e39b54063a1bbf9dae8f3839a3448e628d887fa22f4abba
                        • Opcode Fuzzy Hash: 65af200b9a342e0d3ec3125f08d4eecd91f2361fed54b74d37e50302b699d05c
                        • Instruction Fuzzy Hash: DAE06531244248AADB215B74AC09BE93F11AB11736F048219F7F5640E1C3714640AB10
                        APIs
                        • GetCurrentThread.KERNEL32 ref: 00F01634
                        • OpenThreadToken.ADVAPI32(00000000,?,?,?,00F011D9), ref: 00F0163B
                        • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00F011D9), ref: 00F01648
                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,00F011D9), ref: 00F0164F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CurrentOpenProcessThreadToken
                        • String ID:
                        • API String ID: 3974789173-0
                        • Opcode ID: c6913a9da0d3659b8d6d789875d5c94201421481ba026ab70129d4e5af1eec28
                        • Instruction ID: 7f30d3e736cbee09edf0bc74968b4515af9b99dab2922c79376adcf897647ccd
                        • Opcode Fuzzy Hash: c6913a9da0d3659b8d6d789875d5c94201421481ba026ab70129d4e5af1eec28
                        • Instruction Fuzzy Hash: EEE08672A01215DBDB201FA09D0DB873B7DBF447B1F144808F245E9080D7348444E790
                        APIs
                        • GetDesktopWindow.USER32 ref: 00EFD858
                        • GetDC.USER32(00000000), ref: 00EFD862
                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00EFD882
                        • ReleaseDC.USER32(?), ref: 00EFD8A3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CapsDesktopDeviceReleaseWindow
                        • String ID:
                        • API String ID: 2889604237-0
                        • Opcode ID: 1efd48eeb183c24c806ff511acba528aea369d4d7125a02e4d96f183249480b8
                        • Instruction ID: 6bd14b197ce1292711880d87af363798ab2fca5da57fce924b5f0cc056dfceef
                        • Opcode Fuzzy Hash: 1efd48eeb183c24c806ff511acba528aea369d4d7125a02e4d96f183249480b8
                        • Instruction Fuzzy Hash: 04E0E5B5804208DFCB41AFA0D8096ADBBB2AB08320F249019E84AF7260C7389901AF90
                        APIs
                        • GetDesktopWindow.USER32 ref: 00EFD86C
                        • GetDC.USER32(00000000), ref: 00EFD876
                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00EFD882
                        • ReleaseDC.USER32(?), ref: 00EFD8A3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CapsDesktopDeviceReleaseWindow
                        • String ID:
                        • API String ID: 2889604237-0
                        • Opcode ID: 87764d2611dd42f9ef815f308a3b1e83604dfd77a1110634570580bacf4b431a
                        • Instruction ID: 89f7aa25675a0d4941d1cc731b8ead29d9d598da331b0b84ecf5d857df4ad678
                        • Opcode Fuzzy Hash: 87764d2611dd42f9ef815f308a3b1e83604dfd77a1110634570580bacf4b431a
                        • Instruction Fuzzy Hash: 82E09AB5904608DFCB51AFA0D84D66DBBF6BB08321F149459F94AF7260D7385901AF90
                        APIs
                          • Part of subcall function 00EA7620: _wcslen.LIBCMT ref: 00EA7625
                        • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00F14ED4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Connection_wcslen
                        • String ID: *$LPT
                        • API String ID: 1725874428-3443410124
                        • Opcode ID: 2cf5544166de2a25d85933b09ee6f7ed7bfd623237cca99e83693e9d99737c2d
                        • Instruction ID: be95abe33980662aac6e7b79d503e3f5fb55b4e5ae28a6e0923297c9b21c77d9
                        • Opcode Fuzzy Hash: 2cf5544166de2a25d85933b09ee6f7ed7bfd623237cca99e83693e9d99737c2d
                        • Instruction Fuzzy Hash: D1914F75A002049FCB14DF58C484EA9BBF5BF89314F198099E446AF392D731ED86DB91
                        APIs
                        • __startOneArgErrorHandling.LIBCMT ref: 00ECE30D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ErrorHandling__start
                        • String ID: pow
                        • API String ID: 3213639722-2276729525
                        • Opcode ID: 2b778022bac5576f78a7b3c1c0ae963ef40db9e306052016ee361f5149a979eb
                        • Instruction ID: 246a35dd1b92a6ba562296715b1d8528ca9289701381ad9c1d77d79b704d5c39
                        • Opcode Fuzzy Hash: 2b778022bac5576f78a7b3c1c0ae963ef40db9e306052016ee361f5149a979eb
                        • Instruction Fuzzy Hash: 2C519B61A0C20196CB157718CA01BBA3BE4EB51744F707D6EF8D5723A9FB368CC79A42
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID: #
                        • API String ID: 0-1885708031
                        • Opcode ID: c4dfc5e7ed19d2e14d780b9a3df94ebc0a4c117c084151fd45ebef3c565e8a15
                        • Instruction ID: 0b39ff3050e8da681442b953984b002597d60bdc8513b0669ced7fa27eadb421
                        • Opcode Fuzzy Hash: c4dfc5e7ed19d2e14d780b9a3df94ebc0a4c117c084151fd45ebef3c565e8a15
                        • Instruction Fuzzy Hash: 6751453550024ADFDB19EF68C0816FA7BA8EF16314F246066F951BB3E0D634AD42CB90
                        APIs
                        • Sleep.KERNEL32(00000000), ref: 00EBF2A2
                        • GlobalMemoryStatusEx.KERNEL32(?), ref: 00EBF2BB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: GlobalMemorySleepStatus
                        • String ID: @
                        • API String ID: 2783356886-2766056989
                        • Opcode ID: 1e8091e6347977b2da819594839c9475e53f10a6181c495cceb6f52eafc2475c
                        • Instruction ID: 7d4fce2c16d0735c75c02add7faabcb49e0153d6b4a75131e9db5bc9638869ca
                        • Opcode Fuzzy Hash: 1e8091e6347977b2da819594839c9475e53f10a6181c495cceb6f52eafc2475c
                        • Instruction Fuzzy Hash: 0E5157715087489FD320AF10DC86BABBBF8FB89300F81884CF1D9551A5EB30A529CB66
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: BuffCharUpper_wcslen
                        • String ID: CALLARGARRAY
                        • API String ID: 157775604-1150593374
                        • Opcode ID: 365484fb7125c52000b2c846574279759c1b1ce019e5f2eac82377f79361ceba
                        • Instruction ID: 4b6764ee396324f989bc3bb1795a62a9a287fbc28366ccd98c90ccc18e48385a
                        • Opcode Fuzzy Hash: 365484fb7125c52000b2c846574279759c1b1ce019e5f2eac82377f79361ceba
                        • Instruction Fuzzy Hash: CF41B231E002199FCB04DFA8D8819FEBBF5FF59760F105069E505AB292E774AD81DB90
                        APIs
                        • _wcslen.LIBCMT ref: 00F1D130
                        • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00F1D13A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CrackInternet_wcslen
                        • String ID: |
                        • API String ID: 596671847-2343686810
                        • Opcode ID: 03246fc541de5aca1f74d70a7f6018f4c16301fa3629cbaad68846de7d6c668e
                        • Instruction ID: 198d5b4d3c4fc3f594961b8d9396846783b9bbd45a2008984f23f029fd60a78a
                        • Opcode Fuzzy Hash: 03246fc541de5aca1f74d70a7f6018f4c16301fa3629cbaad68846de7d6c668e
                        • Instruction Fuzzy Hash: 1D314D72D00219ABDF15EFA4CC85AEEBFB9FF09310F004019F815BA161D735AA46DB50
                        APIs
                        • DestroyWindow.USER32(?,?,?,?), ref: 00F33621
                        • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00F3365C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Window$DestroyMove
                        • String ID: static
                        • API String ID: 2139405536-2160076837
                        • Opcode ID: dc64de5b09c5277fa27e44d5025b8ebd120cda9b777e20497106a2d6eb5ac91b
                        • Instruction ID: ff8ebd6746b7af6b82cafe9e754d39bdbf58c38a516eeb763c82d63635c46776
                        • Opcode Fuzzy Hash: dc64de5b09c5277fa27e44d5025b8ebd120cda9b777e20497106a2d6eb5ac91b
                        • Instruction Fuzzy Hash: 3A318D71510204AEDB20DF28DC81EFB73A9FF88770F109619F8A5D7290DA34AD91E760
                        APIs
                        • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00F3461F
                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00F34634
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: '
                        • API String ID: 3850602802-1997036262
                        • Opcode ID: 14b17e229f8efe463046f9fdbb91b057c8fa5fb12b8d29b7b6146498080a438d
                        • Instruction ID: 9962d9516a707cc2d3a45eca197d7742a8206fa22a2a76129398c63fed5cbf43
                        • Opcode Fuzzy Hash: 14b17e229f8efe463046f9fdbb91b057c8fa5fb12b8d29b7b6146498080a438d
                        • Instruction Fuzzy Hash: 9C311475E0020A9FDB54CFA9C981BDABBB5FF09320F14406AE904AB381D770B941DF90
                        APIs
                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00F3327C
                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00F33287
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: Combobox
                        • API String ID: 3850602802-2096851135
                        • Opcode ID: a5bdb00d14948d7e73d8b025b641e16a7eb0bf40a79a71d74c7c257771f31717
                        • Instruction ID: 11fa5c4cb67e980b2f8efbc9a4a4e7af003ea465b7f16b90426e23d489ec21c1
                        • Opcode Fuzzy Hash: a5bdb00d14948d7e73d8b025b641e16a7eb0bf40a79a71d74c7c257771f31717
                        • Instruction Fuzzy Hash: AF11B271700208BFEF21DE54DC81EBB376BEB983B4F104228F918AB290D671DD51A760
                        APIs
                          • Part of subcall function 00EA600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00EA604C
                          • Part of subcall function 00EA600E: GetStockObject.GDI32(00000011), ref: 00EA6060
                          • Part of subcall function 00EA600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00EA606A
                        • GetWindowRect.USER32(00000000,?), ref: 00F3377A
                        • GetSysColor.USER32(00000012), ref: 00F33794
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Window$ColorCreateMessageObjectRectSendStock
                        • String ID: static
                        • API String ID: 1983116058-2160076837
                        • Opcode ID: d85196ac61ac25f6074143a3b7a942c1e87971f39d09dcda7853956560112715
                        • Instruction ID: 28c415bf258d8fc7dfd3ffa054cda522b14cbc11a82152fcefe731cbdfde6672
                        • Opcode Fuzzy Hash: d85196ac61ac25f6074143a3b7a942c1e87971f39d09dcda7853956560112715
                        • Instruction Fuzzy Hash: FB1129B2610209AFDF10DFA8CC46AEA7BB9FB09364F014514FD55E2250D735E851AB50
                        APIs
                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00F1CD7D
                        • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00F1CDA6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Internet$OpenOption
                        • String ID: <local>
                        • API String ID: 942729171-4266983199
                        • Opcode ID: 4856a21413ebb16c17f04ce7c3a1ed918526791e3583fabf718b1e2467383b89
                        • Instruction ID: d4a2e6ea19ddd5432a9071bca7ca6109634ee6483d8fbd22f68fa092b978fab6
                        • Opcode Fuzzy Hash: 4856a21413ebb16c17f04ce7c3a1ed918526791e3583fabf718b1e2467383b89
                        • Instruction Fuzzy Hash: 7611C672685636BAD7344B669C45FE7BE6DEF127B4F004226F52993180D7709880E6F0
                        APIs
                        • GetWindowTextLengthW.USER32(00000000), ref: 00F334AB
                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00F334BA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: LengthMessageSendTextWindow
                        • String ID: edit
                        • API String ID: 2978978980-2167791130
                        • Opcode ID: b0eb30d318f399d752de81fd51b927a973d4f6f9408931ab48ae9b5f920307da
                        • Instruction ID: 786f91c1d48b41f3fb794a1a95b7115189617869fd4af45cefda0cb6268d3f5f
                        • Opcode Fuzzy Hash: b0eb30d318f399d752de81fd51b927a973d4f6f9408931ab48ae9b5f920307da
                        • Instruction Fuzzy Hash: B6118C71500208ABEB22CF64DC84AEB3BAAEB05374F514324F965A71E4C775EC91AB61
                        APIs
                          • Part of subcall function 00EA9CB3: _wcslen.LIBCMT ref: 00EA9CBD
                        • CharUpperBuffW.USER32(?,?,?), ref: 00F06CB6
                        • _wcslen.LIBCMT ref: 00F06CC2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _wcslen$BuffCharUpper
                        • String ID: STOP
                        • API String ID: 1256254125-2411985666
                        • Opcode ID: 288d32d6882b4f78be2fd6e6e8a08f1e0f360fe33cb3562e909266590b29637d
                        • Instruction ID: 040f4f83d51844879ef18d97d50f7a0159b295e3cdecb920b2269bfb6b89f7cc
                        • Opcode Fuzzy Hash: 288d32d6882b4f78be2fd6e6e8a08f1e0f360fe33cb3562e909266590b29637d
                        • Instruction Fuzzy Hash: 6601C432A005278BDB209FBDDC81ABF77E5EA657207104529E852E61D1EB31E960F650
                        APIs
                          • Part of subcall function 00EA9CB3: _wcslen.LIBCMT ref: 00EA9CBD
                          • Part of subcall function 00F03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F03CCA
                        • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00F01D4C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 624084870-1403004172
                        • Opcode ID: 202ffc10e458711fb6702161f94963682ed3131fdb5943455328552321b1bb02
                        • Instruction ID: a3c0c6f40c1f7623b9d33e8e5b32fee1b362e7744e30246c44c76f3bc426f025
                        • Opcode Fuzzy Hash: 202ffc10e458711fb6702161f94963682ed3131fdb5943455328552321b1bb02
                        • Instruction Fuzzy Hash: 4501DD71A01114ABDB08EBA4CD51DFE73A8FB47360B140519F822772C1DA345908B760
                        APIs
                          • Part of subcall function 00EA9CB3: _wcslen.LIBCMT ref: 00EA9CBD
                          • Part of subcall function 00F03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F03CCA
                        • SendMessageW.USER32(?,00000180,00000000,?), ref: 00F01C46
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 624084870-1403004172
                        • Opcode ID: a7c4d0555f6c2b1bb7991b150a48f75f7e6eebba4fb1730d79db82473a4daeca
                        • Instruction ID: 8728e0c12dc99395756ee11ac9eecbc64b560d1d653e77a0b81c5aadc0e31143
                        • Opcode Fuzzy Hash: a7c4d0555f6c2b1bb7991b150a48f75f7e6eebba4fb1730d79db82473a4daeca
                        • Instruction Fuzzy Hash: 0E01AC75A4110467DF08E790CE51EFF77E8AB56350F144015B406771C2EA24DE48B6B1
                        APIs
                          • Part of subcall function 00EA9CB3: _wcslen.LIBCMT ref: 00EA9CBD
                          • Part of subcall function 00F03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F03CCA
                        • SendMessageW.USER32(?,00000182,?,00000000), ref: 00F01CC8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 624084870-1403004172
                        • Opcode ID: 3d5751f42f9c31ff57db6cc1b7f6ae0089942c175a351a5dbf2d545f6b0e1457
                        • Instruction ID: 6dd56cf10a8474ec25508c1b2fb814f7bc252eed0129e333ca102a7e92fc04d0
                        • Opcode Fuzzy Hash: 3d5751f42f9c31ff57db6cc1b7f6ae0089942c175a351a5dbf2d545f6b0e1457
                        • Instruction Fuzzy Hash: DB01DB71B4011867DB04E790CE11AFEB3ECAB16350F144015B801772C2EA24DF08F671
                        APIs
                          • Part of subcall function 00EA9CB3: _wcslen.LIBCMT ref: 00EA9CBD
                          • Part of subcall function 00F03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F03CCA
                        • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00F01DD3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 624084870-1403004172
                        • Opcode ID: 49c79877a2760a8b7c814e874b4feba64cd207c4881c0ccb75cc23601ccfb602
                        • Instruction ID: ac308dd18b03d53217fc1466cf7472bf12d11d8df367b7e57d08f747c782e323
                        • Opcode Fuzzy Hash: 49c79877a2760a8b7c814e874b4feba64cd207c4881c0ccb75cc23601ccfb602
                        • Instruction Fuzzy Hash: C1F0A471A4161866DB08E7A4CD52BFEB7ACBB06760F540915B822B72C2DA64A908B261
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: _wcslen
                        • String ID: 3, 3, 16, 1
                        • API String ID: 176396367-3042988571
                        • Opcode ID: b236ad0d997f44d62f397c068335f40f0c595ad43bd5f6c33f3538d77930b800
                        • Instruction ID: b059319d06117892451041d448711bd6d3a110ee439141f6387fdd7a5d6b89bc
                        • Opcode Fuzzy Hash: b236ad0d997f44d62f397c068335f40f0c595ad43bd5f6c33f3538d77930b800
                        • Instruction Fuzzy Hash: E2E02B42A053319093313279BDD1EBF56C9CFC5760710282FF981D22A6EAA5CD92A3A1
                        APIs
                        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00F00B23
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Message
                        • String ID: AutoIt$Error allocating memory.
                        • API String ID: 2030045667-4017498283
                        • Opcode ID: a2968adc739686b9ddb4934b4f1823c0680962b84a01968e4c827caf36381bd2
                        • Instruction ID: e27deea8a5e774bdc8b65eb2e897be5dedc770ae45f69c61d975bbef74f3b415
                        • Opcode Fuzzy Hash: a2968adc739686b9ddb4934b4f1823c0680962b84a01968e4c827caf36381bd2
                        • Instruction Fuzzy Hash: B3E048312453182AD21436547C03FD97AC48F05F71F11142AFB58B95C38AD2A55067EA
                        APIs
                          • Part of subcall function 00EBF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00EC0D71,?,?,?,00EA100A), ref: 00EBF7CE
                        • IsDebuggerPresent.KERNEL32(?,?,?,00EA100A), ref: 00EC0D75
                        • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00EA100A), ref: 00EC0D84
                        Strings
                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00EC0D7F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                        • API String ID: 55579361-631824599
                        • Opcode ID: 3b51f38cd9ea9f0fcee4725402e1aa4e1facf6f72c90dadc5c923b9ee96e26d8
                        • Instruction ID: d791807934928b91629f57d78a2b1e12fe9677319ef7205e56403ecb773bae8d
                        • Opcode Fuzzy Hash: 3b51f38cd9ea9f0fcee4725402e1aa4e1facf6f72c90dadc5c923b9ee96e26d8
                        • Instruction Fuzzy Hash: DDE06D702003118BD3609FB8D9047427BE1AB04B54F00496DE886E6651DBB5E4899BD1
                        APIs
                        • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00F1302F
                        • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00F13044
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: Temp$FileNamePath
                        • String ID: aut
                        • API String ID: 3285503233-3010740371
                        • Opcode ID: 96d22d09eeafe11ec109bebf0e93ff72eec1ba191d3437c781cfea6420fa3aef
                        • Instruction ID: 85e4a4ef73f830d63c8778c09fcd41ed308d536873c715eb13c89890804b7e98
                        • Opcode Fuzzy Hash: 96d22d09eeafe11ec109bebf0e93ff72eec1ba191d3437c781cfea6420fa3aef
                        • Instruction Fuzzy Hash: A0D05E7250032867DA20A7A4AC0EFCB3A6CDB04760F0002A1BA55E2091DAB4D984CBD0
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: LocalTime
                        • String ID: %.3d$X64
                        • API String ID: 481472006-1077770165
                        • Opcode ID: 3dbff40a57c294e594a937da430da41fe25cabddf6bb59d13e10496a3133a4e4
                        • Instruction ID: a4110e2f65bc5859714f65cc37d28252f30a3869dcef62e962466a586c4dec4b
                        • Opcode Fuzzy Hash: 3dbff40a57c294e594a937da430da41fe25cabddf6bb59d13e10496a3133a4e4
                        • Instruction Fuzzy Hash: FCD0126180C10CE9DB50A7D0CC458FABBBDEB08311F509452FA06B1051E624C50877A2
                        APIs
                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00F3236C
                        • PostMessageW.USER32(00000000), ref: 00F32373
                          • Part of subcall function 00F0E97B: Sleep.KERNEL32 ref: 00F0E9F3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: FindMessagePostSleepWindow
                        • String ID: Shell_TrayWnd
                        • API String ID: 529655941-2988720461
                        • Opcode ID: 911b9c72bed321f52d3281aeed50d905a7ac7da10fdf831230a9d913f9d714e4
                        • Instruction ID: 3fd831911296834ee5de7b6f5c4ab315c00c297c173a014b6edfe0a0591909f7
                        • Opcode Fuzzy Hash: 911b9c72bed321f52d3281aeed50d905a7ac7da10fdf831230a9d913f9d714e4
                        • Instruction Fuzzy Hash: D6D0C932381314BAE6A4A7709C0FFC676159B05B20F0049167645FA1D0C9A4A801AB94
                        APIs
                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00F3232C
                        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00F3233F
                          • Part of subcall function 00F0E97B: Sleep.KERNEL32 ref: 00F0E9F3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: FindMessagePostSleepWindow
                        • String ID: Shell_TrayWnd
                        • API String ID: 529655941-2988720461
                        • Opcode ID: 87c1e2c5e3edca508811bc11ed750160439074ed7bcc9f0e0eded4386ef86ae4
                        • Instruction ID: 3af3003a943026f5319dc0999a99d5d9c8037131d31905bb37ec63035ca8c392
                        • Opcode Fuzzy Hash: 87c1e2c5e3edca508811bc11ed750160439074ed7bcc9f0e0eded4386ef86ae4
                        • Instruction Fuzzy Hash: 63D01236394314B7E6B4B770DC0FFC67A159B00B20F0049167749FA1D0C9F4A801EB94
                        APIs
                        • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 00EDBE93
                        • GetLastError.KERNEL32 ref: 00EDBEA1
                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00EDBEFC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2020824312.0000000000EA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EA0000, based on PE: true
                        • Associated: 00000000.00000002.2020802262.0000000000EA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020873234.0000000000F62000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020965539.0000000000F6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2020994829.0000000000F74000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ea0000_file.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$ErrorLast
                        • String ID:
                        • API String ID: 1717984340-0
                        • Opcode ID: c3a5308528700a4fb063c83eef3f7966ecbe70b5adff63d7caa1f2b0c1d73afc
                        • Instruction ID: 22c3f7aef9d6a9395506a94ba0f44ebb7a022dcc2fdd047f08e3e9f45a423dc8
                        • Opcode Fuzzy Hash: c3a5308528700a4fb063c83eef3f7966ecbe70b5adff63d7caa1f2b0c1d73afc
                        • Instruction Fuzzy Hash: 0841C435700246EFCB218F65CC44AAA7BE5EF41324F16616AFD59B73A1EB318D02DB50