Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1523650
MD5:ab7bea5cb100ab7acdcf97ae6d034994
SHA1:2336e609864055ba6a09607b3d4b30d1e113068d
SHA256:40d7cbbce05cfa2dac5abbea6911fbc1843ace1ec5fb9508ddacc0368e76e3d0
Tags:exeuser-Bitsight
Infos:

Detection

Credential Flusher
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Credential Flusher
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 7352 cmdline: "C:\Users\user\Desktop\file.exe" MD5: AB7BEA5CB100AB7ACDCF97AE6D034994)
    • chrome.exe (PID: 7368 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecovery MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 7572 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1944,i,8332916453357013908,15687979653280633989,262144 --disable-features=CrashRecovery /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 2668 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5268 --field-trial-handle=1944,i,8332916453357013908,15687979653280633989,262144 --disable-features=CrashRecovery /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 8140 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 --field-trial-handle=1944,i,8332916453357013908,15687979653280633989,262144 --disable-features=CrashRecovery /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: file.exe PID: 7352JoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
    Source: file.exeJoe Sandbox ML: detected
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49743 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49745 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.4:49773 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.4:49784 version: TLS 1.2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_007FDBBE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008068EE FindFirstFileW,FindClose,0_2_008068EE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0080698F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007FD076
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007FD3A9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00809642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00809642
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0080979D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00809B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00809B2B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00805C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00805C97
    Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
    Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
    Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_0080CE44
    Source: global trafficHTTP traffic detected: GET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1Host: www.youtube.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCI/KzQEIucrNAQii0c0BCIrTzQEIntbNAQin2M0BCPnA1BUY9snNARi60s0BGOuNpRc=Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentsec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
    Source: global trafficHTTP traffic detected: GET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=602026825&timestamp=1727813708632 HTTP/1.1Host: accounts.youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-arch: "x86"sec-ch-ua-platform: "Windows"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-model: ""sec-ch-ua-bitness: "64"sec-ch-ua-wow64: ?0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCI/KzQEIucrNAQii0c0BCIrTzQEIntbNAQin2M0BCPnA1BUY9snNARi60s0BGOuNpRc=Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: iframeReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: www.google.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCI/KzQEIucrNAQii0c0BCIrTzQEIntbNAQin2M0BCPnA1BUY9snNARi60s0BGOuNpRc=Sec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: NID=518=YhCg9OtX_qkQdHO76smUv8As7T2dV4rOO5pAZzzypx0fLFawISujGRHUcknk5MgodOsCfm9SHzAac-DI26AFSkFaxohu9hKjt0D23Sqlq5PezCOjPRVY3D2q1dco3hExwRGmXd-A7z9C4y5o3uEqn6PqLL3iqOBWs-I6yDxpVgWMj-CJNpE
    Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=Kzvo6TfrERRSwdo&MD=Wf6H+1kH HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
    Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=Kzvo6TfrERRSwdo&MD=Wf6H+1kH HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
    Source: chromecache_83.3.drString found in binary or memory: _.fq(p)+"/familylink/privacy/notice/embedded?langCountry="+_.fq(p);break;case "PuZJUb":a+="https://www.youtube.com/t/terms?chromeless=1&hl="+_.fq(m);break;case "fxTQxb":a+="https://youtube.com/t/terms?gl="+_.fq(_.oq(c))+"&hl="+_.fq(d)+"&override_hl=1"+(f?"&linkless=1":"");break;case "prAmvd":a+="https://www.google.com/intl/"+_.fq(m)+"/chromebook/termsofservice.html?languageCode="+_.fq(d)+"&regionCode="+_.fq(c);break;case "NfnTze":a+="https://policies.google.com/privacy/google-partners"+(f?"/embedded": equals www.youtube.com (Youtube)
    Source: global trafficDNS traffic detected: DNS query: youtube.com
    Source: global trafficDNS traffic detected: DNS query: www.youtube.com
    Source: global trafficDNS traffic detected: DNS query: www.google.com
    Source: global trafficDNS traffic detected: DNS query: accounts.youtube.com
    Source: global trafficDNS traffic detected: DNS query: play.google.com
    Source: unknownHTTP traffic detected: POST /log?format=json&hasfast=true&authuser=0 HTTP/1.1Host: play.google.comConnection: keep-aliveContent-Length: 519sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"Content-Type: application/x-www-form-urlencoded;charset=UTF-8sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-platform-version: "10.0.0"X-Goog-AuthUser: 0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: */*Origin: https://accounts.google.comX-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCI/KzQEIucrNAQii0c0BCIrTzQEIntbNAQin2M0BCPnA1BUY9snNARi60s0BGOuNpRc=Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: chromecache_83.3.drString found in binary or memory: https://accounts.google.com
    Source: chromecache_83.3.drString found in binary or memory: https://accounts.google.com/TOS?loc=
    Source: file.exe, 00000000.00000002.1667925617.0000000001888000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/challenge/pwd
    Source: chromecache_89.3.drString found in binary or memory: https://apis.google.com/js/api.js
    Source: chromecache_83.3.drString found in binary or memory: https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage
    Source: chromecache_83.3.drString found in binary or memory: https://families.google.com/intl/
    Source: chromecache_89.3.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/drive_2020q4/v10/192px.svg
    Source: chromecache_89.3.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/gmail_2020q4/v10/web-48dp/logo_gmail_2020q4_color_2x_web_
    Source: chromecache_89.3.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/maps/v7/192px.svg
    Source: chromecache_83.3.drString found in binary or memory: https://g.co/recover
    Source: chromecache_83.3.drString found in binary or memory: https://play.google.com/log?format=json&hasfast=true
    Source: chromecache_83.3.drString found in binary or memory: https://play.google.com/work/enroll?identifier=
    Source: chromecache_83.3.drString found in binary or memory: https://play.google/intl/
    Source: chromecache_83.3.drString found in binary or memory: https://policies.google.com/privacy
    Source: chromecache_83.3.drString found in binary or memory: https://policies.google.com/privacy/additional
    Source: chromecache_83.3.drString found in binary or memory: https://policies.google.com/privacy/google-partners
    Source: chromecache_83.3.drString found in binary or memory: https://policies.google.com/technologies/cookies
    Source: chromecache_83.3.drString found in binary or memory: https://policies.google.com/technologies/location-data
    Source: chromecache_83.3.drString found in binary or memory: https://policies.google.com/terms
    Source: chromecache_83.3.drString found in binary or memory: https://policies.google.com/terms/location
    Source: chromecache_83.3.drString found in binary or memory: https://policies.google.com/terms/service-specific
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-email-pin.gif
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-password.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-or-voice-pin.gif
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-pin.gif
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-stop-go-landing-page_1x.png
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/animation/
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_device.png
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_pin.png
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync.png
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_1x.png
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_2x.png
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_darkmode_1x.png
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/continue_on_your_phone.png
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_phone_number_verification.png
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_silent_tap_yes_darkmode.gif
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes.gif
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes_darkmode.gif
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_dark_v2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_v2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_not_ready.png
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_1.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_dark_1.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_1.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_darkmode_1.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_1.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_darkmode_1.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_created.png
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_full_house.png
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_1.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_darkmode_1.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_1.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_darkmode_1.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_1.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_darkmode_1.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_stop.png
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/personalization_reminders.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/phone_number_sign_in_2x.png
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key.gif
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_ios_center.png
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_laptop.gif
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered.gif
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered_darkmode.gif
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_phone.gif
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_ios.gif
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_pulldown.gif
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_tapyes.gif
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/smart_lock_2x.png
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/usb_key.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/web_and_app_activity.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/who_will_be_using_this_device.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/you_tube_history.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/gmail_ios_authzen.gif
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/paaskey.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_light.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/screenlock.png
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_ipad.gif
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone.gif
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_nfc.gif
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_usb.gif
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_phone.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_keys.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/loading_spinner_gm.gif
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/progress_spinner_color_20dp_4x.gif
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/success-gm-default_2x.png
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/apps/signup/resources/custom-email-address.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/images/hpp/shield_security_checkup_green_2x_web_96dp.png
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_dark_1.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_v1.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_dark_v1.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_v1.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_dark_v1.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_v1.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_confirmation.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_0.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_dark_0.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_dark_2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_dark_2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_dark_2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_dark_2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_dark_3.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_1.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_dark_1.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_1.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_dark_1.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_dark_2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_1.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_dark_1.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_dark_2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_dark_v2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_v2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set_darkmode.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_v2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_dark_v2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_v2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space.png
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space_dark.png
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2_dark.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess.svg
    Source: chromecache_89.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess_dark.svg
    Source: chromecache_83.3.drString found in binary or memory: https://support.google.com/accounts?hl=
    Source: chromecache_83.3.drString found in binary or memory: https://support.google.com/accounts?p=new-si-ui
    Source: chromecache_83.3.drString found in binary or memory: https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072
    Source: chromecache_89.3.drString found in binary or memory: https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=
    Source: chromecache_83.3.drString found in binary or memory: https://www.google.com
    Source: chromecache_83.3.drString found in binary or memory: https://www.google.com/intl/
    Source: chromecache_89.3.drString found in binary or memory: https://www.gstatic.com/accounts/speedbump/authzen_optin_illustration.gif
    Source: chromecache_89.3.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/chrome_48dp.png
    Source: chromecache_89.3.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/googleg_48dp.png
    Source: chromecache_89.3.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/gsa_48dp.png
    Source: chromecache_89.3.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/play_prism_48dp.png
    Source: chromecache_89.3.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/youtube_48dp.png
    Source: chromecache_83.3.drString found in binary or memory: https://www.gstatic.com/images/branding/productlogos/googleg/v6/36px.svg
    Source: chromecache_83.3.drString found in binary or memory: https://www.youtube.com/t/terms?chromeless=1&hl=
    Source: file.exe, 00000000.00000003.1666994052.00000000018B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
    Source: chromecache_83.3.drString found in binary or memory: https://youtube.com/t/terms?gl=
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
    Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
    Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
    Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
    Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
    Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49743 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49745 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.4:49773 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.4:49784 version: TLS 1.2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0080EAFF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0080ED6A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0080EAFF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FAA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_007FAA57
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00829576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00829576

    System Summary

    barindex
    Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
    Source: file.exe, 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_865d4d14-b
    Source: file.exe, 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_15c97690-b
    Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_42455d7f-6
    Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_d8f46e0d-1
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FD5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_007FD5EB
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_007F1201
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_007FE8F6
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007980600_2_00798060
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008020460_2_00802046
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F82980_2_007F8298
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007CE4FF0_2_007CE4FF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007C676B0_2_007C676B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008248730_2_00824873
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0079CAF00_2_0079CAF0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007BCAA00_2_007BCAA0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007ACC390_2_007ACC39
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007C6DD90_2_007C6DD9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007AB1190_2_007AB119
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007991C00_2_007991C0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B13940_2_007B1394
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B17060_2_007B1706
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B781B0_2_007B781B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007A997D0_2_007A997D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007979200_2_00797920
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B19B00_2_007B19B0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B7A4A0_2_007B7A4A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B1C770_2_007B1C77
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B7CA70_2_007B7CA7
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007C9EEE0_2_007C9EEE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0081BE440_2_0081BE44
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B1F320_2_007B1F32
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 007B0A30 appears 46 times
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 007AF9F2 appears 31 times
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: classification engineClassification label: mal64.troj.evad.winEXE@31/30@12/8
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008037B5 GetLastError,FormatMessageW,0_2_008037B5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F10BF AdjustTokenPrivileges,CloseHandle,0_2_007F10BF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_007F16C3
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008051CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_008051CD
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FD4DC CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_007FD4DC
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_0080648E
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007942A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_007942A2
    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecovery
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1944,i,8332916453357013908,15687979653280633989,262144 --disable-features=CrashRecovery /prefetch:8
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5268 --field-trial-handle=1944,i,8332916453357013908,15687979653280633989,262144 --disable-features=CrashRecovery /prefetch:8
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 --field-trial-handle=1944,i,8332916453357013908,15687979653280633989,262144 --disable-features=CrashRecovery /prefetch:8
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecoveryJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1944,i,8332916453357013908,15687979653280633989,262144 --disable-features=CrashRecovery /prefetch:8Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5268 --field-trial-handle=1944,i,8332916453357013908,15687979653280633989,262144 --disable-features=CrashRecovery /prefetch:8Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 --field-trial-handle=1944,i,8332916453357013908,15687979653280633989,262144 --disable-features=CrashRecovery /prefetch:8Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007942DE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B0A76 push ecx; ret 0_2_007B0A89
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007AF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_007AF98E
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00821C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00821C41
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-95574
    Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.2 %
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_007FDBBE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008068EE FindFirstFileW,FindClose,0_2_008068EE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0080698F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007FD076
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007FD3A9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00809642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00809642
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0080979D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00809B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00809B2B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00805C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00805C97
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007942DE
    Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080EAA2 BlockInput,0_2_0080EAA2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007C2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007C2622
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007942DE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B4CE8 mov eax, dword ptr fs:[00000030h]0_2_007B4CE8
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_007F0B62
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007C2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007C2622
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007B083F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B09D5 SetUnhandledExceptionFilter,0_2_007B09D5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_007B0C21
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_007F1201
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007D2BA5 KiUserCallbackDispatcher,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_007D2BA5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FB226 SendInput,keybd_event,0_2_007FB226
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008122DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_008122DA
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_007F0B62
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F1663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_007F1663
    Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
    Source: file.exeBinary or memory string: Shell_TrayWnd
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B0698 cpuid 0_2_007B0698
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00808195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00808195
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007ED27A GetUserNameW,0_2_007ED27A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007CBB6F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_007CBB6F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007942DE

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 7352, type: MEMORYSTR
    Source: file.exeBinary or memory string: WIN_81
    Source: file.exeBinary or memory string: WIN_XP
    Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
    Source: file.exeBinary or memory string: WIN_XPe
    Source: file.exeBinary or memory string: WIN_VISTA
    Source: file.exeBinary or memory string: WIN_7
    Source: file.exeBinary or memory string: WIN_8

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 7352, type: MEMORYSTR
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00811204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00811204
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00811806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00811806
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire Infrastructure2
    Valid Accounts
    1
    Native API
    1
    DLL Side-Loading
    1
    Exploitation for Privilege Escalation
    1
    Disable or Modify Tools
    21
    Input Capture
    2
    System Time Discovery
    Remote Services1
    Archive Collected Data
    2
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault AccountsScheduled Task/Job2
    Valid Accounts
    1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    LSASS Memory1
    Account Discovery
    Remote Desktop Protocol21
    Input Capture
    11
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
    Valid Accounts
    2
    Obfuscated Files or Information
    Security Account Manager1
    File and Directory Discovery
    SMB/Windows Admin Shares3
    Clipboard Data
    3
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
    Access Token Manipulation
    1
    DLL Side-Loading
    NTDS15
    System Information Discovery
    Distributed Component Object ModelInput Capture4
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
    Process Injection
    2
    Valid Accounts
    LSA Secrets12
    Security Software Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    Virtualization/Sandbox Evasion
    Cached Domain Credentials1
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
    Access Token Manipulation
    DCSync3
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
    Process Injection
    Proc Filesystem1
    Application Window Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
    System Owner/User Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    file.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://play.google/intl/0%URL Reputationsafe
    https://families.google.com/intl/0%URL Reputationsafe
    https://policies.google.com/technologies/location-data0%URL Reputationsafe
    https://apis.google.com/js/api.js0%URL Reputationsafe
    https://policies.google.com/privacy/google-partners0%URL Reputationsafe
    https://policies.google.com/terms/service-specific0%URL Reputationsafe
    https://g.co/recover0%URL Reputationsafe
    https://policies.google.com/privacy/additional0%URL Reputationsafe
    https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=32850720%URL Reputationsafe
    https://policies.google.com/technologies/cookies0%URL Reputationsafe
    https://policies.google.com/terms0%URL Reputationsafe
    https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=0%URL Reputationsafe
    https://support.google.com/accounts?hl=0%URL Reputationsafe
    https://policies.google.com/terms/location0%URL Reputationsafe
    https://policies.google.com/privacy0%URL Reputationsafe
    https://support.google.com/accounts?p=new-si-ui0%URL Reputationsafe
    https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage0%URL Reputationsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    youtube-ui.l.google.com
    142.250.186.174
    truefalse
      unknown
      www3.l.google.com
      142.250.184.238
      truefalse
        unknown
        play.google.com
        172.217.16.142
        truefalse
          unknown
          www.google.com
          142.250.184.196
          truefalse
            unknown
            youtube.com
            142.250.186.78
            truefalse
              unknown
              accounts.youtube.com
              unknown
              unknownfalse
                unknown
                www.youtube.com
                unknown
                unknownfalse
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://play.google.com/log?format=json&hasfast=true&authuser=0false
                    unknown
                    https://www.google.com/favicon.icofalse
                      unknown
                      https://play.google.com/log?hasfast=true&authuser=0&format=jsonfalse
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://play.google/intl/chromecache_83.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://families.google.com/intl/chromecache_83.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://youtube.com/t/terms?gl=chromecache_83.3.drfalse
                          unknown
                          https://policies.google.com/technologies/location-datachromecache_83.3.drfalse
                          • URL Reputation: safe
                          unknown
                          https://www.google.com/intl/chromecache_83.3.drfalse
                            unknown
                            https://apis.google.com/js/api.jschromecache_89.3.drfalse
                            • URL Reputation: safe
                            unknown
                            https://policies.google.com/privacy/google-partnerschromecache_83.3.drfalse
                            • URL Reputation: safe
                            unknown
                            https://play.google.com/work/enroll?identifier=chromecache_83.3.drfalse
                              unknown
                              https://policies.google.com/terms/service-specificchromecache_83.3.drfalse
                              • URL Reputation: safe
                              unknown
                              https://g.co/recoverchromecache_83.3.drfalse
                              • URL Reputation: safe
                              unknown
                              https://policies.google.com/privacy/additionalchromecache_83.3.drfalse
                              • URL Reputation: safe
                              unknown
                              https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072chromecache_83.3.drfalse
                              • URL Reputation: safe
                              unknown
                              https://policies.google.com/technologies/cookieschromecache_83.3.drfalse
                              • URL Reputation: safe
                              unknown
                              https://policies.google.com/termschromecache_83.3.drfalse
                              • URL Reputation: safe
                              unknown
                              https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=chromecache_89.3.drfalse
                              • URL Reputation: safe
                              unknown
                              https://www.google.comchromecache_83.3.drfalse
                                unknown
                                https://play.google.com/log?format=json&hasfast=truechromecache_83.3.drfalse
                                  unknown
                                  https://www.youtube.com/t/terms?chromeless=1&hl=chromecache_83.3.drfalse
                                    unknown
                                    https://support.google.com/accounts?hl=chromecache_83.3.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://policies.google.com/terms/locationchromecache_83.3.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://policies.google.com/privacychromecache_83.3.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://support.google.com/accounts?p=new-si-uichromecache_83.3.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessagechromecache_83.3.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    142.250.184.196
                                    www.google.comUnited States
                                    15169GOOGLEUSfalse
                                    216.58.212.142
                                    unknownUnited States
                                    15169GOOGLEUSfalse
                                    142.250.186.174
                                    youtube-ui.l.google.comUnited States
                                    15169GOOGLEUSfalse
                                    239.255.255.250
                                    unknownReserved
                                    unknownunknownfalse
                                    142.250.184.238
                                    www3.l.google.comUnited States
                                    15169GOOGLEUSfalse
                                    172.217.16.142
                                    play.google.comUnited States
                                    15169GOOGLEUSfalse
                                    IP
                                    192.168.2.4
                                    192.168.2.5
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1523650
                                    Start date and time:2024-10-01 22:14:06 +02:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 4m 37s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:11
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:file.exe
                                    Detection:MAL
                                    Classification:mal64.troj.evad.winEXE@31/30@12/8
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 96%
                                    • Number of executed functions: 33
                                    • Number of non-executed functions: 310
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 172.217.16.195, 74.125.71.84, 142.250.186.78, 34.104.35.123, 142.250.185.227, 142.250.181.227, 142.250.181.234, 172.217.18.10, 142.250.186.106, 142.250.74.202, 216.58.212.170, 172.217.16.202, 172.217.18.106, 142.250.186.170, 142.250.184.234, 172.217.16.138, 216.58.206.74, 142.250.184.202, 216.58.206.42, 142.250.186.138, 142.250.186.74, 142.250.186.42, 142.250.185.170, 142.250.185.106, 142.250.185.74, 142.250.185.234, 142.250.185.138, 142.250.185.202, 2.19.126.137, 192.229.221.95, 2.19.126.163, 142.250.186.163, 142.250.186.142
                                    • Excluded domains from analysis (whitelisted): clients1.google.com, fs.microsoft.com, accounts.google.com, content-autofill.googleapis.com, slscr.update.microsoft.com, fonts.gstatic.com, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, ocsp.digicert.com, edgedl.me.gvt1.com, update.googleapis.com, clients.l.google.com, www.gstatic.com, optimizationguide-pa.googleapis.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                    • VT rate limit hit for: file.exe
                                    No simulations
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    239.255.255.250https://trello.com/c/2T5XVROVGet hashmaliciousHTMLPhisherBrowse
                                      https://email.mg.pmctraining.com/c/eJwUzDGOhSAQANDTSCfBAQQL2n-PgRmUDaAh_E329hvbVzwKpJF3Ehw2B84ro50WV0j68CYB2SNnQrVvLloHPjtLjAq9KAFAJ7thXDVQWlEdcfVg82oOBTo6s9ucFqPaKZ-W5sDSSz9lupuogbhPrBkT10n4ooxjgU8jXuDzfeqNJJ_rESP8fLGXiXJw6ddd6S3_GnaczPIep_gN8B8AAP__bcA-LwGet hashmaliciousHTMLPhisherBrowse
                                        https://42yr.rescindq.com/wqtyZAFZzF3hXgsogboKg/Get hashmaliciousTycoon2FABrowse
                                          https://app.glorify.com/file/1193241?format=90Get hashmaliciousHTMLPhisherBrowse
                                            https://trailer.web-view.net/Links/0X4BB1001D1630A0ED10642DF3B714350282BAE90647BD2B7BFD4C194AC960461AE6B703AF3C14FF76E051ECAB18E836AA033F35E314DF7571046ED1B003034C97CF9966854362669D.htmGet hashmaliciousUnknownBrowse
                                              Seeking Assistance for Legal Assistance in a Medical Matter.msgGet hashmaliciousUnknownBrowse
                                                https://okefeokok.live/Get hashmaliciousUnknownBrowse
                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                    https://sharing.clickup.com/9011385758/t/h/868a15nvk/VTTN7SYFPHZE3ITGet hashmaliciousHTMLPhisherBrowse
                                                      PO#150623.htmlGet hashmaliciousUnknownBrowse
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        No context
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        28a2c9bd18a11de089ef85a160da29e4https://trello.com/c/2T5XVROVGet hashmaliciousHTMLPhisherBrowse
                                                        • 52.165.165.26
                                                        • 184.28.90.27
                                                        https://email.mg.pmctraining.com/c/eJwUzDGOhSAQANDTSCfBAQQL2n-PgRmUDaAh_E329hvbVzwKpJF3Ehw2B84ro50WV0j68CYB2SNnQrVvLloHPjtLjAq9KAFAJ7thXDVQWlEdcfVg82oOBTo6s9ucFqPaKZ-W5sDSSz9lupuogbhPrBkT10n4ooxjgU8jXuDzfeqNJJ_rESP8fLGXiXJw6ddd6S3_GnaczPIep_gN8B8AAP__bcA-LwGet hashmaliciousHTMLPhisherBrowse
                                                        • 52.165.165.26
                                                        • 184.28.90.27
                                                        https://42yr.rescindq.com/wqtyZAFZzF3hXgsogboKg/Get hashmaliciousTycoon2FABrowse
                                                        • 52.165.165.26
                                                        • 184.28.90.27
                                                        https://trailer.web-view.net/Links/0X4BB1001D1630A0ED10642DF3B714350282BAE90647BD2B7BFD4C194AC960461AE6B703AF3C14FF76E051ECAB18E836AA033F35E314DF7571046ED1B003034C97CF9966854362669D.htmGet hashmaliciousUnknownBrowse
                                                        • 52.165.165.26
                                                        • 184.28.90.27
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 52.165.165.26
                                                        • 184.28.90.27
                                                        PO#150623.htmlGet hashmaliciousUnknownBrowse
                                                        • 52.165.165.26
                                                        • 184.28.90.27
                                                        https://finalstepgetshere.com/uploads/beta111.zipGet hashmaliciousLummaC, Go Injector, LummaC StealerBrowse
                                                        • 52.165.165.26
                                                        • 184.28.90.27
                                                        Translink_rishi.vasandani_Advice81108.pdfGet hashmaliciousUnknownBrowse
                                                        • 52.165.165.26
                                                        • 184.28.90.27
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 52.165.165.26
                                                        • 184.28.90.27
                                                        https://finalstepgetshere.com/uploads/beta9.zipGet hashmaliciousLummaCBrowse
                                                        • 52.165.165.26
                                                        • 184.28.90.27
                                                        No context
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:HTML document, ASCII text, with very long lines (681)
                                                        Category:downloaded
                                                        Size (bytes):4067
                                                        Entropy (8bit):5.363457972758152
                                                        Encrypted:false
                                                        SSDEEP:96:G2CiFZX5BReR68ujioIRVrqtyzBeTV6SfyAKLif9cLw:bCMZXVeR6jiosVrqtyzBaImyAKw9z
                                                        MD5:B027BF10F968F37628EB698B2CF46D8E
                                                        SHA1:0C9801E4FF3BE18102E6E22246B4262FCC6CE011
                                                        SHA-256:98608C8414932B6F029948A323B1236EFB96861306FD1EDEB6CE47E180392B47
                                                        SHA-512:3B1E5A3B247273F025EACF389F98BC139F8453ECEC7A2EC762A4E3279F220B7BED2CB23CD5630E92ED03187C514956DF814E9450FFAA10BFE312633B445DBEF1
                                                        Malicious:false
                                                        Reputation:low
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBimEQjEH54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHHHUTOu8QCHKV2CSS4q8_ZgreBVQ/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=sOXFj,q0xTif,ZZ4WUe"
                                                        Preview:"use strict";_F_installCss(".N7rBcd{overflow-x:auto}sentinel{}");.this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.vg(_.aqa);._.k("sOXFj");.var tu=function(a){_.W.call(this,a.Fa)};_.J(tu,_.W);tu.Ba=_.W.Ba;tu.prototype.aa=function(a){return a()};_.nu(_.$pa,tu);._.l();._.k("oGtAuc");._.yya=new _.pf(_.aqa);._.l();._.k("q0xTif");.var sza=function(a){var b=function(d){_.Sn(d)&&(_.Sn(d).Jc=null,_.Du(d,null));d.XyHi9&&(d.XyHi9=null)};b(a);a=a.querySelectorAll("[c-wiz]");for(var c=0;c<a.length;c++)b(a[c])},Pu=function(a){_.kt.call(this,a.Fa);this.Qa=this.dom=null;if(this.kl()){var b=_.zm(this.Ug(),[_.Em,_.Dm]);b=_.ni([b[_.Em],b[_.Dm]]).then(function(c){this.Qa=c[0];this.dom=c[1]},null,this);_.hu(this,b)}this.Ra=a.lm.zea};_.J(Pu,_.kt);Pu.Ba=function(){return{lm:{zea:function(a){return _.Ue(a)}}}};Pu.prototype.zp=function(a){return this.Ra.zp(a)};.Pu.prototype.getData=function(a){return this.Ra.getData(a)};Pu.prototype.qo=function(){_.Kt(this.d
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (533)
                                                        Category:downloaded
                                                        Size (bytes):9210
                                                        Entropy (8bit):5.404371326611379
                                                        Encrypted:false
                                                        SSDEEP:192:EEFZpeip4HzZlY0If0Ma23jcUcrhCx6VD1TYPi8:Es/p4jgjUhtD1TY68
                                                        MD5:21E893B65627B397E22619A9F5BB9662
                                                        SHA1:F561B0F66211C1E7B22F94B4935C312AB7087E85
                                                        SHA-256:FFA9B8BC8EF2CDFF5EB4BA1A0BA1710A253A5B42535E2A369D5026967DCF4673
                                                        SHA-512:3DE3CD6A4E9B06AB3EB324E90A40B5F2AEEA8D7D6A2651C310E993CF79EEB5AC6E2E33C587F46B2DD20CC862354FD1A61AEBB9B990E6805F6629404BA285F8FA
                                                        Malicious:false
                                                        Reputation:low
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBimEQjEH54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PrPYRd,Rkm0ef,SCuOPb,STuCOe,SpsfSb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,byfTOb,cYShmd,eVCnO,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,qPfo0c,qmdT9,rCcCxc,siKnQd,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHHHUTOu8QCHKV2CSS4q8_ZgreBVQ/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ltDFwf,SD8Jgb,rmumx,E87wgc,qPYxq,Tbb4sb,pxq3x,f8Gu1e,soHxf,YgOFye,yRXbo,bTi8wc,ywOR5c,PHUIyb"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.qNa=_.y("SD8Jgb",[]);._.GX=function(a,b){if(typeof b==="string")a.Lc(b);else if(b instanceof _.Fp&&b.ia&&b.ia===_.A)b=_.Ya(b.Lw()),a.empty().append(b);else if(b instanceof _.Ua)b=_.Ya(b),a.empty().append(b);else if(b instanceof Node)a.empty().append(b);else throw Error("Vf");};_.HX=function(a){var b=_.Io(a,"[jsslot]");if(b.size()>0)return b;b=new _.Go([_.Kk("span")]);_.Jo(b,"jsslot","");a.empty().append(b);return b};_.NLb=function(a){return a===null||typeof a==="string"&&_.Hi(a)};._.k("SD8Jgb");._.MX=function(a){_.X.call(this,a.Fa);this.Ua=a.controller.Ua;this.od=a.controllers.od[0]||null;this.header=a.controller.header;this.nav=a.controller.nav;var b;(b=this.oa().find("button:not([type])").el())==null||b.setAttribute("type","button")};_.J(_.MX,_.X);_.MX.Ba=function(){return{controller:{Ua:{jsname:"n7vHCb",ctor:_.mv},header:{jsname:"tJHJj",ctor:_.mv},nav:{jsname:"DH6Rkf",ct
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (395)
                                                        Category:downloaded
                                                        Size (bytes):1608
                                                        Entropy (8bit):5.257113147606035
                                                        Encrypted:false
                                                        SSDEEP:48:o72ZrNZ4yNAbU+15fMxIdf5WENoBCbw7DbG2bEJrw:oyNNAY+1i4HoBNG2Ilw
                                                        MD5:F06E2DC5CC446B39F878B5F8E4D78418
                                                        SHA1:9F1F34FDD8F8DAB942A9B95D9F720587B6F6AD48
                                                        SHA-256:118E4D2FE7CEF205F9AFC87636554C6D8220882B158333EE3D1990282D158B8F
                                                        SHA-512:893C4F883CD1C88C6AAF5A6E7F232D62823A53E1FFDE5C1C52BB066D75781DD041F4D281CDBF18070D921CE862652D8863E2B9D5E0190CFA4128890D62C44168
                                                        Malicious:false
                                                        Reputation:low
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBimEQjEH54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHHHUTOu8QCHKV2CSS4q8_ZgreBVQ/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=w9hDv,ZDZcre,A7fCU"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("w9hDv");._.vg(_.Hla);_.eA=function(a){_.W.call(this,a.Fa);this.aa=a.Xa.cache};_.J(_.eA,_.W);_.eA.Ba=function(){return{Xa:{cache:_.dt}}};_.eA.prototype.execute=function(a){_.Bb(a,function(b){var c;_.$e(b)&&(c=b.eb.kc(b.kb));c&&this.aa.xG(c)},this);return{}};_.nu(_.Nla,_.eA);._.l();._.k("ZDZcre");.var fH=function(a){_.W.call(this,a.Fa);this.Wl=a.Ea.Wl;this.d4=a.Ea.metadata;this.aa=a.Ea.ot};_.J(fH,_.W);fH.Ba=function(){return{Ea:{Wl:_.KG,metadata:_.VZa,ot:_.HG}}};fH.prototype.execute=function(a){var b=this;a=this.aa.create(a);return _.Bb(a,function(c){var d=b.d4.getType(c.Od())===2?b.Wl.Rb(c):b.Wl.fetch(c);return _.yl(c,_.LG)?d.then(function(e){return _.Dd(e)}):d},this)};_.nu(_.Sla,fH);._.l();._.k("K5nYTd");._.UZa=new _.pf(_.Ola);._.l();._.k("sP4Vbe");.._.l();._.k("kMFpHd");.._.l();._.k("A7fCU");.var NG=function(a){_.W.call(this,a.Fa);this.aa=a.Ea.tQ};_.J(NG,_.W);NG.Ba=func
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                                                        Category:downloaded
                                                        Size (bytes):5430
                                                        Entropy (8bit):3.6534652184263736
                                                        Encrypted:false
                                                        SSDEEP:48:wIJct3xIAxG/7nvWDtZcdYLtX7B6QXL3aqG8Q:wIJct+A47v+rcqlBPG9B
                                                        MD5:F3418A443E7D841097C714D69EC4BCB8
                                                        SHA1:49263695F6B0CDD72F45CF1B775E660FDC36C606
                                                        SHA-256:6DA5620880159634213E197FAFCA1DDE0272153BE3E4590818533FAB8D040770
                                                        SHA-512:82D017C4B7EC8E0C46E8B75DA0CA6A52FD8BCE7FCF4E556CBDF16B49FC81BE9953FE7E25A05F63ECD41C7272E8BB0A9FD9AEDF0AC06CB6032330B096B3702563
                                                        Malicious:false
                                                        Reputation:high, very likely benign file
                                                        URL:https://www.google.com/favicon.ico
                                                        Preview:............ .h...&... .... .........(....... ..... ............................................0...................................................................................................................................v.].X.:.X.:.r.Y........................................q.X.S.4.S.4.S.4.S.4.S.4.S.4...X....................0........q.W.S.4.X.:.................J...A...g.........................K.H.V.8..........................F..B.....................,.......................................B..............................................B..B..B..B..B...u..........................................B..B..B..B..B...{.................5.......k...........................................................7R..8F.................................................2........Vb..5C..;I..................R^.....................0................Xc..5C..5C..5C..5C..5C..5C..lv..........................................]i..<J..:G..Zf....................................................
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (2907)
                                                        Category:downloaded
                                                        Size (bytes):22833
                                                        Entropy (8bit):5.425034548615223
                                                        Encrypted:false
                                                        SSDEEP:384:7lFo6ZEdpgtmyiPixV9OX9gMBpHkHnfst9lZulagGcwYHiRFjJzN7:77o6ZviPixV8xpEHn89l4IgGcwYCRtb7
                                                        MD5:749B18538FE32BFE0815D75F899F5B21
                                                        SHA1:AF95A019211AF69F752A43CAA54A83C2AFD41D28
                                                        SHA-256:116B2687C1D5E00DB56A79894AB0C12D4E2E000B9379B7E7AD751B84DF611F3F
                                                        SHA-512:E4B6F4556AA0FD9979BB52681508F5E26FFB256473803F74F7F5C8D93FA3636D7D0A5835618FBC6123022805CE0D9616A7451A0F302C665E28A6090B5D588505
                                                        Malicious:false
                                                        Reputation:low
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBimEQjEH54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHHHUTOu8QCHKV2CSS4q8_ZgreBVQ/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=RqjULd"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.uu.prototype.da=_.ca(40,function(){return _.rj(this,3)});_.$y=function(a,b){this.key=a;this.defaultValue=!1;this.flagName=b};_.$y.prototype.ctor=function(a){return typeof a==="boolean"?a:this.defaultValue};_.az=function(){this.ka=!0;var a=_.vj(_.dk(_.Be("TSDtV",window),_.zya),_.uu,1,_.qj())[0];if(a){var b={};for(var c=_.n(_.vj(a,_.Aya,2,_.qj())),d=c.next();!d.done;d=c.next()){d=d.value;var e=_.Jj(d,1).toString();switch(_.tj(d,_.vu)){case 3:b[e]=_.Hj(d,_.lj(d,_.vu,3));break;case 2:b[e]=_.Jj(d,_.lj(d,_.vu,2));break;case 4:b[e]=_.Kj(d,_.lj(d,_.vu,4));break;case 5:b[e]=_.Lj(d,_.lj(d,_.vu,5));break;case 6:b[e]=_.Pj(d,_.ff,6,_.vu);break;default:throw Error("jd`"+_.tj(d,_.vu));}}}else b={};this.ea=b;this.token=.a?a.da():null};_.az.prototype.aa=function(a){if(!this.ka||a.key in this.ea)a=a.ctor(this.ea[a.key]);else if(_.Be("nQyAE",window)){var b=_.Cya(a.flagName);if(b===null)a=a.de
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (683)
                                                        Category:downloaded
                                                        Size (bytes):3131
                                                        Entropy (8bit):5.355381206612617
                                                        Encrypted:false
                                                        SSDEEP:48:o7FEEM3MtH15jNQ8jsK3rnw0dkckTrKEp/OqLE9xz0W5Bzv3M6hIHYA+JITbwrF8:oq675jOArwoAmI/DLaxNPL5m+m6w
                                                        MD5:E2A7251AD83A0D0634FEA2703D10ED07
                                                        SHA1:90D72011F31FC40D3DA3748F2817F90A29EB5C01
                                                        SHA-256:1079B49C4AAF5C10E4F2E6A086623F40D200A71FF2A1F64E88AA6C91E4BE7A6F
                                                        SHA-512:CD6D75580EA8BD97CF7C7C0E0BD9D9A54FB6EA7DF1DDB5A95E94D38B260F9EE1425C640839ECD229B8D01E145CF2786CA374D31EC537EB8FE17FF415D5B985F5
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBimEQjEH54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHHHUTOu8QCHKV2CSS4q8_ZgreBVQ/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ZwDk9d,RMhBfe"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("ZwDk9d");.var gA=function(a){_.W.call(this,a.Fa)};_.J(gA,_.W);gA.Ba=_.W.Ba;gA.prototype.eS=function(a){return _.Xe(this,{Xa:{gT:_.ll}}).then(function(b){var c=window._wjdd,d=window._wjdc;return!c&&d?new _.li(function(e){window._wjdc=function(f){d(f);e(ZJa(f,b,a))}}):ZJa(c,b,a)})};var ZJa=function(a,b,c){return(a=a&&a[c])?a:b.Xa.gT.eS(c)};.gA.prototype.aa=function(a,b){var c=_.Zra(b).Rj;if(c.startsWith("$")){var d=_.gm.get(a);_.uq[b]&&(d||(d={},_.gm.set(a,d)),d[c]=_.uq[b],delete _.uq[b],_.vq--);if(d)if(a=d[c])b=_.af(a);else throw Error("Jb`"+b);else b=null}else b=null;return b};_.nu(_.Lfa,gA);._.l();._.k("SNUn3");._.YJa=new _.pf(_.wg);._.l();._.k("RMhBfe");.var $Ja=function(a){var b=_.tq(a);return b?new _.li(function(c,d){var e=function(){b=_.tq(a);var f=_.Sfa(a,b);f?c(f.getAttribute("jsdata")):window.document.readyState=="complete"?(f=["Unable to find deferred jsdata wit
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (468)
                                                        Category:downloaded
                                                        Size (bytes):1858
                                                        Entropy (8bit):5.298162049824456
                                                        Encrypted:false
                                                        SSDEEP:48:o7vGoolL3ALFKphnpiu7xOKAcfO/3d/rYh4vZorw:o/QLUFUL4KA+2y0Mw
                                                        MD5:CE055F881BDAB4EF6C1C8AA4B3890348
                                                        SHA1:2671741A70E9F5B608F690AAEEA4972003747654
                                                        SHA-256:9B91C23691D6032CDFE28863E369624B2EDB033E1487A1D1BB0977E3590E5462
                                                        SHA-512:8A22250628985C2E570E6FBADFC0D5CB6753F0735130F9E74962A409476C2859C5C81F8A0F5C427A9F13ED399C8E251FA43FF67AD5F16860640D45E7A538E857
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBimEQjEH54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHHHUTOu8QCHKV2CSS4q8_ZgreBVQ/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=iAskyc,ziXSP"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("iAskyc");._.QZ=function(a){_.W.call(this,a.Fa);this.window=a.Ea.window.get();this.Nc=a.Ea.Nc};_.J(_.QZ,_.W);_.QZ.Ba=function(){return{Ea:{window:_.qu,Nc:_.DE}}};_.QZ.prototype.Po=function(){};_.QZ.prototype.addEncryptionRecoveryMethod=function(){};_.RZ=function(a){return(a==null?void 0:a.Jo)||function(){}};_.SZ=function(a){return(a==null?void 0:a.m3)||function(){}};_.GPb=function(a){return(a==null?void 0:a.Op)||function(){}};._.HPb=function(a){return new Map(Array.from(a,function(b){var c=_.n(b);b=c.next().value;c=c.next().value;return[b,c.map(function(d){return{epoch:d.epoch,key:new Uint8Array(d.key)}})]}))};_.IPb=function(a){setTimeout(function(){throw a;},0)};_.QZ.prototype.kO=function(){return!0};_.nu(_.An,_.QZ);._.l();._.k("ziXSP");.var j_=function(a){_.QZ.call(this,a.Fa)};_.J(j_,_.QZ);j_.Ba=_.QZ.Ba;j_.prototype.Po=function(a,b,c){var d;if((d=this.window.chrome)==nu
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (5693)
                                                        Category:downloaded
                                                        Size (bytes):698791
                                                        Entropy (8bit):5.595243292922648
                                                        Encrypted:false
                                                        SSDEEP:6144:TJvaKtQfcxene0F2HhPM8RGYcBlKmd5r6XIQqS7SlncOpYMSrBg5X3O4mAEFD7:TJyKtkIct842IQqHJ09
                                                        MD5:7A4AEFC2F596D19F522738DB34C5A680
                                                        SHA1:7F6E9BE8B3C1450075365A31FF6E4B49F1D35BA7
                                                        SHA-256:61D7FF7565945545C0D823CCFC5DB5D09C8714FBF8AD77994F389F08289124B2
                                                        SHA-512:7D80188B002DB3ED7360B9B236DE435F2008345ECEC00FDE39412BE39DE5C08FD80CBD2D7370D0DBB98F4BCCA0CEF147AD9E7935AC2894DB55D81C1B32EB647E
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBimEQjEH54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=LEikZe,_b,_tp,byfTOb,lsjVmc/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHHHUTOu8QCHKV2CSS4q8_ZgreBVQ/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=n73qwf,SCuOPb,IZT63,vfuNJf,UUJqVe,ws9Tlc,siKnQd,XVq9Qb,STuCOe,njlZCf,m9oV,vjKJJ,y5vRwf,iyZMqd,NTMZac,mzzZzc,rCcCxc,vvMGie,K1ZKnb,ziZ8Mc,b3kMqb,mvkUhe,CMcBD,Fndnac,t2srLd,EN3i8d,z0u0L,xiZRqc,NOeYWe,O6y8ed,L9OGUe,PrPYRd,MpJwZc,qPfo0c,cYShmd,hc6Ubd,Rkm0ef,KUM7Z,oLggrd,inNHtf,L1AAkb,WpP9Yc,lwddkf,gJzDyc,SpsfSb,aC1iue,tUnxGc,aW3pY,ZakeSe,EFQ78c,xQtZb,I6YDgd,zbML3c,zr1jrb,vHEMJe,YHI3We,YTxL4,bSspM,Uas9Hd,zy0vNb,K0PMbc,AvtSve,qmdT9,MY7mZe,xBaz7b,GwYlN,eVCnO,EIOG1e,LDQI"
                                                        Preview:"use strict";_F_installCss(".r4WGQb{position:relative}.Dl08I>:first-child{margin-top:0}.Dl08I>:last-child{margin-bottom:0}.IzwVE{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-family:\"Google Sans\",roboto,\"Noto Sans Myanmar UI\",arial,sans-serif;font-size:1.25rem;font-weight:400;letter-spacing:0rem;line-height:1.2}.l5PPKe{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-size:1rem}.l5PPKe .dMNVAe{margin:0;padding:0}.l5PPKe>:first-child{margin-top:0;padding-top:0}.l5PPKe>:last-child{margin-bottom:0;padding-bottom:0}.Dl08I{margin:0;padding:0;position:relative}.Dl08I>.SmR8:only-child{padding-top:1px}.Dl08I>.SmR8:only-child::before{top:0}.Dl08I>.SmR8:not(first-child){padding-bottom:1px}.Dl08I>.SmR8::after{bottom:0}.Dl08I>.SmR8:only-child::before,.Dl08I>.SmR8::after{border-bottom:1px solid #c4c7c5;border-bottom:1px solid var(--gm3-sys-color-outline-variant,#c4c7c5);content:\"\";height:0;left:0;position:absolute;width:100%}.aZvCDf{margin-top:8px;margin-left
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (755)
                                                        Category:downloaded
                                                        Size (bytes):1460
                                                        Entropy (8bit):5.291808298251231
                                                        Encrypted:false
                                                        SSDEEP:24:kMYD7DuZvuhqCsNRxoYTY9/qoVk7hz1l2p6vDMW94uEQOeGbCx4VGbgCSFBV87OU:o7DuZWhv6oy12kvwKEeGbC6GbHSh/Hrw
                                                        MD5:4CA7ADFE744A690411EA4D3EA8DB9E4B
                                                        SHA1:2CF1777A199E25378D330DA68BED1871B5C5BC32
                                                        SHA-256:128129BA736B3094323499B0498A5B3A909C1529717461C34B70080A5B1603BD
                                                        SHA-512:8BD3477AF41D1F0FE74AFFCB177BEC0F5F4FDCBBA6BD29D9C2567E6FFDEF5DEB7FF74BF348F33209C39D7BB4958E748DF6731D3DC8F6947352276BC92EAF9E79
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBimEQjEH54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHHHUTOu8QCHKV2CSS4q8_ZgreBVQ/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=P6sQOc"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("lOO0Vd");._.VZa=new _.pf(_.Am);._.l();._.k("P6sQOc");.var $Za=!!(_.Kh[1]&16);var b_a=function(a,b,c,d,e){this.ea=a;this.wa=b;this.ka=c;this.Ca=d;this.Ga=e;this.aa=0;this.da=a_a(this)},c_a=function(a){var b={};_.La(a.yS(),function(e){b[e]=!0});var c=a.pS(),d=a.tS();return new b_a(a.qP(),c.aa()*1E3,a.WR(),d.aa()*1E3,b)},a_a=function(a){return Math.random()*Math.min(a.wa*Math.pow(a.ka,a.aa),a.Ca)},OG=function(a,b){return a.aa>=a.ea?!1:b!=null?!!a.Ga[b]:!0};var PG=function(a){_.W.call(this,a.Fa);this.da=a.Ea.EV;this.ea=a.Ea.metadata;a=a.Ea.Xga;this.fetch=a.fetch.bind(a)};_.J(PG,_.W);PG.Ba=function(){return{Ea:{EV:_.YZa,metadata:_.VZa,Xga:_.OZa}}};PG.prototype.aa=function(a,b){if(this.ea.getType(a.Od())!==1)return _.Sm(a);var c=this.da.eV;return(c=c?c_a(c):null)&&OG(c)?_.wya(a,d_a(this,a,b,c)):_.Sm(a)};.var d_a=function(a,b,c,d){return c.then(function(e){return e},function(e)
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (1694)
                                                        Category:downloaded
                                                        Size (bytes):32500
                                                        Entropy (8bit):5.378903546681047
                                                        Encrypted:false
                                                        SSDEEP:768:zYlbuROstb0e39nKGrkysU0smpu4OLOdzIf1p/5GeSsngurz6aKEEEGo/:zYl61Cysbu4OLOdzIfrIen72ZFo/
                                                        MD5:BF4BF9728A7C302FBA5B14F3D0F1878B
                                                        SHA1:2607CA7A93710D629400077FF3602CB207E6F53D
                                                        SHA-256:8981E7B228DF7D6A8797C0CD1E9B0F1F88337D5F0E1C27A04E7A57D2C4309798
                                                        SHA-512:AC9E170FC3AFDC0CF6BB8E926B93EF129A5FAD1BBA51B60BABCF3555E9B652E98F86A00FB099879DED35DD3FFE72ECFA597E20E6CA8CF402BEDEC40F78412EDA
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBimEQjEH54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=_b,_tp/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHHHUTOu8QCHKV2CSS4q8_ZgreBVQ/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=byfTOb,lsjVmc,LEikZe"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{.var Aua=function(a,b){this.da=a;this.ea=b;if(!c){var c=new _.ap("//www.google.com/images/cleardot.gif");_.op(c)}this.ka=c};_.h=Aua.prototype;_.h.Zc=null;_.h.lZ=1E4;_.h.bA=!1;_.h.nQ=0;_.h.zJ=null;_.h.bV=null;_.h.setTimeout=function(a){this.lZ=a};_.h.start=function(){if(this.bA)throw Error("dc");this.bA=!0;this.nQ=0;Bua(this)};_.h.stop=function(){Cua(this);this.bA=!1};.var Bua=function(a){a.nQ++;navigator!==null&&"onLine"in navigator&&!navigator.onLine?_.km((0,_.bg)(a.aH,a,!1),0):(a.aa=new Image,a.aa.onload=(0,_.bg)(a.Fja,a),a.aa.onerror=(0,_.bg)(a.Eja,a),a.aa.onabort=(0,_.bg)(a.Dja,a),a.zJ=_.km(a.Gja,a.lZ,a),a.aa.src=String(a.ka))};_.h=Aua.prototype;_.h.Fja=function(){this.aH(!0)};_.h.Eja=function(){this.aH(!1)};_.h.Dja=function(){this.aH(!1)};_.h.Gja=function(){this.aH(!1)};._.h.aH=function(a){Cua(this);a?(this.bA=!1,this.da.call(this.ea,!0)):this.nQ<=0?Bua(this):(this.bA=!1,
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
                                                        Category:downloaded
                                                        Size (bytes):52280
                                                        Entropy (8bit):7.995413196679271
                                                        Encrypted:true
                                                        SSDEEP:1536:1rvqtK8DZilXxwJ8mMwAZy7phqsFLdG3B4d:xytBZits8bw4wzbFxG3B4d
                                                        MD5:F61F0D4D0F968D5BBA39A84C76277E1A
                                                        SHA1:AA3693EA140ECA418B4B2A30F6A68F6F43B4BEB2
                                                        SHA-256:57147F08949ABABE7DEEF611435AE418475A693E3823769A25C2A39B6EAD9CCC
                                                        SHA-512:6C3BD90F709BCF9151C9ED9FFEA55C4F6883E7FDA2A4E26BF018C83FE1CFBE4F4AA0DB080D6D024070D53B2257472C399C8AC44EEFD38B9445640EFA85D5C487
                                                        Malicious:false
                                                        URL:https://fonts.gstatic.com/s/googlesans/v58/4UaRrENHsxJlGDuGo1OIlJfC6l_24rlCK1Yo_Iq2vgCI.woff2
                                                        Preview:wOF2.......8.....................................^...$..4?HVAR..?MVAR9.`?STAT.*',..J/.......`..(..Z.0..R.6.$.... .....K..[..q..c..T.....>.P.j.`.w..#...%......N.".....$..3.0.6......... .L.rX/r[j.y.|*(.4.%#.....2.v.m..-..%.....;-.Y.{..&..O=#l@...k..7g..ZI...#.Z./+T..r7...M..3).Z%.x....s..sL..[A!.5*1w'/.8V..2Z..%.X.h.o.).]..9..Q`.$.....7..kZ.~O........d..g.n.d.Rw+&....Cz..uy#..fz,(.J....v.%..`..9.....h...?O..:...c%.....6s....xl..#...5..._......1.>.)"U.4 W....?%......6//!$...!.n9C@n...........!""^.....W..Z<.7.x.."UT.T....E.."R>.R..t.....H d..e_.K../.+8.Q.P.ZQ....;...U....]......._.e*......71.?.7.ORv.?...l...G|.P...|:...I.X..2.,.L........d.g.]}W#uW]QnuP-s.;.-Y.....].......C..j_.M0...y.......J..........NY..@A...,....-.F......'..w./j5g.vUS...U..0.&...y7.LP.....%.....Y......Y..D. e.A..G.?.$.......6...eaK.n5.m...N...,...+BCl..L> .E9~.b[.w.x....6<...}.e...%V....O.......*.?...a..#[eE.4..p..$...].....%......o._......N.._~..El....b..A.0.r8.....|..D.d..
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (570)
                                                        Category:downloaded
                                                        Size (bytes):3467
                                                        Entropy (8bit):5.514745431912774
                                                        Encrypted:false
                                                        SSDEEP:96:ozbld2fNUmeqJNizhNtt1W8t//loyIpXmdVE2w:onSKE8PWe/Cy4X3j
                                                        MD5:8DEF399E8355ABC23E64505281005099
                                                        SHA1:24FF74C3AEFD7696D84FF148465DF4B1B60B1696
                                                        SHA-256:F128D7218E1286B05DF11310AD3C8F4CF781402698E45448850D2A3A22F5F185
                                                        SHA-512:33721DD47658D8E12ADF6BD9E9316EB89F5B6297927F7FD60F954E04B829DCBF0E1AE6DDD9A3401F45E0011AE4B1397B960C218238A3D0F633A2173D8E604082
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBimEQjEH54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,iAskyc,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,wg1P6b,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHHHUTOu8QCHKV2CSS4q8_ZgreBVQ/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=Wt6vjf,hhhU8,FCpbqb,WhJNk"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("Wt6vjf");.var cya=function(){var a=_.He();return _.Lj(a,1)},Yt=function(a){this.Da=_.t(a,0,Yt.messageId)};_.J(Yt,_.w);Yt.prototype.Ha=function(){return _.Dj(this,1)};Yt.prototype.Va=function(a){return _.Vj(this,1,a)};Yt.messageId="f.bo";var Zt=function(){_.hm.call(this)};_.J(Zt,_.hm);Zt.prototype.xd=function(){this.CT=!1;dya(this);_.hm.prototype.xd.call(this)};Zt.prototype.aa=function(){eya(this);if(this.wC)return fya(this),!1;if(!this.KV)return $t(this),!0;this.dispatchEvent("p");if(!this.zP)return $t(this),!0;this.wM?(this.dispatchEvent("r"),$t(this)):fya(this);return!1};.var gya=function(a){var b=new _.ap(a.W4);a.qQ!=null&&_.Jn(b,"authuser",a.qQ);return b},fya=function(a){a.wC=!0;var b=gya(a),c="rt=r&f_uid="+_.pk(a.zP);_.cn(b,(0,_.bg)(a.ea,a),"POST",c)};.Zt.prototype.ea=function(a){a=a.target;eya(this);if(_.fn(a)){this.cK=0;if(this.wM)this.wC=!1,this.dispatchEvent("r"
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:downloaded
                                                        Size (bytes):84
                                                        Entropy (8bit):4.875266466142591
                                                        Encrypted:false
                                                        SSDEEP:3:DZFJu0+WVTBCq2Bjdw2KsJJuYHSKnZ:lFJuuVTBudw29nu4SKZ
                                                        MD5:87B6333E98B7620EA1FF98D1A837A39E
                                                        SHA1:105DE6815B0885357DE1414BFC0D77FCC9E924EF
                                                        SHA-256:DCD3C133C5C40BECD4100BBE6EDAE84C9735E778E4234A5E8395C56FF8A733BA
                                                        SHA-512:867D7943D813685FAA76394E53199750C55817E836FD19C933F74D11E9657CE66719A6D6B2E39EE1DE62358BCE364E38A55F4E138DF92337DE6985DDCD5D0994
                                                        Malicious:false
                                                        URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISHgmA6QC9dWevzxIFDRkBE_oSBQ3oIX6GEgUN05ioBw==?alt=proto
                                                        Preview:Cj0KBw0ZARP6GgAKKQ3oIX6GGgQISxgCKhwIClIYCg5AIS4jJF8qLSY/Ky8lLBABGP////8PCgcN05ioBxoA
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (553)
                                                        Category:downloaded
                                                        Size (bytes):744362
                                                        Entropy (8bit):5.791334302173818
                                                        Encrypted:false
                                                        SSDEEP:6144:YVXWBQkPdzg5pTX1ROv/duPzd8C3s891/Q:Nfd8j91/Q
                                                        MD5:5998B16F22823CDA571E9767D2F000F5
                                                        SHA1:8F191C974AF3FDEF368C7A2706A1C81C7F379ADB
                                                        SHA-256:7FFEA98E198646D080873710AD217394C63EF97E6B8F5DD0EBF5E3BB8B7AED8E
                                                        SHA-512:951A410744AFBD905141EB68846DCC707F36B6A3A7C3734633B98064441E417A14F52B1F3FB347114ED15E7899D3554EA9745EACF7076955119AA0EF9ADD206E
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/am=xIFgKBimEQjEH54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/excm=_b,_tp,identifierview/ed=1/dg=0/wt=2/ujg=1/rs=AOaEmlGukuT5y8NnMp7TQhoXvWQoBnYT8w/m=_b,_tp"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._._F_toggles_initialize=function(a){(typeof globalThis!=="undefined"?globalThis:typeof self!=="undefined"?self:this)._F_toggles=a||[]};(0,_._F_toggles_initialize)([0x286081c4, 0x20469860, 0x39e1fc40, 0x14501e80, 0xe420, 0x0, 0x1a000000, 0x1d000003, 0xc, ]);./*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright Google LLC. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright 2024 Google, Inc. SPDX-License-Identifier: MIT.*/./*. SPDX-License-Identifier: Apache-2.0.*/./*. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/.var baa,daa,Ma,Sa,gaa,iaa,jb,qaa,waa,Caa,Haa,Kaa,Jb,Laa,Ob,Qb,Rb,Maa,Naa,Sb,Oaa,Paa,Qaa,Yb,Vaa,Xaa,ec,fc,gc,bba,cba,gba,jba,lba,mba,qba,tba,nba,sba,rba,pba,oba,uba,yba,Cba,Dba,Aba,Hc,Ic,Gba,Iba,Mba,Nba,Oba,Pba,Lba,Qba,Sba,dd,Uba,Vba,Xba,Zba,Yba,aca,bca,cca,dca,fca,eca,hca,ica,jca,kca,nca,
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (522)
                                                        Category:downloaded
                                                        Size (bytes):5050
                                                        Entropy (8bit):5.289052544075544
                                                        Encrypted:false
                                                        SSDEEP:96:o4We0hP7OBFXYvB1sig3Fd8HkaXzLmUrv8Vh1WJlLQXT2v2gqw:655758Fd8HkaPZ0GmAD
                                                        MD5:26E26FD11772DFF5C7004BEA334289CC
                                                        SHA1:638DAAF541BDE31E95AEE4F8ADA677434D7051DB
                                                        SHA-256:ADFE3E4960982F5EF4C043052A9990D8683C5FC2B590E817B6B1A5774DDE2CE3
                                                        SHA-512:C31929EB6D1C60D6A84A2574FF60490394A6D6F9B354972F3328952F570D80B3F2AEC916B0E1B66DDB1AC056EB75BFAC477E7AF631D0AD1810EDBAF025465D66
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBimEQjEH54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,iAskyc,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHHHUTOu8QCHKV2CSS4q8_ZgreBVQ/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=wg1P6b"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.jNa=_.y("wg1P6b",[_.TA,_.Cn,_.Kn]);._.k("wg1P6b");.var Z5a;Z5a=_.mh(["aria-"]);._.uJ=function(a){_.X.call(this,a.Fa);this.Ka=this.wa=this.aa=this.viewportElement=this.Na=null;this.Hc=a.Ea.ff;this.ab=a.Ea.focus;this.Fc=a.Ea.Fc;this.ea=this.Pi();a=-1*parseInt(_.Co(this.Pi().el(),"marginTop")||"0",10);var b=parseInt(_.Co(this.Pi().el(),"marginBottom")||"0",10);this.Ta={top:a,right:0,bottom:b,left:0};a=_.cf(this.getData("isMenuDynamic"),!1);b=_.cf(this.getData("isMenuHoisted"),!1);this.Ga=a?1:b?2:0;this.ka=!1;this.Ca=1;this.Ga!==1&&(this.aa=this.Sa("U0exHf").children().Wc(0),_.ku(this,.$5a(this,this.aa.el())));_.kF(this.oa())&&(a=this.oa().el(),b=this.we.bind(this),a.__soy_skip_handler=b)};_.J(_.uJ,_.X);_.uJ.Ba=function(){return{Ea:{ff:_.ZE,focus:_.KE,Fc:_.ru}}};_.uJ.prototype.xF=function(a){var b=a.source;this.Na=b;var c;((c=a.data)==null?0:c.fz)?(a=a.data.fz,this.Ca=a==="MOUS
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):6.581000778304807
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:file.exe
                                                        File size:918'016 bytes
                                                        MD5:ab7bea5cb100ab7acdcf97ae6d034994
                                                        SHA1:2336e609864055ba6a09607b3d4b30d1e113068d
                                                        SHA256:40d7cbbce05cfa2dac5abbea6911fbc1843ace1ec5fb9508ddacc0368e76e3d0
                                                        SHA512:8d2c0c4881d08b8f3837522acc817322faf43e8515e208e5235fd5977c730b3d327a67a05cedacd367214b4fb35915ab345e9b0c76953de53e20d3d7d5748663
                                                        SSDEEP:12288:QqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgawTI:QqDEvCTbMWu7rQYlBQcBiT6rprG8aII
                                                        TLSH:CB159E0273D1C062FF9B92334B5AF6515BBC69260123E61F13981DB9BE701B1563E7A3
                                                        File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                        Icon Hash:aaf3e3e3938382a0
                                                        Entrypoint:0x420577
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x66FC55B8 [Tue Oct 1 20:04:08 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:5
                                                        OS Version Minor:1
                                                        File Version Major:5
                                                        File Version Minor:1
                                                        Subsystem Version Major:5
                                                        Subsystem Version Minor:1
                                                        Import Hash:948cc502fe9226992dce9417f952fce3
                                                        Instruction
                                                        call 00007F26E8D1B7B3h
                                                        jmp 00007F26E8D1B0BFh
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        push dword ptr [ebp+08h]
                                                        mov esi, ecx
                                                        call 00007F26E8D1B29Dh
                                                        mov dword ptr [esi], 0049FDF0h
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        and dword ptr [ecx+04h], 00000000h
                                                        mov eax, ecx
                                                        and dword ptr [ecx+08h], 00000000h
                                                        mov dword ptr [ecx+04h], 0049FDF8h
                                                        mov dword ptr [ecx], 0049FDF0h
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        push dword ptr [ebp+08h]
                                                        mov esi, ecx
                                                        call 00007F26E8D1B26Ah
                                                        mov dword ptr [esi], 0049FE0Ch
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        and dword ptr [ecx+04h], 00000000h
                                                        mov eax, ecx
                                                        and dword ptr [ecx+08h], 00000000h
                                                        mov dword ptr [ecx+04h], 0049FE14h
                                                        mov dword ptr [ecx], 0049FE0Ch
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        mov esi, ecx
                                                        lea eax, dword ptr [esi+04h]
                                                        mov dword ptr [esi], 0049FDD0h
                                                        and dword ptr [eax], 00000000h
                                                        and dword ptr [eax+04h], 00000000h
                                                        push eax
                                                        mov eax, dword ptr [ebp+08h]
                                                        add eax, 04h
                                                        push eax
                                                        call 00007F26E8D1DE5Dh
                                                        pop ecx
                                                        pop ecx
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        lea eax, dword ptr [ecx+04h]
                                                        mov dword ptr [ecx], 0049FDD0h
                                                        push eax
                                                        call 00007F26E8D1DEA8h
                                                        pop ecx
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        mov esi, ecx
                                                        lea eax, dword ptr [esi+04h]
                                                        mov dword ptr [esi], 0049FDD0h
                                                        push eax
                                                        call 00007F26E8D1DE91h
                                                        test byte ptr [ebp+08h], 00000001h
                                                        pop ecx
                                                        Programming Language:
                                                        • [ C ] VS2008 SP1 build 30729
                                                        • [IMP] VS2008 SP1 build 30729
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x9734.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xde0000x7594.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rsrc0xd40000x97340x9800296b3ac9062ec48bb37a67e115c9deb2False0.29345703125data5.222798618085453IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0xde0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                        RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                        RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                        RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                        RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                        RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                        RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                        RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                        RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                        RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                        RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                        RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                        RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                        RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                        RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                        RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                        RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                        RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                        RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                        RT_RCDATA0xdc7b80x9fadata1.0043069694596711
                                                        RT_GROUP_ICON0xdd1b40x76dataEnglishGreat Britain0.6610169491525424
                                                        RT_GROUP_ICON0xdd22c0x14dataEnglishGreat Britain1.25
                                                        RT_GROUP_ICON0xdd2400x14dataEnglishGreat Britain1.15
                                                        RT_GROUP_ICON0xdd2540x14dataEnglishGreat Britain1.25
                                                        RT_VERSION0xdd2680xdcdataEnglishGreat Britain0.6181818181818182
                                                        RT_MANIFEST0xdd3440x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                        DLLImport
                                                        WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                        VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                        COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                        MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                        WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                        PSAPI.DLLGetProcessMemoryInfo
                                                        IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                        USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                        UxTheme.dllIsThemeActive
                                                        KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                        USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                        GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                        COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                        ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                        SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                        OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishGreat Britain
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Oct 1, 2024 22:14:59.775151014 CEST49736443192.168.2.4142.250.186.174
                                                        Oct 1, 2024 22:14:59.775197029 CEST44349736142.250.186.174192.168.2.4
                                                        Oct 1, 2024 22:14:59.775264978 CEST49736443192.168.2.4142.250.186.174
                                                        Oct 1, 2024 22:14:59.775638103 CEST49736443192.168.2.4142.250.186.174
                                                        Oct 1, 2024 22:14:59.775655031 CEST44349736142.250.186.174192.168.2.4
                                                        Oct 1, 2024 22:15:00.425561905 CEST44349736142.250.186.174192.168.2.4
                                                        Oct 1, 2024 22:15:00.427560091 CEST49736443192.168.2.4142.250.186.174
                                                        Oct 1, 2024 22:15:00.427622080 CEST44349736142.250.186.174192.168.2.4
                                                        Oct 1, 2024 22:15:00.428281069 CEST44349736142.250.186.174192.168.2.4
                                                        Oct 1, 2024 22:15:00.428355932 CEST49736443192.168.2.4142.250.186.174
                                                        Oct 1, 2024 22:15:00.428993940 CEST44349736142.250.186.174192.168.2.4
                                                        Oct 1, 2024 22:15:00.429049969 CEST49736443192.168.2.4142.250.186.174
                                                        Oct 1, 2024 22:15:00.430146933 CEST49736443192.168.2.4142.250.186.174
                                                        Oct 1, 2024 22:15:00.430217028 CEST44349736142.250.186.174192.168.2.4
                                                        Oct 1, 2024 22:15:00.430327892 CEST49736443192.168.2.4142.250.186.174
                                                        Oct 1, 2024 22:15:00.430345058 CEST44349736142.250.186.174192.168.2.4
                                                        Oct 1, 2024 22:15:00.471548080 CEST49736443192.168.2.4142.250.186.174
                                                        Oct 1, 2024 22:15:00.732413054 CEST44349736142.250.186.174192.168.2.4
                                                        Oct 1, 2024 22:15:00.732466936 CEST44349736142.250.186.174192.168.2.4
                                                        Oct 1, 2024 22:15:00.732614994 CEST49736443192.168.2.4142.250.186.174
                                                        Oct 1, 2024 22:15:00.732661963 CEST44349736142.250.186.174192.168.2.4
                                                        Oct 1, 2024 22:15:00.732692957 CEST44349736142.250.186.174192.168.2.4
                                                        Oct 1, 2024 22:15:00.732753992 CEST49736443192.168.2.4142.250.186.174
                                                        Oct 1, 2024 22:15:00.734909058 CEST49736443192.168.2.4142.250.186.174
                                                        Oct 1, 2024 22:15:00.734939098 CEST44349736142.250.186.174192.168.2.4
                                                        Oct 1, 2024 22:15:01.424772978 CEST49675443192.168.2.4173.222.162.32
                                                        Oct 1, 2024 22:15:03.155623913 CEST49741443192.168.2.4142.250.184.196
                                                        Oct 1, 2024 22:15:03.155672073 CEST44349741142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:15:03.155734062 CEST49741443192.168.2.4142.250.184.196
                                                        Oct 1, 2024 22:15:03.155957937 CEST49741443192.168.2.4142.250.184.196
                                                        Oct 1, 2024 22:15:03.155972004 CEST44349741142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:15:03.484112978 CEST49743443192.168.2.4184.28.90.27
                                                        Oct 1, 2024 22:15:03.484148026 CEST44349743184.28.90.27192.168.2.4
                                                        Oct 1, 2024 22:15:03.484210968 CEST49743443192.168.2.4184.28.90.27
                                                        Oct 1, 2024 22:15:03.485788107 CEST49743443192.168.2.4184.28.90.27
                                                        Oct 1, 2024 22:15:03.485799074 CEST44349743184.28.90.27192.168.2.4
                                                        Oct 1, 2024 22:15:03.797849894 CEST44349741142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:15:03.798077106 CEST49741443192.168.2.4142.250.184.196
                                                        Oct 1, 2024 22:15:03.798094988 CEST44349741142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:15:03.798974991 CEST44349741142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:15:03.799030066 CEST49741443192.168.2.4142.250.184.196
                                                        Oct 1, 2024 22:15:03.800170898 CEST49741443192.168.2.4142.250.184.196
                                                        Oct 1, 2024 22:15:03.800225019 CEST44349741142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:15:03.846781969 CEST49741443192.168.2.4142.250.184.196
                                                        Oct 1, 2024 22:15:03.846788883 CEST44349741142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:15:03.893655062 CEST49741443192.168.2.4142.250.184.196
                                                        Oct 1, 2024 22:15:04.143580914 CEST44349743184.28.90.27192.168.2.4
                                                        Oct 1, 2024 22:15:04.143640995 CEST49743443192.168.2.4184.28.90.27
                                                        Oct 1, 2024 22:15:04.154611111 CEST49743443192.168.2.4184.28.90.27
                                                        Oct 1, 2024 22:15:04.154625893 CEST44349743184.28.90.27192.168.2.4
                                                        Oct 1, 2024 22:15:04.154958963 CEST44349743184.28.90.27192.168.2.4
                                                        Oct 1, 2024 22:15:04.208647013 CEST49743443192.168.2.4184.28.90.27
                                                        Oct 1, 2024 22:15:04.424089909 CEST49743443192.168.2.4184.28.90.27
                                                        Oct 1, 2024 22:15:04.467443943 CEST44349743184.28.90.27192.168.2.4
                                                        Oct 1, 2024 22:15:04.613341093 CEST44349743184.28.90.27192.168.2.4
                                                        Oct 1, 2024 22:15:04.613411903 CEST44349743184.28.90.27192.168.2.4
                                                        Oct 1, 2024 22:15:04.613586903 CEST49743443192.168.2.4184.28.90.27
                                                        Oct 1, 2024 22:15:04.613780022 CEST49743443192.168.2.4184.28.90.27
                                                        Oct 1, 2024 22:15:04.613801003 CEST44349743184.28.90.27192.168.2.4
                                                        Oct 1, 2024 22:15:04.613810062 CEST49743443192.168.2.4184.28.90.27
                                                        Oct 1, 2024 22:15:04.613816977 CEST44349743184.28.90.27192.168.2.4
                                                        Oct 1, 2024 22:15:04.647721052 CEST49745443192.168.2.4184.28.90.27
                                                        Oct 1, 2024 22:15:04.647742987 CEST44349745184.28.90.27192.168.2.4
                                                        Oct 1, 2024 22:15:04.647815943 CEST49745443192.168.2.4184.28.90.27
                                                        Oct 1, 2024 22:15:04.648080111 CEST49745443192.168.2.4184.28.90.27
                                                        Oct 1, 2024 22:15:04.648092031 CEST44349745184.28.90.27192.168.2.4
                                                        Oct 1, 2024 22:15:05.298635960 CEST44349745184.28.90.27192.168.2.4
                                                        Oct 1, 2024 22:15:05.298827887 CEST49745443192.168.2.4184.28.90.27
                                                        Oct 1, 2024 22:15:05.300298929 CEST49745443192.168.2.4184.28.90.27
                                                        Oct 1, 2024 22:15:05.300303936 CEST44349745184.28.90.27192.168.2.4
                                                        Oct 1, 2024 22:15:05.300635099 CEST44349745184.28.90.27192.168.2.4
                                                        Oct 1, 2024 22:15:05.301887035 CEST49745443192.168.2.4184.28.90.27
                                                        Oct 1, 2024 22:15:05.347399950 CEST44349745184.28.90.27192.168.2.4
                                                        Oct 1, 2024 22:15:05.572293997 CEST44349745184.28.90.27192.168.2.4
                                                        Oct 1, 2024 22:15:05.572469950 CEST44349745184.28.90.27192.168.2.4
                                                        Oct 1, 2024 22:15:05.572535038 CEST49745443192.168.2.4184.28.90.27
                                                        Oct 1, 2024 22:15:05.573220968 CEST49745443192.168.2.4184.28.90.27
                                                        Oct 1, 2024 22:15:05.573230028 CEST44349745184.28.90.27192.168.2.4
                                                        Oct 1, 2024 22:15:05.573240995 CEST49745443192.168.2.4184.28.90.27
                                                        Oct 1, 2024 22:15:05.573245049 CEST44349745184.28.90.27192.168.2.4
                                                        Oct 1, 2024 22:15:09.461436033 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:09.461515903 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:09.461626053 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:09.462438107 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:09.462474108 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.208384991 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.208610058 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:10.208625078 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.209177017 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.209244013 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:10.210190058 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.210242987 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:10.211041927 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:10.211117029 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.211236954 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:10.211246967 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.254364967 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:10.463634014 CEST49762443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:10.463660002 CEST44349762172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:10.463737011 CEST49762443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:10.463944912 CEST49762443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:10.463958025 CEST44349762172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:10.515969992 CEST49763443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:10.516028881 CEST44349763172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:10.516119003 CEST49763443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:10.516527891 CEST49763443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:10.516556025 CEST44349763172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:10.525913000 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.526051998 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.526129007 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:10.526140928 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.526160955 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.526185989 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:10.526190996 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.526230097 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:10.531604052 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.531673908 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:10.538038969 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.538110971 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:10.538125038 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.538175106 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:10.544255972 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.544332027 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:10.550570965 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.550649881 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:10.550657034 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.550683022 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.550725937 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:10.614331961 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.614420891 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:10.614434004 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.614444971 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.614500046 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:10.615061045 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.615125895 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:10.621381044 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.621414900 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.621450901 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:10.621459007 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.621500015 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:10.628046989 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.628120899 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:10.634046078 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.634124041 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:10.634139061 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.640496016 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.640578032 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:10.640590906 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.646917105 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.646980047 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:10.647001028 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.647104025 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:10.647165060 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:10.647293091 CEST49756443192.168.2.4142.250.184.238
                                                        Oct 1, 2024 22:15:10.647306919 CEST44349756142.250.184.238192.168.2.4
                                                        Oct 1, 2024 22:15:11.115443945 CEST44349762172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:11.115673065 CEST49762443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:11.115686893 CEST44349762172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:11.116044998 CEST44349762172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:11.116112947 CEST49762443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:11.116719007 CEST44349762172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:11.116775036 CEST49762443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:11.117681980 CEST49762443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:11.117746115 CEST44349762172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:11.117814064 CEST49762443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:11.117822886 CEST44349762172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:11.145757914 CEST44349763172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:11.145975113 CEST49763443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:11.146002054 CEST44349763172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:11.146383047 CEST44349763172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:11.146451950 CEST49763443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:11.147089958 CEST44349763172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:11.147156954 CEST49763443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:11.147269011 CEST49763443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:11.147336960 CEST44349763172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:11.147406101 CEST49763443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:11.158684015 CEST49762443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:11.189503908 CEST49763443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:11.189517975 CEST44349763172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:11.236005068 CEST49763443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:11.419939995 CEST44349762172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:11.420016050 CEST44349762172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:11.420087099 CEST49762443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:11.420479059 CEST49762443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:11.420494080 CEST44349762172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:11.421475887 CEST49767443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:11.421525955 CEST44349767172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:11.421612024 CEST49767443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:11.421961069 CEST49767443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:11.421977043 CEST44349767172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:11.445983887 CEST44349763172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:11.446338892 CEST44349763172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:11.446419001 CEST49763443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:11.446500063 CEST49763443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:11.446548939 CEST44349763172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:11.446573973 CEST49763443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:11.446609020 CEST49763443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:11.447277069 CEST49768443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:11.447325945 CEST44349768172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:11.447402954 CEST49768443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:11.448436975 CEST49768443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:11.448451996 CEST44349768172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:12.051064968 CEST44349767172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:12.051356077 CEST49767443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:12.051382065 CEST44349767172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:12.051765919 CEST44349767172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:12.051831007 CEST49767443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:12.052496910 CEST44349767172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:12.052558899 CEST49767443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:12.052685022 CEST49767443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:12.052747011 CEST44349767172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:12.052828074 CEST49767443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:12.052838087 CEST44349767172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:12.052855015 CEST49767443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:12.089008093 CEST44349768172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:12.089261055 CEST49768443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:12.089274883 CEST44349768172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:12.089633942 CEST44349768172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:12.089701891 CEST49768443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:12.090307951 CEST44349768172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:12.090367079 CEST49768443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:12.090466976 CEST49768443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:12.090526104 CEST44349768172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:12.090584040 CEST49768443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:12.090590954 CEST44349768172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:12.090605021 CEST49768443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:12.097388983 CEST49767443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:12.097398043 CEST44349767172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:12.135400057 CEST44349768172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:12.145240068 CEST49768443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:12.267915010 CEST44349767172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:12.268963099 CEST44349767172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:12.269062042 CEST49767443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:12.269763947 CEST49767443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:12.269787073 CEST44349767172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:12.292499065 CEST49741443192.168.2.4142.250.184.196
                                                        Oct 1, 2024 22:15:12.308173895 CEST44349768172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:12.309103012 CEST44349768172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:12.309163094 CEST49768443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:12.309731007 CEST49768443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:12.309736967 CEST44349768172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:12.335412979 CEST44349741142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:15:12.562406063 CEST44349741142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:15:12.562450886 CEST44349741142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:15:12.562484980 CEST44349741142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:15:12.562503099 CEST49741443192.168.2.4142.250.184.196
                                                        Oct 1, 2024 22:15:12.562513113 CEST44349741142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:15:12.562525034 CEST44349741142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:15:12.562556982 CEST49741443192.168.2.4142.250.184.196
                                                        Oct 1, 2024 22:15:12.562637091 CEST44349741142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:15:12.562683105 CEST49741443192.168.2.4142.250.184.196
                                                        Oct 1, 2024 22:15:12.564568996 CEST49741443192.168.2.4142.250.184.196
                                                        Oct 1, 2024 22:15:12.564587116 CEST44349741142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:15:14.801136017 CEST49773443192.168.2.452.165.165.26
                                                        Oct 1, 2024 22:15:14.801194906 CEST4434977352.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:14.801345110 CEST49773443192.168.2.452.165.165.26
                                                        Oct 1, 2024 22:15:14.802475929 CEST49773443192.168.2.452.165.165.26
                                                        Oct 1, 2024 22:15:14.802509069 CEST4434977352.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:15.504326105 CEST4434977352.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:15.504437923 CEST49773443192.168.2.452.165.165.26
                                                        Oct 1, 2024 22:15:15.507744074 CEST49773443192.168.2.452.165.165.26
                                                        Oct 1, 2024 22:15:15.507777929 CEST4434977352.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:15.508279085 CEST4434977352.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:15.548508883 CEST49773443192.168.2.452.165.165.26
                                                        Oct 1, 2024 22:15:16.234462023 CEST49773443192.168.2.452.165.165.26
                                                        Oct 1, 2024 22:15:16.275413036 CEST4434977352.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:16.465025902 CEST4434977352.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:16.465054035 CEST4434977352.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:16.465063095 CEST4434977352.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:16.465080023 CEST4434977352.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:16.465109110 CEST4434977352.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:16.465169907 CEST49773443192.168.2.452.165.165.26
                                                        Oct 1, 2024 22:15:16.465260983 CEST4434977352.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:16.465301037 CEST49773443192.168.2.452.165.165.26
                                                        Oct 1, 2024 22:15:16.465327978 CEST49773443192.168.2.452.165.165.26
                                                        Oct 1, 2024 22:15:16.465528011 CEST4434977352.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:16.465595007 CEST49773443192.168.2.452.165.165.26
                                                        Oct 1, 2024 22:15:16.465610981 CEST4434977352.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:16.465636969 CEST4434977352.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:16.465717077 CEST49773443192.168.2.452.165.165.26
                                                        Oct 1, 2024 22:15:16.946753025 CEST49777443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:16.946773052 CEST44349777172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:16.946835995 CEST49777443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:16.947097063 CEST49777443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:16.947110891 CEST44349777172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:17.158507109 CEST49773443192.168.2.452.165.165.26
                                                        Oct 1, 2024 22:15:17.158571005 CEST4434977352.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:17.158617020 CEST49773443192.168.2.452.165.165.26
                                                        Oct 1, 2024 22:15:17.158636093 CEST4434977352.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:17.586941004 CEST44349777172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:17.587214947 CEST49777443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:17.587224007 CEST44349777172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:17.587759018 CEST44349777172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:17.588100910 CEST49777443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:17.588185072 CEST44349777172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:17.588279963 CEST49777443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:17.588296890 CEST49777443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:17.588315964 CEST44349777172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:17.912211895 CEST44349777172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:17.934851885 CEST44349777172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:17.934917927 CEST49777443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:17.936763048 CEST49777443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:17.936773062 CEST44349777172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:41.391529083 CEST49781443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:41.391561031 CEST44349781172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:41.391639948 CEST49781443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:41.392138958 CEST49781443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:41.392151117 CEST44349781172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:41.522283077 CEST49782443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:41.522315979 CEST44349782172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:41.522375107 CEST49782443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:41.522851944 CEST49782443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:41.522862911 CEST44349782172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:41.621691942 CEST49783443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:41.621742964 CEST44349783172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:41.621824026 CEST49783443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:41.622148037 CEST49783443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:41.622160912 CEST44349783172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:42.071532965 CEST44349781172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:42.071875095 CEST49781443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:42.071892023 CEST44349781172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:42.072237015 CEST44349781172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:42.072511911 CEST49781443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:42.072561026 CEST44349781172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:42.072683096 CEST49781443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:42.072695971 CEST49781443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:42.072705984 CEST44349781172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:42.256709099 CEST44349782172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:42.257174969 CEST49782443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:42.257189035 CEST44349782172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:42.257565975 CEST44349782172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:42.257941961 CEST49782443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:42.258002996 CEST44349782172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:42.258127928 CEST49782443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:42.258147001 CEST49782443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:42.258156061 CEST44349782172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:42.341881037 CEST44349783172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:42.342197895 CEST49783443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:42.342214108 CEST44349783172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:42.342581034 CEST44349783172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:42.342763901 CEST49783443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:42.343307018 CEST44349783172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:42.343358994 CEST49783443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:42.343544960 CEST49783443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:42.343595028 CEST44349783172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:42.343744993 CEST49783443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:42.343750954 CEST44349783172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:42.343775988 CEST49783443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:42.376966000 CEST44349781172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:42.378907919 CEST44349781172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:42.378999949 CEST49781443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:42.379272938 CEST49781443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:42.379295111 CEST44349781172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:42.387398005 CEST44349783172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:42.393541098 CEST49783443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:42.570410013 CEST44349783172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:42.570574045 CEST44349783172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:42.570648909 CEST49783443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:42.571477890 CEST49783443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:42.571497917 CEST44349783172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:42.588299036 CEST44349782172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:42.588438988 CEST44349782172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:42.588510990 CEST49782443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:42.588850021 CEST49782443192.168.2.4172.217.16.142
                                                        Oct 1, 2024 22:15:42.588874102 CEST44349782172.217.16.142192.168.2.4
                                                        Oct 1, 2024 22:15:53.646965981 CEST49784443192.168.2.452.165.165.26
                                                        Oct 1, 2024 22:15:53.647011995 CEST4434978452.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:53.647078037 CEST49784443192.168.2.452.165.165.26
                                                        Oct 1, 2024 22:15:53.647545099 CEST49784443192.168.2.452.165.165.26
                                                        Oct 1, 2024 22:15:53.647556067 CEST4434978452.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:54.689431906 CEST4434978452.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:54.689575911 CEST49784443192.168.2.452.165.165.26
                                                        Oct 1, 2024 22:15:54.695132971 CEST49784443192.168.2.452.165.165.26
                                                        Oct 1, 2024 22:15:54.695153952 CEST4434978452.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:54.695413113 CEST4434978452.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:54.704449892 CEST49784443192.168.2.452.165.165.26
                                                        Oct 1, 2024 22:15:54.751394033 CEST4434978452.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:54.992011070 CEST4434978452.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:54.992036104 CEST4434978452.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:54.992050886 CEST4434978452.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:54.992119074 CEST49784443192.168.2.452.165.165.26
                                                        Oct 1, 2024 22:15:54.992136955 CEST4434978452.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:54.992198944 CEST49784443192.168.2.452.165.165.26
                                                        Oct 1, 2024 22:15:54.996959925 CEST4434978452.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:54.997000933 CEST4434978452.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:54.997050047 CEST4434978452.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:54.997061968 CEST49784443192.168.2.452.165.165.26
                                                        Oct 1, 2024 22:15:54.997093916 CEST49784443192.168.2.452.165.165.26
                                                        Oct 1, 2024 22:15:54.997093916 CEST49784443192.168.2.452.165.165.26
                                                        Oct 1, 2024 22:15:54.997241020 CEST49784443192.168.2.452.165.165.26
                                                        Oct 1, 2024 22:15:54.997241020 CEST49784443192.168.2.452.165.165.26
                                                        Oct 1, 2024 22:15:54.997260094 CEST4434978452.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:15:54.997267962 CEST4434978452.165.165.26192.168.2.4
                                                        Oct 1, 2024 22:16:03.200160027 CEST49786443192.168.2.4142.250.184.196
                                                        Oct 1, 2024 22:16:03.200223923 CEST44349786142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:16:03.200297117 CEST49786443192.168.2.4142.250.184.196
                                                        Oct 1, 2024 22:16:03.201400042 CEST49786443192.168.2.4142.250.184.196
                                                        Oct 1, 2024 22:16:03.201419115 CEST44349786142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:16:03.877832890 CEST44349786142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:16:03.878241062 CEST49786443192.168.2.4142.250.184.196
                                                        Oct 1, 2024 22:16:03.878268957 CEST44349786142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:16:03.878557920 CEST44349786142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:16:03.878941059 CEST49786443192.168.2.4142.250.184.196
                                                        Oct 1, 2024 22:16:03.878992081 CEST44349786142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:16:03.924227953 CEST49786443192.168.2.4142.250.184.196
                                                        Oct 1, 2024 22:16:07.955123901 CEST4972480192.168.2.4199.232.214.172
                                                        Oct 1, 2024 22:16:07.960391998 CEST8049724199.232.214.172192.168.2.4
                                                        Oct 1, 2024 22:16:07.960462093 CEST4972480192.168.2.4199.232.214.172
                                                        Oct 1, 2024 22:16:12.283277988 CEST49788443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:12.283339024 CEST44349788216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:12.283466101 CEST49788443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:12.283718109 CEST49788443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:12.283735991 CEST44349788216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:12.678174019 CEST49789443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:12.678216934 CEST44349789216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:12.678354979 CEST49789443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:12.678747892 CEST49789443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:12.678760052 CEST44349789216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:12.913525105 CEST44349788216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:12.913791895 CEST49788443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:12.913805008 CEST44349788216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:12.914159060 CEST44349788216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:12.914565086 CEST49788443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:12.914628029 CEST44349788216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:12.914777040 CEST49788443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:12.914803982 CEST49788443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:12.914809942 CEST44349788216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:13.174734116 CEST44349788216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:13.174911022 CEST44349788216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:13.174964905 CEST49788443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:13.175993919 CEST49788443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:13.176013947 CEST44349788216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:14.221420050 CEST44349786142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:16:14.221477985 CEST44349786142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:16:14.221528053 CEST49786443192.168.2.4142.250.184.196
                                                        Oct 1, 2024 22:16:14.221961021 CEST44349789216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:14.222174883 CEST49789443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:14.222193003 CEST44349789216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:14.222552061 CEST44349789216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:14.222831011 CEST49789443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:14.222893000 CEST44349789216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:14.222971916 CEST49789443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:14.222987890 CEST49789443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:14.223001957 CEST44349789216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:14.661108971 CEST44349789216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:14.661747932 CEST44349789216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:14.661804914 CEST49789443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:14.662076950 CEST49789443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:14.662091017 CEST44349789216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:27.288229942 CEST49786443192.168.2.4142.250.184.196
                                                        Oct 1, 2024 22:16:27.288325071 CEST44349786142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:16:42.991838932 CEST49791443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:42.991877079 CEST44349791216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:42.991933107 CEST49791443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:42.992373943 CEST49791443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:42.992387056 CEST44349791216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:43.102054119 CEST49792443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:43.102171898 CEST44349792216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:43.102277994 CEST49792443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:43.102482080 CEST49792443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:43.102509975 CEST44349792216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:43.632256031 CEST44349791216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:43.632514954 CEST49791443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:43.632531881 CEST44349791216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:43.633035898 CEST44349791216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:43.633375883 CEST49791443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:43.633451939 CEST44349791216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:43.633534908 CEST49791443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:43.633557081 CEST49791443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:43.633565903 CEST44349791216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:43.744713068 CEST44349792216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:43.745028973 CEST49792443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:43.745111942 CEST44349792216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:43.745454073 CEST44349792216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:43.745758057 CEST49792443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:43.745830059 CEST44349792216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:43.745898008 CEST49792443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:43.745934010 CEST49792443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:43.745949030 CEST44349792216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:43.936620951 CEST44349791216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:43.936887980 CEST44349791216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:43.936989069 CEST49791443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:43.937174082 CEST49791443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:43.937194109 CEST44349791216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:44.051846027 CEST44349792216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:44.051991940 CEST44349792216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:16:44.052068949 CEST49792443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:44.055269003 CEST49792443192.168.2.4216.58.212.142
                                                        Oct 1, 2024 22:16:44.055291891 CEST44349792216.58.212.142192.168.2.4
                                                        Oct 1, 2024 22:17:03.256299973 CEST49793443192.168.2.4142.250.184.196
                                                        Oct 1, 2024 22:17:03.256349087 CEST44349793142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:17:03.256479025 CEST49793443192.168.2.4142.250.184.196
                                                        Oct 1, 2024 22:17:03.257322073 CEST49793443192.168.2.4142.250.184.196
                                                        Oct 1, 2024 22:17:03.257334948 CEST44349793142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:17:03.942908049 CEST44349793142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:17:03.943485022 CEST49793443192.168.2.4142.250.184.196
                                                        Oct 1, 2024 22:17:03.943502903 CEST44349793142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:17:03.943830967 CEST44349793142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:17:03.944340944 CEST49793443192.168.2.4142.250.184.196
                                                        Oct 1, 2024 22:17:03.944397926 CEST44349793142.250.184.196192.168.2.4
                                                        Oct 1, 2024 22:17:03.988533974 CEST49793443192.168.2.4142.250.184.196
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Oct 1, 2024 22:14:58.802880049 CEST4934053192.168.2.41.1.1.1
                                                        Oct 1, 2024 22:14:58.802984953 CEST4915253192.168.2.41.1.1.1
                                                        Oct 1, 2024 22:14:58.814075947 CEST53493401.1.1.1192.168.2.4
                                                        Oct 1, 2024 22:14:58.814116001 CEST53650521.1.1.1192.168.2.4
                                                        Oct 1, 2024 22:14:58.814685106 CEST53491521.1.1.1192.168.2.4
                                                        Oct 1, 2024 22:14:58.820679903 CEST53495721.1.1.1192.168.2.4
                                                        Oct 1, 2024 22:14:59.767338991 CEST5343553192.168.2.41.1.1.1
                                                        Oct 1, 2024 22:14:59.767513990 CEST6194353192.168.2.41.1.1.1
                                                        Oct 1, 2024 22:14:59.774511099 CEST53534351.1.1.1192.168.2.4
                                                        Oct 1, 2024 22:14:59.774629116 CEST53619431.1.1.1192.168.2.4
                                                        Oct 1, 2024 22:14:59.815571070 CEST53500471.1.1.1192.168.2.4
                                                        Oct 1, 2024 22:15:03.145961046 CEST5639953192.168.2.41.1.1.1
                                                        Oct 1, 2024 22:15:03.146002054 CEST5316653192.168.2.41.1.1.1
                                                        Oct 1, 2024 22:15:03.154635906 CEST53563991.1.1.1192.168.2.4
                                                        Oct 1, 2024 22:15:03.155028105 CEST53531661.1.1.1192.168.2.4
                                                        Oct 1, 2024 22:15:05.110677004 CEST53532261.1.1.1192.168.2.4
                                                        Oct 1, 2024 22:15:09.433361053 CEST5465853192.168.2.41.1.1.1
                                                        Oct 1, 2024 22:15:09.433507919 CEST5788453192.168.2.41.1.1.1
                                                        Oct 1, 2024 22:15:09.441478968 CEST53578841.1.1.1192.168.2.4
                                                        Oct 1, 2024 22:15:09.441520929 CEST53546581.1.1.1192.168.2.4
                                                        Oct 1, 2024 22:15:10.455339909 CEST5452153192.168.2.41.1.1.1
                                                        Oct 1, 2024 22:15:10.455954075 CEST6235553192.168.2.41.1.1.1
                                                        Oct 1, 2024 22:15:10.462498903 CEST53545211.1.1.1192.168.2.4
                                                        Oct 1, 2024 22:15:10.463311911 CEST53623551.1.1.1192.168.2.4
                                                        Oct 1, 2024 22:15:11.058290958 CEST53537781.1.1.1192.168.2.4
                                                        Oct 1, 2024 22:15:16.834749937 CEST53558941.1.1.1192.168.2.4
                                                        Oct 1, 2024 22:15:19.513556957 CEST138138192.168.2.4192.168.2.255
                                                        Oct 1, 2024 22:15:35.677186966 CEST53627801.1.1.1192.168.2.4
                                                        Oct 1, 2024 22:15:58.443298101 CEST53551391.1.1.1192.168.2.4
                                                        Oct 1, 2024 22:15:58.556372881 CEST53514561.1.1.1192.168.2.4
                                                        Oct 1, 2024 22:16:09.959114075 CEST53547911.1.1.1192.168.2.4
                                                        Oct 1, 2024 22:16:12.274425030 CEST6375453192.168.2.41.1.1.1
                                                        Oct 1, 2024 22:16:12.274537086 CEST5229853192.168.2.41.1.1.1
                                                        Oct 1, 2024 22:16:12.281091928 CEST53637541.1.1.1192.168.2.4
                                                        Oct 1, 2024 22:16:12.282167912 CEST53522981.1.1.1192.168.2.4
                                                        Oct 1, 2024 22:16:27.299285889 CEST53633651.1.1.1192.168.2.4
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Oct 1, 2024 22:14:58.802880049 CEST192.168.2.41.1.1.10xfd8aStandard query (0)youtube.comA (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:14:58.802984953 CEST192.168.2.41.1.1.10xdc48Standard query (0)youtube.com65IN (0x0001)false
                                                        Oct 1, 2024 22:14:59.767338991 CEST192.168.2.41.1.1.10xf3c0Standard query (0)www.youtube.comA (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:14:59.767513990 CEST192.168.2.41.1.1.10x24f7Standard query (0)www.youtube.com65IN (0x0001)false
                                                        Oct 1, 2024 22:15:03.145961046 CEST192.168.2.41.1.1.10xbe7bStandard query (0)www.google.comA (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:15:03.146002054 CEST192.168.2.41.1.1.10xc7c8Standard query (0)www.google.com65IN (0x0001)false
                                                        Oct 1, 2024 22:15:09.433361053 CEST192.168.2.41.1.1.10xa22bStandard query (0)accounts.youtube.comA (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:15:09.433507919 CEST192.168.2.41.1.1.10x96feStandard query (0)accounts.youtube.com65IN (0x0001)false
                                                        Oct 1, 2024 22:15:10.455339909 CEST192.168.2.41.1.1.10x19e1Standard query (0)play.google.comA (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:15:10.455954075 CEST192.168.2.41.1.1.10xf17fStandard query (0)play.google.com65IN (0x0001)false
                                                        Oct 1, 2024 22:16:12.274425030 CEST192.168.2.41.1.1.10x7faeStandard query (0)play.google.comA (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:16:12.274537086 CEST192.168.2.41.1.1.10x94eaStandard query (0)play.google.com65IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Oct 1, 2024 22:14:58.814075947 CEST1.1.1.1192.168.2.40xfd8aNo error (0)youtube.com142.250.186.78A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:14:58.814685106 CEST1.1.1.1192.168.2.40xdc48No error (0)youtube.com65IN (0x0001)false
                                                        Oct 1, 2024 22:14:59.774511099 CEST1.1.1.1192.168.2.40xf3c0No error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Oct 1, 2024 22:14:59.774511099 CEST1.1.1.1192.168.2.40xf3c0No error (0)youtube-ui.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:14:59.774511099 CEST1.1.1.1192.168.2.40xf3c0No error (0)youtube-ui.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:14:59.774511099 CEST1.1.1.1192.168.2.40xf3c0No error (0)youtube-ui.l.google.com142.250.184.206A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:14:59.774511099 CEST1.1.1.1192.168.2.40xf3c0No error (0)youtube-ui.l.google.com142.250.181.238A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:14:59.774511099 CEST1.1.1.1192.168.2.40xf3c0No error (0)youtube-ui.l.google.com216.58.206.78A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:14:59.774511099 CEST1.1.1.1192.168.2.40xf3c0No error (0)youtube-ui.l.google.com142.250.185.238A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:14:59.774511099 CEST1.1.1.1192.168.2.40xf3c0No error (0)youtube-ui.l.google.com216.58.212.174A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:14:59.774511099 CEST1.1.1.1192.168.2.40xf3c0No error (0)youtube-ui.l.google.com172.217.18.14A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:14:59.774511099 CEST1.1.1.1192.168.2.40xf3c0No error (0)youtube-ui.l.google.com142.250.186.110A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:14:59.774511099 CEST1.1.1.1192.168.2.40xf3c0No error (0)youtube-ui.l.google.com172.217.18.110A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:14:59.774511099 CEST1.1.1.1192.168.2.40xf3c0No error (0)youtube-ui.l.google.com142.250.186.142A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:14:59.774511099 CEST1.1.1.1192.168.2.40xf3c0No error (0)youtube-ui.l.google.com142.250.186.78A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:14:59.774511099 CEST1.1.1.1192.168.2.40xf3c0No error (0)youtube-ui.l.google.com172.217.23.110A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:14:59.774511099 CEST1.1.1.1192.168.2.40xf3c0No error (0)youtube-ui.l.google.com142.250.186.46A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:14:59.774511099 CEST1.1.1.1192.168.2.40xf3c0No error (0)youtube-ui.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:14:59.774511099 CEST1.1.1.1192.168.2.40xf3c0No error (0)youtube-ui.l.google.com216.58.206.46A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:14:59.774629116 CEST1.1.1.1192.168.2.40x24f7No error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Oct 1, 2024 22:14:59.774629116 CEST1.1.1.1192.168.2.40x24f7No error (0)youtube-ui.l.google.com65IN (0x0001)false
                                                        Oct 1, 2024 22:15:03.154635906 CEST1.1.1.1192.168.2.40xbe7bNo error (0)www.google.com142.250.184.196A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:15:03.155028105 CEST1.1.1.1192.168.2.40xc7c8No error (0)www.google.com65IN (0x0001)false
                                                        Oct 1, 2024 22:15:09.441478968 CEST1.1.1.1192.168.2.40x96feNo error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Oct 1, 2024 22:15:09.441520929 CEST1.1.1.1192.168.2.40xa22bNo error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Oct 1, 2024 22:15:09.441520929 CEST1.1.1.1192.168.2.40xa22bNo error (0)www3.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:15:10.462498903 CEST1.1.1.1192.168.2.40x19e1No error (0)play.google.com172.217.16.142A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:16:12.281091928 CEST1.1.1.1192.168.2.40x7faeNo error (0)play.google.com216.58.212.142A (IP address)IN (0x0001)false
                                                        • www.youtube.com
                                                        • fs.microsoft.com
                                                        • https:
                                                          • accounts.youtube.com
                                                          • play.google.com
                                                          • www.google.com
                                                        • slscr.update.microsoft.com
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.449736142.250.186.1744437572C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-01 20:15:00 UTC877OUTGET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1
                                                        Host: www.youtube.com
                                                        Connection: keep-alive
                                                        Upgrade-Insecure-Requests: 1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCI/KzQEIucrNAQii0c0BCIrTzQEIntbNAQin2M0BCPnA1BUY9snNARi60s0BGOuNpRc=
                                                        Sec-Fetch-Site: none
                                                        Sec-Fetch-Mode: navigate
                                                        Sec-Fetch-User: ?1
                                                        Sec-Fetch-Dest: document
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-01 20:15:00 UTC2634INHTTP/1.1 303 See Other
                                                        Content-Type: application/binary
                                                        X-Content-Type-Options: nosniff
                                                        Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                        Pragma: no-cache
                                                        Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                        Date: Tue, 01 Oct 2024 20:15:00 GMT
                                                        Location: https://accounts.google.com/ServiceLogin?service=youtube&uilel=3&passive=true&continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%253F%253Dhttps%25253A%25252F%25252Faccounts.google.com%25252Fv3%25252Fsignin%25252Fchallenge%25252Fpwd%26feature%3Dredirect_login&hl=en
                                                        X-Frame-Options: SAMEORIGIN
                                                        Strict-Transport-Security: max-age=31536000
                                                        Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                        Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        Vary: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        Origin-Trial: AmhMBR6zCLzDDxpW+HfpP67BqwIknWnyMOXOQGfzYswFmJe+fgaI6XZgAzcxOrzNtP7hEDsOo1jdjFnVr2IdxQ4AAAB4eyJvcmlnaW4iOiJodHRwczovL3lvdXR1YmUuY29tOjQ0MyIsImZlYXR1cmUiOiJXZWJWaWV3WFJlcXVlc3RlZFdpdGhEZXByZWNhdGlvbiIsImV4cGlyeSI6MTc1ODA2NzE5OSwiaXNTdWJkb21haW4iOnRydWV9
                                                        Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="youtube_main"
                                                        Content-Security-Policy: require-trusted-types-for 'script'
                                                        Report-To: {"group":"youtube_main","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/youtube_main"}]}
                                                        P3P: CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657?hl=en for more info."
                                                        Server: ESF
                                                        Content-Length: 0
                                                        X-XSS-Protection: 0
                                                        Set-Cookie: GPS=1; Domain=.youtube.com; Expires=Tue, 01-Oct-2024 20:45:00 GMT; Path=/; Secure; HttpOnly
                                                        Set-Cookie: YSC=9MBGBF0SeSM; Domain=.youtube.com; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                                        Set-Cookie: VISITOR_INFO1_LIVE=tqAmSPkFDcc; Domain=.youtube.com; Expires=Sun, 30-Mar-2025 20:15:00 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                                        Set-Cookie: VISITOR_PRIVACY_METADATA=CgJVUxIEGgAgRQ%3D%3D; Domain=.youtube.com; Expires=Sun, 30-Mar-2025 20:15:00 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.449743184.28.90.27443
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-01 20:15:04 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        Accept-Encoding: identity
                                                        User-Agent: Microsoft BITS/7.8
                                                        Host: fs.microsoft.com
                                                        2024-10-01 20:15:04 UTC467INHTTP/1.1 200 OK
                                                        Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                                        Content-Type: application/octet-stream
                                                        ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                                        Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                                        Server: ECAcc (lpl/EF06)
                                                        X-CID: 11
                                                        X-Ms-ApiVersion: Distribute 1.2
                                                        X-Ms-Region: prod-neu-z1
                                                        Cache-Control: public, max-age=160246
                                                        Date: Tue, 01 Oct 2024 20:15:04 GMT
                                                        Connection: close
                                                        X-CID: 2


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.449745184.28.90.27443
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-01 20:15:05 UTC239OUTGET /fs/windows/config.json HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        Accept-Encoding: identity
                                                        If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
                                                        Range: bytes=0-2147483646
                                                        User-Agent: Microsoft BITS/7.8
                                                        Host: fs.microsoft.com
                                                        2024-10-01 20:15:05 UTC515INHTTP/1.1 200 OK
                                                        ApiVersion: Distribute 1.1
                                                        Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                                        Content-Type: application/octet-stream
                                                        ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                                        Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                                        Server: ECAcc (lpl/EF06)
                                                        X-CID: 11
                                                        X-Ms-ApiVersion: Distribute 1.2
                                                        X-Ms-Region: prod-weu-z1
                                                        Cache-Control: public, max-age=160189
                                                        Date: Tue, 01 Oct 2024 20:15:05 GMT
                                                        Content-Length: 55
                                                        Connection: close
                                                        X-CID: 2
                                                        2024-10-01 20:15:05 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
                                                        Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        3192.168.2.449756142.250.184.2384437572C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-01 20:15:10 UTC1243OUTGET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=602026825&timestamp=1727813708632 HTTP/1.1
                                                        Host: accounts.youtube.com
                                                        Connection: keep-alive
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-arch: "x86"
                                                        sec-ch-ua-platform: "Windows"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        Upgrade-Insecure-Requests: 1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCI/KzQEIucrNAQii0c0BCIrTzQEIntbNAQin2M0BCPnA1BUY9snNARi60s0BGOuNpRc=
                                                        Sec-Fetch-Site: cross-site
                                                        Sec-Fetch-Mode: navigate
                                                        Sec-Fetch-User: ?1
                                                        Sec-Fetch-Dest: iframe
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-01 20:15:10 UTC1969INHTTP/1.1 200 OK
                                                        Content-Type: text/html; charset=utf-8
                                                        X-Frame-Options: ALLOW-FROM https://accounts.google.com
                                                        Content-Security-Policy: frame-ancestors https://accounts.google.com
                                                        Content-Security-Policy: script-src 'report-sample' 'nonce-A7WNVSfiF5f0by7KcbefyQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport;worker-src 'self'
                                                        Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport/allowlist
                                                        Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport
                                                        Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                        Pragma: no-cache
                                                        Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                        Date: Tue, 01 Oct 2024 20:15:10 GMT
                                                        Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Cross-Origin-Opener-Policy: same-origin
                                                        Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        reporting-endpoints: default="/_/AccountsDomainCookiesCheckConnectionHttp/web-reports?context=eJzjstDikmII1pBikPj6kkkDiJ3SZ7AGAXHSv_OsRUB8ufsS63UgVu25xGoKxEUSV1ibgFiIh-Pcho_b2QQebOw6wqikl5RfGJ-ZkppXkllSmZKfm5iZl5yfn52ZWlycWlSWWhRvZGBkYmBpZKRnYBFfYAAA79QtwA"
                                                        Server: ESF
                                                        X-XSS-Protection: 0
                                                        X-Content-Type-Options: nosniff
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-01 20:15:10 UTC1969INData Raw: 37 36 32 30 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 20 6e 6f 6e 63 65 3d 22 41 37 57 4e 56 53 66 69 46 35 66 30 62 79 37 4b 63 62 65 66 79 51 22 3e 22 75 73 65 20 73 74 72 69 63 74 22 3b 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 3d 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 7c 7c 7b 7d 3b 28 66 75 6e 63 74 69 6f 6e 28 5f 29 7b 76 61 72 20 77 69 6e 64 6f 77 3d 74 68 69 73 3b 0a 74 72 79 7b 0a 5f 2e 5f 46 5f 74 6f 67 67 6c 65 73 5f 69 6e 69 74 69 61 6c 69 7a 65 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 28 74 79 70 65 6f
                                                        Data Ascii: 7620<html><head><script nonce="A7WNVSfiF5f0by7KcbefyQ">"use strict";this.default_AccountsDomaincookiesCheckconnectionJs=this.default_AccountsDomaincookiesCheckconnectionJs||{};(function(_){var window=this;try{_._F_toggles_initialize=function(a){(typeo
                                                        2024-10-01 20:15:10 UTC1969INData Raw: 54 72 69 64 65 6e 74 5c 2f 28 5c 64 2e 5c 64 29 2f 2e 65 78 65 63 28 62 29 2c 0a 63 5b 31 5d 3d 3d 22 37 2e 30 22 29 69 66 28 62 26 26 62 5b 31 5d 29 73 77 69 74 63 68 28 62 5b 31 5d 29 7b 63 61 73 65 20 22 34 2e 30 22 3a 61 3d 22 38 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 35 2e 30 22 3a 61 3d 22 39 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 36 2e 30 22 3a 61 3d 22 31 30 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 37 2e 30 22 3a 61 3d 22 31 31 2e 30 22 7d 65 6c 73 65 20 61 3d 22 37 2e 30 22 3b 65 6c 73 65 20 61 3d 63 5b 31 5d 3b 62 3d 61 7d 65 6c 73 65 20 62 3d 22 22 3b 72 65 74 75 72 6e 20 62 7d 76 61 72 20 64 3d 52 65 67 45 78 70 28 22 28 5b 41 2d 5a 5d 5b 5c 5c 77 20 5d 2b 29 2f 28 5b 5e 5c 5c 73 5d 2b 29 5c 5c 73 2a 28 3f 3a 5c 5c 28
                                                        Data Ascii: Trident\/(\d.\d)/.exec(b),c[1]=="7.0")if(b&&b[1])switch(b[1]){case "4.0":a="8.0";break;case "5.0":a="9.0";break;case "6.0":a="10.0";break;case "7.0":a="11.0"}else a="7.0";else a=c[1];b=a}else b="";return b}var d=RegExp("([A-Z][\\w ]+)/([^\\s]+)\\s*(?:\\(
                                                        2024-10-01 20:15:10 UTC1969INData Raw: 74 63 68 28 74 79 70 65 6f 66 20 61 29 7b 63 61 73 65 20 22 6e 75 6d 62 65 72 22 3a 72 65 74 75 72 6e 20 69 73 46 69 6e 69 74 65 28 61 29 3f 61 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 69 67 69 6e 74 22 3a 72 65 74 75 72 6e 28 41 61 3f 0a 61 3e 3d 42 61 26 26 61 3c 3d 43 61 3a 61 5b 30 5d 3d 3d 3d 22 2d 22 3f 75 61 28 61 2c 44 61 29 3a 75 61 28 61 2c 45 61 29 29 3f 4e 75 6d 62 65 72 28 61 29 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 72 65 74 75 72 6e 20 61 3f 31 3a 30 3b 63 61 73 65 20 22 6f 62 6a 65 63 74 22 3a 69 66 28 61 29 69 66 28 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 61 29 29 7b 69 66 28 43 28 61 29 29 72 65 74 75 72 6e 7d 65 6c 73 65 20 69 66 28 46 61 26 26 61 21 3d 6e 75 6c 6c 26 26 61 20 69 6e
                                                        Data Ascii: tch(typeof a){case "number":return isFinite(a)?a:String(a);case "bigint":return(Aa?a>=Ba&&a<=Ca:a[0]==="-"?ua(a,Da):ua(a,Ea))?Number(a):String(a);case "boolean":return a?1:0;case "object":if(a)if(Array.isArray(a)){if(C(a))return}else if(Fa&&a!=null&&a in
                                                        2024-10-01 20:15:10 UTC1969INData Raw: 7b 76 61 72 20 62 3b 69 66 28 61 26 26 28 62 3d 51 61 29 21 3d 6e 75 6c 6c 26 26 62 2e 68 61 73 28 61 29 26 26 28 62 3d 61 2e 43 29 29 66 6f 72 28 76 61 72 20 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 62 5b 63 5d 3b 69 66 28 63 3d 3d 3d 62 2e 6c 65 6e 67 74 68 2d 31 26 26 41 28 64 29 29 66 6f 72 28 76 61 72 20 65 20 69 6e 20 64 29 7b 76 61 72 20 66 3d 64 5b 65 5d 3b 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 66 29 26 26 0a 52 61 28 66 2c 61 29 7d 65 6c 73 65 20 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 64 29 26 26 52 61 28 64 2c 61 29 7d 61 3d 45 3f 61 2e 43 3a 4d 61 28 61 2e 43 2c 50 61 2c 76 6f 69 64 20 30 2c 76 6f 69 64 20 30 2c 21 31 29 3b 65 3d 21 45 3b 69 66 28 62 3d 61 2e 6c 65 6e 67 74 68 29 7b 64 3d 61 5b 62 2d
                                                        Data Ascii: {var b;if(a&&(b=Qa)!=null&&b.has(a)&&(b=a.C))for(var c=0;c<b.length;c++){var d=b[c];if(c===b.length-1&&A(d))for(var e in d){var f=d[e];Array.isArray(f)&&Ra(f,a)}else Array.isArray(d)&&Ra(d,a)}a=E?a.C:Ma(a.C,Pa,void 0,void 0,!1);e=!E;if(b=a.length){d=a[b-
                                                        2024-10-01 20:15:10 UTC1969INData Raw: 6f 6c 2e 69 74 65 72 61 74 6f 72 22 2c 66 75 6e 63 74 69 6f 6e 28 61 29 7b 69 66 28 61 29 72 65 74 75 72 6e 20 61 3b 61 3d 53 79 6d 62 6f 6c 28 22 63 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 22 41 72 72 61 79 20 49 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 43 6c 61 6d 70 65 64 41 72 72 61 79 20 49 6e 74 31 36 41 72 72 61 79 20 55 69 6e 74 31 36 41 72 72 61 79 20 49 6e 74 33 32 41 72 72 61 79 20 55 69 6e 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 36 34 41 72 72 61 79 22 2e 73 70 6c 69 74 28 22 20 22 29 2c 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 57 61 5b 62 5b 63 5d 5d 3b 74 79 70 65 6f 66 20 64 3d 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 26 26 74 79 70 65
                                                        Data Ascii: ol.iterator",function(a){if(a)return a;a=Symbol("c");for(var b="Array Int8Array Uint8Array Uint8ClampedArray Int16Array Uint16Array Int32Array Uint32Array Float32Array Float64Array".split(" "),c=0;c<b.length;c++){var d=Wa[b[c]];typeof d==="function"&&type
                                                        2024-10-01 20:15:10 UTC1969INData Raw: 29 3b 65 28 22 66 72 65 65 7a 65 22 29 3b 65 28 22 70 72 65 76 65 6e 74 45 78 74 65 6e 73 69 6f 6e 73 22 29 3b 65 28 22 73 65 61 6c 22 29 3b 76 61 72 20 68 3d 30 2c 67 3d 66 75 6e 63 74 69 6f 6e 28 6b 29 7b 74 68 69 73 2e 67 3d 28 68 2b 3d 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2b 31 29 2e 74 6f 53 74 72 69 6e 67 28 29 3b 69 66 28 6b 29 7b 6b 3d 48 28 6b 29 3b 66 6f 72 28 76 61 72 20 6c 3b 21 28 6c 3d 6b 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6c 3d 6c 2e 76 61 6c 75 65 2c 74 68 69 73 2e 73 65 74 28 6c 5b 30 5d 2c 6c 5b 31 5d 29 7d 7d 3b 67 2e 70 72 6f 74 6f 74 79 70 65 2e 73 65 74 3d 66 75 6e 63 74 69 6f 6e 28 6b 2c 6c 29 7b 69 66 28 21 63 28 6b 29 29 74 68 72 6f 77 20 45 72 72 6f 72 28 22 69 22 29 3b 64 28 6b 29 3b 69 66 28 21 49 28 6b 2c 66 29 29
                                                        Data Ascii: );e("freeze");e("preventExtensions");e("seal");var h=0,g=function(k){this.g=(h+=Math.random()+1).toString();if(k){k=H(k);for(var l;!(l=k.next()).done;)l=l.value,this.set(l[0],l[1])}};g.prototype.set=function(k,l){if(!c(k))throw Error("i");d(k);if(!I(k,f))
                                                        2024-10-01 20:15:10 UTC1969INData Raw: 75 72 6e 20 67 2e 76 61 6c 75 65 7d 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 2e 66 6f 72 45 61 63 68 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 66 6f 72 28 76 61 72 20 6c 3d 74 68 69 73 2e 65 6e 74 72 69 65 73 28 29 2c 6d 3b 21 28 6d 3d 6c 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6d 3d 0a 6d 2e 76 61 6c 75 65 2c 67 2e 63 61 6c 6c 28 6b 2c 6d 5b 31 5d 2c 6d 5b 30 5d 2c 74 68 69 73 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 5b 53 79 6d 62 6f 6c 2e 69 74 65 72 61 74 6f 72 5d 3d 63 2e 70 72 6f 74 6f 74 79 70 65 2e 65 6e 74 72 69 65 73 3b 76 61 72 20 64 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 76 61 72 20 6c 3d 6b 26 26 74 79 70 65 6f 66 20 6b 3b 6c 3d 3d 22 6f 62 6a 65 63 74 22 7c 7c 6c 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 3f 62 2e 68 61 73 28 6b 29
                                                        Data Ascii: urn g.value})};c.prototype.forEach=function(g,k){for(var l=this.entries(),m;!(m=l.next()).done;)m=m.value,g.call(k,m[1],m[0],this)};c.prototype[Symbol.iterator]=c.prototype.entries;var d=function(g,k){var l=k&&typeof k;l=="object"||l=="function"?b.has(k)
                                                        2024-10-01 20:15:10 UTC1969INData Raw: 6f 6e 28 61 29 7b 72 65 74 75 72 6e 20 61 3f 61 3a 66 75 6e 63 74 69 6f 6e 28 62 29 7b 72 65 74 75 72 6e 20 74 79 70 65 6f 66 20 62 3d 3d 3d 22 6e 75 6d 62 65 72 22 26 26 69 73 4e 61 4e 28 62 29 7d 7d 29 3b 76 61 72 20 66 62 3d 66 62 7c 7c 7b 7d 2c 71 3d 74 68 69 73 7c 7c 73 65 6c 66 2c 67 62 3d 71 2e 5f 46 5f 74 6f 67 67 6c 65 73 7c 7c 5b 5d 2c 68 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 61 3d 61 2e 73 70 6c 69 74 28 22 2e 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 71 2c 63 3d 30 3b 63 3c 61 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 69 66 28 62 3d 62 5b 61 5b 63 5d 5d 2c 62 3d 3d 6e 75 6c 6c 29 72 65 74 75 72 6e 20 6e 75 6c 6c 3b 72 65 74 75 72 6e 20 62 7d 2c 69 62 3d 22 63 6c 6f 73 75 72 65 5f 75 69 64 5f 22 2b 28 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2a 31 45
                                                        Data Ascii: on(a){return a?a:function(b){return typeof b==="number"&&isNaN(b)}});var fb=fb||{},q=this||self,gb=q._F_toggles||[],hb=function(a){a=a.split(".");for(var b=q,c=0;c<a.length;c++)if(b=b[a[c]],b==null)return null;return b},ib="closure_uid_"+(Math.random()*1E
                                                        2024-10-01 20:15:10 UTC1969INData Raw: 74 65 78 74 5f 5f 39 38 34 33 38 32 3d 7b 7d 29 3b 61 2e 5f 5f 63 6c 6f 73 75 72 65 5f 5f 65 72 72 6f 72 5f 5f 63 6f 6e 74 65 78 74 5f 5f 39 38 34 33 38 32 2e 73 65 76 65 72 69 74 79 3d 62 7d 3b 76 61 72 20 71 62 3d 66 75 6e 63 74 69 6f 6e 28 61 2c 62 2c 63 29 7b 63 3d 63 7c 7c 71 3b 76 61 72 20 64 3d 63 2e 6f 6e 65 72 72 6f 72 2c 65 3d 21 21 62 3b 63 2e 6f 6e 65 72 72 6f 72 3d 66 75 6e 63 74 69 6f 6e 28 66 2c 68 2c 67 2c 6b 2c 6c 29 7b 64 26 26 64 28 66 2c 68 2c 67 2c 6b 2c 6c 29 3b 61 28 7b 6d 65 73 73 61 67 65 3a 66 2c 66 69 6c 65 4e 61 6d 65 3a 68 2c 6c 69 6e 65 3a 67 2c 6c 69 6e 65 4e 75 6d 62 65 72 3a 67 2c 63 61 3a 6b 2c 65 72 72 6f 72 3a 6c 7d 29 3b 72 65 74 75 72 6e 20 65 7d 7d 2c 74 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 76 61 72 20 62 3d 68
                                                        Data Ascii: text__984382={});a.__closure__error__context__984382.severity=b};var qb=function(a,b,c){c=c||q;var d=c.onerror,e=!!b;c.onerror=function(f,h,g,k,l){d&&d(f,h,g,k,l);a({message:f,fileName:h,line:g,lineNumber:g,ca:k,error:l});return e}},tb=function(a){var b=h
                                                        2024-10-01 20:15:10 UTC1969INData Raw: 22 6e 75 6d 62 65 72 22 3a 66 3d 53 74 72 69 6e 67 28 66 29 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 66 3d 66 3f 22 74 72 75 65 22 3a 22 66 61 6c 73 65 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 66 75 6e 63 74 69 6f 6e 22 3a 66 3d 28 66 3d 73 62 28 66 29 29 3f 66 3a 22 5b 66 6e 5d 22 3b 62 72 65 61 6b 3b 64 65 66 61 75 6c 74 3a 66 3d 0a 74 79 70 65 6f 66 20 66 7d 66 2e 6c 65 6e 67 74 68 3e 34 30 26 26 28 66 3d 66 2e 73 6c 69 63 65 28 30 2c 34 30 29 2b 22 2e 2e 2e 22 29 3b 63 2e 70 75 73 68 28 66 29 7d 62 2e 70 75 73 68 28 61 29 3b 63 2e 70 75 73 68 28 22 29 5c 6e 22 29 3b 74 72 79 7b 63 2e 70 75 73 68 28 77 62 28 61 2e 63 61 6c 6c 65 72 2c 62 29 29 7d 63 61 74 63 68 28 68 29 7b 63 2e 70 75 73 68 28 22 5b 65 78 63 65 70 74 69 6f 6e
                                                        Data Ascii: "number":f=String(f);break;case "boolean":f=f?"true":"false";break;case "function":f=(f=sb(f))?f:"[fn]";break;default:f=typeof f}f.length>40&&(f=f.slice(0,40)+"...");c.push(f)}b.push(a);c.push(")\n");try{c.push(wb(a.caller,b))}catch(h){c.push("[exception


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        4192.168.2.449762172.217.16.1424437572C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-01 20:15:11 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Accept: */*
                                                        Access-Control-Request-Method: POST
                                                        Access-Control-Request-Headers: x-goog-authuser
                                                        Origin: https://accounts.google.com
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-01 20:15:11 UTC520INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                        Access-Control-Max-Age: 86400
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Tue, 01 Oct 2024 20:15:11 GMT
                                                        Server: Playlog
                                                        Content-Length: 0
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        5192.168.2.449763172.217.16.1424437572C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-01 20:15:11 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Accept: */*
                                                        Access-Control-Request-Method: POST
                                                        Access-Control-Request-Headers: x-goog-authuser
                                                        Origin: https://accounts.google.com
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-01 20:15:11 UTC520INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                        Access-Control-Max-Age: 86400
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Tue, 01 Oct 2024 20:15:11 GMT
                                                        Server: Playlog
                                                        Content-Length: 0
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        6192.168.2.449767172.217.16.1424437572C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-01 20:15:12 UTC1132OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 519
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCI/KzQEIucrNAQii0c0BCIrTzQEIntbNAQin2M0BCPnA1BUY9snNARi60s0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-01 20:15:12 UTC519OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 31 33 37 30 39 36 37 34 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727813709674",null,null,null
                                                        2024-10-01 20:15:12 UTC933INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Set-Cookie: NID=518=YhCg9OtX_qkQdHO76smUv8As7T2dV4rOO5pAZzzypx0fLFawISujGRHUcknk5MgodOsCfm9SHzAac-DI26AFSkFaxohu9hKjt0D23Sqlq5PezCOjPRVY3D2q1dco3hExwRGmXd-A7z9C4y5o3uEqn6PqLL3iqOBWs-I6yDxpVgWMj-CJNpE; expires=Wed, 02-Apr-2025 20:15:12 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                        P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Tue, 01 Oct 2024 20:15:12 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Expires: Tue, 01 Oct 2024 20:15:12 GMT
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-01 20:15:12 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-01 20:15:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        7192.168.2.449768172.217.16.1424437572C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-01 20:15:12 UTC1132OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 505
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCI/KzQEIucrNAQii0c0BCIrTzQEIntbNAQin2M0BCPnA1BUY9snNARi60s0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-01 20:15:12 UTC505OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 31 33 37 30 39 37 33 36 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727813709736",null,null,null
                                                        2024-10-01 20:15:12 UTC932INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Set-Cookie: NID=518=p5Wb7pm9PWw_FENgChPepAZG412xnxs5D8tb549x74lfoJWzaJDNX2irXwrZK4C9-IiuJdiPtln37FVS_U6BApuSqcAPWTQBgfMd0_socNB0r4XRl2vGLkcRlnlLeyNjyh3cW1eR31i8nzUzaJfTPXGNbDuQdK6r_nYlMScxRdeNDYaxrA; expires=Wed, 02-Apr-2025 20:15:12 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                        P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Tue, 01 Oct 2024 20:15:12 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Expires: Tue, 01 Oct 2024 20:15:12 GMT
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-01 20:15:12 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-01 20:15:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        8192.168.2.449741142.250.184.1964437572C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-01 20:15:12 UTC1222OUTGET /favicon.ico HTTP/1.1
                                                        Host: www.google.com
                                                        Connection: keep-alive
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCI/KzQEIucrNAQii0c0BCIrTzQEIntbNAQin2M0BCPnA1BUY9snNARi60s0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: no-cors
                                                        Sec-Fetch-Dest: image
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=YhCg9OtX_qkQdHO76smUv8As7T2dV4rOO5pAZzzypx0fLFawISujGRHUcknk5MgodOsCfm9SHzAac-DI26AFSkFaxohu9hKjt0D23Sqlq5PezCOjPRVY3D2q1dco3hExwRGmXd-A7z9C4y5o3uEqn6PqLL3iqOBWs-I6yDxpVgWMj-CJNpE
                                                        2024-10-01 20:15:12 UTC705INHTTP/1.1 200 OK
                                                        Accept-Ranges: bytes
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Cross-Origin-Opener-Policy-Report-Only: same-origin; report-to="static-on-bigtable"
                                                        Report-To: {"group":"static-on-bigtable","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/static-on-bigtable"}]}
                                                        Content-Length: 5430
                                                        X-Content-Type-Options: nosniff
                                                        Server: sffe
                                                        X-XSS-Protection: 0
                                                        Date: Tue, 01 Oct 2024 17:34:06 GMT
                                                        Expires: Wed, 09 Oct 2024 17:34:06 GMT
                                                        Cache-Control: public, max-age=691200
                                                        Last-Modified: Tue, 22 Oct 2019 18:30:00 GMT
                                                        Content-Type: image/x-icon
                                                        Vary: Accept-Encoding
                                                        Age: 9666
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close
                                                        2024-10-01 20:15:12 UTC685INData Raw: 00 00 01 00 02 00 10 10 00 00 01 00 20 00 68 04 00 00 26 00 00 00 20 20 00 00 01 00 20 00 a8 10 00 00 8e 04 00 00 28 00 00 00 10 00 00 00 20 00 00 00 01 00 20 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 30 fd fd fd 96 fd fd fd d8 fd fd fd f9 fd fd fd f9 fd fd fd d7 fd fd fd 94 fe fe fe 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd 99 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 95 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd c1 ff ff ff ff fa fd f9 ff b4 d9 a7 ff 76 ba 5d ff 58 ab 3a ff 58 aa 3a ff 72 b8 59 ff ac d5 9d ff f8 fb f6 ff ff
                                                        Data Ascii: h& ( 0.v]X:X:rY
                                                        2024-10-01 20:15:12 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d8 fd fd fd 99 ff ff ff ff 92 cf fb ff 37 52 ec ff 38 46 ea ff d0 d4 fa ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 96 fe fe fe 32 ff ff ff ff f9 f9 fe ff 56 62 ed ff 35 43 ea ff 3b 49 eb ff 95 9c f4 ff cf d2 fa ff d1 d4 fa ff 96 9d f4 ff 52 5e ed ff e1 e3 fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 30 00 00 00 00 fd fd fd 9d ff ff ff ff e8 ea fd ff 58 63 ee ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 6c 76 f0 ff ff ff ff ff ff ff ff ff fd fd fd 98 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd c3 ff ff ff ff f9 f9 fe ff a5 ac f6 ff 5d 69 ee ff 3c 4a
                                                        Data Ascii: 7R8F2Vb5C;IR^0Xc5C5C5C5C5C5Clv]i<J
                                                        2024-10-01 20:15:12 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff fd fd fd d0 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fd fd fd 8b ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff b1 d8 a3 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 60 a5 35 ff ca 8e 3e ff f9 c1 9f ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 87 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 25 fd fd fd fb ff ff ff ff ff ff ff ff ff ff ff ff c2 e0 b7 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 6e b6 54 ff 9f ce 8d ff b7 da aa ff b8 db ab ff a5 d2 95 ff 7b bc 64 ff 54 a8 35 ff 53 a8 34 ff 77 a0 37 ff e3 89 41 ff f4 85 42 ff f4 85 42 ff
                                                        Data Ascii: S4S4S4S4S4S4S4S4S4S4S4S4S4S4`5>%S4S4S4S4S4S4nT{dT5S4w7ABB
                                                        2024-10-01 20:15:12 UTC1390INData Raw: ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff fb d5 bf ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd ea fd fd fd cb ff ff ff ff ff ff ff ff ff ff ff ff 46 cd fc ff 05 bc fb ff 05 bc fb ff 05 bc fb ff 21 ae f9 ff fb fb ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd c8 fd fd fd 9c ff ff ff ff ff ff ff ff ff ff ff ff 86 df fd ff 05 bc fb ff 05 bc fb ff 15 93 f5 ff 34 49 eb ff b3 b8 f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                        Data Ascii: BBBBBBF!4I
                                                        2024-10-01 20:15:12 UTC575INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d2 fe fe fe 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd 8d fd fd fd fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd fb fd fd fd 8b fe fe fe 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 27 fd fd fd 9f fd fd fd f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                        Data Ascii: $'


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        9192.168.2.44977352.165.165.26443
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-01 20:15:16 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=Kzvo6TfrERRSwdo&MD=Wf6H+1kH HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                                        Host: slscr.update.microsoft.com
                                                        2024-10-01 20:15:16 UTC560INHTTP/1.1 200 OK
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Content-Type: application/octet-stream
                                                        Expires: -1
                                                        Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                                        ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                                                        MS-CorrelationId: 5a667dec-7089-43de-9a54-64105093525f
                                                        MS-RequestId: 6ce645d4-40b9-4498-bbc6-5dfff4f530a3
                                                        MS-CV: HuK4jjbKQ0KPkfs0.0
                                                        X-Microsoft-SLSClientCache: 2880
                                                        Content-Disposition: attachment; filename=environment.cab
                                                        X-Content-Type-Options: nosniff
                                                        Date: Tue, 01 Oct 2024 20:15:16 GMT
                                                        Connection: close
                                                        Content-Length: 24490
                                                        2024-10-01 20:15:16 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                                                        Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                                                        2024-10-01 20:15:16 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                                                        Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        10192.168.2.449777172.217.16.1424437572C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-01 20:15:17 UTC1306OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1218
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: text/plain;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCI/KzQEIucrNAQii0c0BCIrTzQEIntbNAQin2M0BCPnA1BUY9snNARi60s0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=p5Wb7pm9PWw_FENgChPepAZG412xnxs5D8tb549x74lfoJWzaJDNX2irXwrZK4C9-IiuJdiPtln37FVS_U6BApuSqcAPWTQBgfMd0_socNB0r4XRl2vGLkcRlnlLeyNjyh3cW1eR31i8nzUzaJfTPXGNbDuQdK6r_nYlMScxRdeNDYaxrA
                                                        2024-10-01 20:15:17 UTC1218OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 34 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 35 35 38 2c 5b 5b 22 31 37 32 37 38 31 33 37 30 36 30 30 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,null,null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[4,0,0,0,0]]],558,[["1727813706000",null,null,null,
                                                        2024-10-01 20:15:17 UTC940INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Set-Cookie: NID=518=zEghkY4Aro6fIvGsxAC16Y_azL6DHR5e6_ku98Hkmjshi1w3oP086yI4ERX-d5vXr7ChcWf-mxEKIFIr5UnDUGohBbY9ZqvmOh4lroINW-ropDodwq8l2zxQcm_YBG958LFng7OdQxlIxtO0mTQu8Zj1meXJktY7BbLyz09fvhmie-tTlF1GIDVGig; expires=Wed, 02-Apr-2025 20:15:17 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                        P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Tue, 01 Oct 2024 20:15:17 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Expires: Tue, 01 Oct 2024 20:15:17 GMT
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-01 20:15:17 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-01 20:15:17 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        11192.168.2.449781172.217.16.1424437572C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-01 20:15:42 UTC1337OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1256
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCI/KzQEIucrNAQii0c0BCIrTzQEIntbNAQin2M0BCPnA1BUY9snNARi60s0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=zEghkY4Aro6fIvGsxAC16Y_azL6DHR5e6_ku98Hkmjshi1w3oP086yI4ERX-d5vXr7ChcWf-mxEKIFIr5UnDUGohBbY9ZqvmOh4lroINW-ropDodwq8l2zxQcm_YBG958LFng7OdQxlIxtO0mTQu8Zj1meXJktY7BbLyz09fvhmie-tTlF1GIDVGig
                                                        2024-10-01 20:15:42 UTC1256OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 31 33 37 34 30 37 34 32 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727813740742",null,null,null
                                                        2024-10-01 20:15:42 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Tue, 01 Oct 2024 20:15:42 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-01 20:15:42 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-01 20:15:42 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        12192.168.2.449782172.217.16.1424437572C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-01 20:15:42 UTC1337OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1398
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCI/KzQEIucrNAQii0c0BCIrTzQEIntbNAQin2M0BCPnA1BUY9snNARi60s0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=zEghkY4Aro6fIvGsxAC16Y_azL6DHR5e6_ku98Hkmjshi1w3oP086yI4ERX-d5vXr7ChcWf-mxEKIFIr5UnDUGohBbY9ZqvmOh4lroINW-ropDodwq8l2zxQcm_YBG958LFng7OdQxlIxtO0mTQu8Zj1meXJktY7BbLyz09fvhmie-tTlF1GIDVGig
                                                        2024-10-01 20:15:42 UTC1398OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 31 33 37 34 30 38 34 31 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727813740841",null,null,null
                                                        2024-10-01 20:15:42 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Tue, 01 Oct 2024 20:15:42 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-01 20:15:42 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-01 20:15:42 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        13192.168.2.449783172.217.16.1424437572C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-01 20:15:42 UTC1297OUTPOST /log?hasfast=true&authuser=0&format=json HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1037
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        Content-Type: text/plain;charset=UTF-8
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCI/KzQEIucrNAQii0c0BCIrTzQEIntbNAQin2M0BCPnA1BUY9snNARi60s0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: no-cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=zEghkY4Aro6fIvGsxAC16Y_azL6DHR5e6_ku98Hkmjshi1w3oP086yI4ERX-d5vXr7ChcWf-mxEKIFIr5UnDUGohBbY9ZqvmOh4lroINW-ropDodwq8l2zxQcm_YBG958LFng7OdQxlIxtO0mTQu8Zj1meXJktY7BbLyz09fvhmie-tTlF1GIDVGig
                                                        2024-10-01 20:15:42 UTC1037OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 62 6f 71 5f 69 64 65 6e 74 69 74 79 66 72 6f 6e 74 65 6e 64 61 75 74 68 75 69 73 65 72 76 65 72 5f 32 30 32 34 30 39 32 39 2e 30 37 5f 70 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 33 2c 30 2c 30
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"boq_identityfrontendauthuiserver_20240929.07_p0",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[3,0,0
                                                        2024-10-01 20:15:42 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Tue, 01 Oct 2024 20:15:42 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-01 20:15:42 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-01 20:15:42 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        14192.168.2.44978452.165.165.26443
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-01 20:15:54 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=Kzvo6TfrERRSwdo&MD=Wf6H+1kH HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                                        Host: slscr.update.microsoft.com
                                                        2024-10-01 20:15:54 UTC560INHTTP/1.1 200 OK
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Content-Type: application/octet-stream
                                                        Expires: -1
                                                        Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                                        ETag: "vic+p1MiJJ+/WMnK08jaWnCBGDfvkGRzPk9f8ZadQHg=_1440"
                                                        MS-CorrelationId: 9e4846aa-993b-4ad0-ae4c-26ea8c51c09e
                                                        MS-RequestId: 3372c0d2-235a-4a12-ba96-0cc3e53e5446
                                                        MS-CV: t1AcWD6j2kief5r3.0
                                                        X-Microsoft-SLSClientCache: 1440
                                                        Content-Disposition: attachment; filename=environment.cab
                                                        X-Content-Type-Options: nosniff
                                                        Date: Tue, 01 Oct 2024 20:15:54 GMT
                                                        Connection: close
                                                        Content-Length: 30005
                                                        2024-10-01 20:15:54 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 8d 2b 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 5b 49 00 00 14 00 00 00 00 00 10 00 8d 2b 00 00 a8 49 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 72 4d 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 fe f6 51 be 21 2b 72 4d 43 4b ed 7c 05 58 54 eb da f6 14 43 49 37 0a 02 d2 b9 86 0e 41 52 a4 1b 24 a5 bb 43 24 44 18 94 90 92 52 41 3a 05 09 95 ee 54 b0 00 91 2e e9 12 10 04 11 c9 6f 10 b7 a2 67 9f bd cf 3e ff b7 ff b3 bf 73 ed e1 9a 99 f5 c6 7a d7 bb de f5 3e cf fd 3c f7 dc 17 4a 1a 52 e7 41 a8 97 1e 14 f4 e5 25 7d f4 05 82 82 c1 20 30 08 06 ba c3 05 02 11 7f a9 c1 ff d2 87 5c 1e f4 ed 65 8e 7a 1f f6 0a 40 03 1d 7b f9 83 2c 1c 2f db b8 3a 39 3a 58 38 ba 73 5e
                                                        Data Ascii: MSCF+D[I+IdrMenvironment.cabQ!+rMCK|XTCI7AR$C$DRA:T.og>sz><JRA%} 0\ez@{,/:9:X8s^
                                                        2024-10-01 20:15:54 UTC14181INData Raw: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 26 30 24 06 03 55 04 03 13 1d 4d 69 63 72 6f 73 6f 66 74 20 54 69 6d 65 2d 53 74 61 6d 70 20 50 43 41 20 32 30 31 30 30 1e 17 0d 32 33 31 30 31 32 31 39 30 37 32 35 5a 17 0d 32 35 30 31 31 30 31 39 30 37 32 35 5a 30 81 d2 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 2d 30 2b 06 03 55 04 0b 13 24 4d 69 63 72 6f
                                                        Data Ascii: UUS10UWashington10URedmond10UMicrosoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100231012190725Z250110190725Z010UUS10UWashington10URedmond10UMicrosoft Corporation1-0+U$Micro


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        15192.168.2.449788216.58.212.1424437572C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-01 20:16:12 UTC1337OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1264
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCI/KzQEIucrNAQii0c0BCIrTzQEIntbNAQin2M0BCPnA1BUY9snNARi60s0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=zEghkY4Aro6fIvGsxAC16Y_azL6DHR5e6_ku98Hkmjshi1w3oP086yI4ERX-d5vXr7ChcWf-mxEKIFIr5UnDUGohBbY9ZqvmOh4lroINW-ropDodwq8l2zxQcm_YBG958LFng7OdQxlIxtO0mTQu8Zj1meXJktY7BbLyz09fvhmie-tTlF1GIDVGig
                                                        2024-10-01 20:16:12 UTC1264OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 31 33 37 37 31 35 30 33 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727813771503",null,null,null
                                                        2024-10-01 20:16:13 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Tue, 01 Oct 2024 20:16:13 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-01 20:16:13 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-01 20:16:13 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        16192.168.2.449789216.58.212.1424437572C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-01 20:16:14 UTC1337OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1406
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCI/KzQEIucrNAQii0c0BCIrTzQEIntbNAQin2M0BCPnA1BUY9snNARi60s0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=zEghkY4Aro6fIvGsxAC16Y_azL6DHR5e6_ku98Hkmjshi1w3oP086yI4ERX-d5vXr7ChcWf-mxEKIFIr5UnDUGohBbY9ZqvmOh4lroINW-ropDodwq8l2zxQcm_YBG958LFng7OdQxlIxtO0mTQu8Zj1meXJktY7BbLyz09fvhmie-tTlF1GIDVGig
                                                        2024-10-01 20:16:14 UTC1406OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 31 33 37 37 31 39 30 37 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727813771907",null,null,null
                                                        2024-10-01 20:16:14 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Tue, 01 Oct 2024 20:16:14 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-01 20:16:14 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-01 20:16:14 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        17192.168.2.449791216.58.212.1424437572C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-01 20:16:43 UTC1337OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1143
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCI/KzQEIucrNAQii0c0BCIrTzQEIntbNAQin2M0BCPnA1BUY9snNARi60s0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=zEghkY4Aro6fIvGsxAC16Y_azL6DHR5e6_ku98Hkmjshi1w3oP086yI4ERX-d5vXr7ChcWf-mxEKIFIr5UnDUGohBbY9ZqvmOh4lroINW-ropDodwq8l2zxQcm_YBG958LFng7OdQxlIxtO0mTQu8Zj1meXJktY7BbLyz09fvhmie-tTlF1GIDVGig
                                                        2024-10-01 20:16:43 UTC1143OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 31 33 38 30 32 32 32 31 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727813802221",null,null,null
                                                        2024-10-01 20:16:43 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Tue, 01 Oct 2024 20:16:43 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-01 20:16:43 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-01 20:16:43 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        18192.168.2.449792216.58.212.1424437572C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-01 20:16:43 UTC1337OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1302
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCI/KzQEIucrNAQii0c0BCIrTzQEIntbNAQin2M0BCPnA1BUY9snNARi60s0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=zEghkY4Aro6fIvGsxAC16Y_azL6DHR5e6_ku98Hkmjshi1w3oP086yI4ERX-d5vXr7ChcWf-mxEKIFIr5UnDUGohBbY9ZqvmOh4lroINW-ropDodwq8l2zxQcm_YBG958LFng7OdQxlIxtO0mTQu8Zj1meXJktY7BbLyz09fvhmie-tTlF1GIDVGig
                                                        2024-10-01 20:16:43 UTC1302OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 31 33 38 30 32 33 33 32 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727813802332",null,null,null
                                                        2024-10-01 20:16:44 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Tue, 01 Oct 2024 20:16:43 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-01 20:16:44 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-01 20:16:44 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:16:14:56
                                                        Start date:01/10/2024
                                                        Path:C:\Users\user\Desktop\file.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\file.exe"
                                                        Imagebase:0x790000
                                                        File size:918'016 bytes
                                                        MD5 hash:AB7BEA5CB100AB7ACDCF97AE6D034994
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:1
                                                        Start time:16:14:56
                                                        Start date:01/10/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecovery
                                                        Imagebase:0x7ff76e190000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:3
                                                        Start time:16:14:57
                                                        Start date:01/10/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1944,i,8332916453357013908,15687979653280633989,262144 --disable-features=CrashRecovery /prefetch:8
                                                        Imagebase:0x7ff76e190000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:4
                                                        Start time:16:15:09
                                                        Start date:01/10/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5268 --field-trial-handle=1944,i,8332916453357013908,15687979653280633989,262144 --disable-features=CrashRecovery /prefetch:8
                                                        Imagebase:0x7ff76e190000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:5
                                                        Start time:16:15:09
                                                        Start date:01/10/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 --field-trial-handle=1944,i,8332916453357013908,15687979653280633989,262144 --disable-features=CrashRecovery /prefetch:8
                                                        Imagebase:0x7ff76e190000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:1.9%
                                                          Dynamic/Decrypted Code Coverage:0%
                                                          Signature Coverage:4.8%
                                                          Total number of Nodes:1411
                                                          Total number of Limit Nodes:44
                                                          execution_graph 93936 7b03fb 93937 7b0407 ___scrt_is_nonwritable_in_current_image 93936->93937 93965 7afeb1 93937->93965 93939 7b040e 93940 7b0561 93939->93940 93943 7b0438 93939->93943 93995 7b083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 93940->93995 93942 7b0568 93988 7b4e52 93942->93988 93954 7b0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 93943->93954 93976 7c247d 93943->93976 93950 7b0457 93952 7b04d8 93984 7b0959 93952->93984 93954->93952 93991 7b4e1a 38 API calls 3 library calls 93954->93991 93956 7b04de 93957 7b04f3 93956->93957 93992 7b0992 GetModuleHandleW 93957->93992 93959 7b04fa 93959->93942 93960 7b04fe 93959->93960 93961 7b0507 93960->93961 93993 7b4df5 28 API calls _abort 93960->93993 93994 7b0040 13 API calls 2 library calls 93961->93994 93964 7b050f 93964->93950 93966 7afeba 93965->93966 93997 7b0698 IsProcessorFeaturePresent 93966->93997 93968 7afec6 93998 7b2c94 10 API calls 3 library calls 93968->93998 93970 7afecb 93971 7afecf 93970->93971 93999 7c2317 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 93970->93999 93971->93939 93973 7afed8 93974 7afee6 93973->93974 94000 7b2cbd 8 API calls 3 library calls 93973->94000 93974->93939 93977 7c2494 93976->93977 94001 7b0a8c 93977->94001 93979 7b0451 93979->93950 93980 7c2421 93979->93980 93983 7c2450 93980->93983 93981 7b0a8c _ValidateLocalCookies 5 API calls 93982 7c2479 93981->93982 93982->93954 93983->93981 94009 7b2340 93984->94009 93987 7b097f 93987->93956 94011 7b4bcf 93988->94011 93991->93952 93992->93959 93993->93961 93994->93964 93995->93942 93997->93968 93998->93970 93999->93973 94000->93971 94002 7b0a97 IsProcessorFeaturePresent 94001->94002 94003 7b0a95 94001->94003 94005 7b0c5d 94002->94005 94003->93979 94008 7b0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 94005->94008 94007 7b0d40 94007->93979 94008->94007 94010 7b096c GetStartupInfoW 94009->94010 94010->93987 94012 7b4bdb CallUnexpected 94011->94012 94013 7b4be2 94012->94013 94014 7b4bf4 94012->94014 94050 7b4d29 GetModuleHandleW 94013->94050 94035 7c2f5e EnterCriticalSection 94014->94035 94017 7b4be7 94017->94014 94051 7b4d6d GetModuleHandleExW 94017->94051 94018 7b4c99 94039 7b4cd9 94018->94039 94022 7b4c70 94024 7b4c88 94022->94024 94029 7c2421 _abort 5 API calls 94022->94029 94030 7c2421 _abort 5 API calls 94024->94030 94025 7b4bfb 94025->94018 94025->94022 94036 7c21a8 94025->94036 94026 7b4ce2 94059 7d1d29 5 API calls _ValidateLocalCookies 94026->94059 94027 7b4cb6 94042 7b4ce8 94027->94042 94029->94024 94030->94018 94035->94025 94060 7c1ee1 94036->94060 94086 7c2fa6 LeaveCriticalSection 94039->94086 94041 7b4cb2 94041->94026 94041->94027 94087 7c360c 94042->94087 94045 7b4d16 94048 7b4d6d _abort 8 API calls 94045->94048 94046 7b4cf6 GetPEB 94046->94045 94047 7b4d06 GetCurrentProcess TerminateProcess 94046->94047 94047->94045 94049 7b4d1e ExitProcess 94048->94049 94050->94017 94052 7b4dba 94051->94052 94053 7b4d97 GetProcAddress 94051->94053 94055 7b4dc9 94052->94055 94056 7b4dc0 FreeLibrary 94052->94056 94054 7b4dac 94053->94054 94054->94052 94057 7b0a8c _ValidateLocalCookies 5 API calls 94055->94057 94056->94055 94058 7b4bf3 94057->94058 94058->94014 94063 7c1e90 94060->94063 94062 7c1f05 94062->94022 94064 7c1e9c ___scrt_is_nonwritable_in_current_image 94063->94064 94071 7c2f5e EnterCriticalSection 94064->94071 94066 7c1eaa 94072 7c1f31 94066->94072 94070 7c1ec8 __fread_nolock 94070->94062 94071->94066 94073 7c1f51 94072->94073 94076 7c1f59 94072->94076 94074 7b0a8c _ValidateLocalCookies 5 API calls 94073->94074 94075 7c1eb7 94074->94075 94078 7c1ed5 LeaveCriticalSection _abort 94075->94078 94076->94073 94079 7c29c8 94076->94079 94078->94070 94080 7c29fc __dosmaperr 94079->94080 94081 7c29d3 RtlFreeHeap 94079->94081 94080->94073 94081->94080 94082 7c29e8 94081->94082 94085 7bf2d9 20 API calls __dosmaperr 94082->94085 94084 7c29ee GetLastError 94084->94080 94085->94084 94086->94041 94088 7c3627 94087->94088 94089 7c3631 94087->94089 94091 7b0a8c _ValidateLocalCookies 5 API calls 94088->94091 94094 7c2fd7 5 API calls 2 library calls 94089->94094 94092 7b4cf2 94091->94092 94092->94045 94092->94046 94093 7c3648 94093->94088 94094->94093 94095 791098 94100 7942de 94095->94100 94099 7910a7 94121 79a961 94100->94121 94104 794342 94115 794378 94104->94115 94138 7993b2 94104->94138 94106 79436c 94142 7937a0 94106->94142 94108 79441b GetCurrentProcess IsWow64Process 94109 794437 94108->94109 94110 79444f LoadLibraryA 94109->94110 94111 7d3824 GetSystemInfo 94109->94111 94112 79449c GetSystemInfo 94110->94112 94113 794460 GetProcAddress 94110->94113 94114 794476 94112->94114 94113->94112 94117 794470 GetNativeSystemInfo 94113->94117 94118 79447a FreeLibrary 94114->94118 94119 79109d 94114->94119 94115->94108 94116 7d37df 94115->94116 94117->94114 94118->94119 94120 7b00a3 29 API calls __onexit 94119->94120 94120->94099 94146 7afe0b 94121->94146 94123 79a976 94156 7afddb 94123->94156 94125 7942f5 GetVersionExW 94126 796b57 94125->94126 94127 7d4ba1 94126->94127 94128 796b67 _wcslen 94126->94128 94129 7993b2 22 API calls 94127->94129 94131 796b7d 94128->94131 94132 796ba2 94128->94132 94130 7d4baa 94129->94130 94130->94130 94181 796f34 22 API calls 94131->94181 94134 7afddb 22 API calls 94132->94134 94135 796bae 94134->94135 94137 7afe0b 22 API calls 94135->94137 94136 796b85 __fread_nolock 94136->94104 94137->94136 94139 7993c0 94138->94139 94140 7993c9 __fread_nolock 94138->94140 94139->94140 94182 79aec9 94139->94182 94140->94106 94140->94140 94143 7937ae 94142->94143 94144 7993b2 22 API calls 94143->94144 94145 7937c2 94144->94145 94145->94115 94148 7afddb 94146->94148 94149 7afdfa 94148->94149 94152 7afdfc 94148->94152 94166 7bea0c 94148->94166 94173 7b4ead 7 API calls 2 library calls 94148->94173 94149->94123 94151 7b066d 94175 7b32a4 RaiseException 94151->94175 94152->94151 94174 7b32a4 RaiseException 94152->94174 94155 7b068a 94155->94123 94159 7afde0 94156->94159 94157 7bea0c ___std_exception_copy 21 API calls 94157->94159 94158 7afdfa 94158->94125 94159->94157 94159->94158 94161 7afdfc 94159->94161 94178 7b4ead 7 API calls 2 library calls 94159->94178 94162 7b066d 94161->94162 94179 7b32a4 RaiseException 94161->94179 94180 7b32a4 RaiseException 94162->94180 94165 7b068a 94165->94125 94171 7c3820 __dosmaperr 94166->94171 94167 7c385e 94177 7bf2d9 20 API calls __dosmaperr 94167->94177 94169 7c3849 RtlAllocateHeap 94170 7c385c 94169->94170 94169->94171 94170->94148 94171->94167 94171->94169 94176 7b4ead 7 API calls 2 library calls 94171->94176 94173->94148 94174->94151 94175->94155 94176->94171 94177->94170 94178->94159 94179->94162 94180->94165 94181->94136 94183 79aed9 __fread_nolock 94182->94183 94184 79aedc 94182->94184 94183->94140 94185 7afddb 22 API calls 94184->94185 94186 79aee7 94185->94186 94187 7afe0b 22 API calls 94186->94187 94187->94183 94188 79105b 94193 79344d 94188->94193 94190 79106a 94224 7b00a3 29 API calls __onexit 94190->94224 94192 791074 94194 79345d __wsopen_s 94193->94194 94195 79a961 22 API calls 94194->94195 94196 793513 94195->94196 94225 793a5a 94196->94225 94198 79351c 94232 793357 94198->94232 94205 79a961 22 API calls 94206 79354d 94205->94206 94253 79a6c3 94206->94253 94209 7d3176 RegQueryValueExW 94210 7d320c RegCloseKey 94209->94210 94211 7d3193 94209->94211 94213 793578 94210->94213 94223 7d321e _wcslen 94210->94223 94212 7afe0b 22 API calls 94211->94212 94214 7d31ac 94212->94214 94213->94190 94259 795722 94214->94259 94217 7d31d4 94218 796b57 22 API calls 94217->94218 94220 7d31ee messages 94218->94220 94219 794c6d 22 API calls 94219->94223 94220->94210 94222 79515f 22 API calls 94222->94223 94223->94213 94223->94219 94223->94222 94262 799cb3 94223->94262 94224->94192 94268 7d1f50 94225->94268 94228 799cb3 22 API calls 94229 793a8d 94228->94229 94270 793aa2 94229->94270 94231 793a97 94231->94198 94233 7d1f50 __wsopen_s 94232->94233 94234 793364 GetFullPathNameW 94233->94234 94235 793386 94234->94235 94236 796b57 22 API calls 94235->94236 94237 7933a4 94236->94237 94238 7933c6 94237->94238 94239 7933dd 94238->94239 94240 7d30bb 94238->94240 94280 7933ee 94239->94280 94242 7afddb 22 API calls 94240->94242 94244 7d30c5 _wcslen 94242->94244 94243 7933e8 94247 79515f 94243->94247 94245 7afe0b 22 API calls 94244->94245 94246 7d30fe __fread_nolock 94245->94246 94248 79516e 94247->94248 94252 79518f __fread_nolock 94247->94252 94250 7afe0b 22 API calls 94248->94250 94249 7afddb 22 API calls 94251 793544 94249->94251 94250->94252 94251->94205 94252->94249 94254 79a6dd 94253->94254 94258 793556 RegOpenKeyExW 94253->94258 94255 7afddb 22 API calls 94254->94255 94256 79a6e7 94255->94256 94257 7afe0b 22 API calls 94256->94257 94257->94258 94258->94209 94258->94213 94260 7afddb 22 API calls 94259->94260 94261 795734 RegQueryValueExW 94260->94261 94261->94217 94261->94220 94263 799cc2 _wcslen 94262->94263 94264 7afe0b 22 API calls 94263->94264 94265 799cea __fread_nolock 94264->94265 94266 7afddb 22 API calls 94265->94266 94267 799d00 94266->94267 94267->94223 94269 793a67 GetModuleFileNameW 94268->94269 94269->94228 94271 7d1f50 __wsopen_s 94270->94271 94272 793aaf GetFullPathNameW 94271->94272 94273 793ae9 94272->94273 94274 793ace 94272->94274 94276 79a6c3 22 API calls 94273->94276 94275 796b57 22 API calls 94274->94275 94277 793ada 94275->94277 94276->94277 94278 7937a0 22 API calls 94277->94278 94279 793ae6 94278->94279 94279->94231 94281 7933fe _wcslen 94280->94281 94282 7d311d 94281->94282 94283 793411 94281->94283 94285 7afddb 22 API calls 94282->94285 94290 79a587 94283->94290 94287 7d3127 94285->94287 94286 79341e __fread_nolock 94286->94243 94288 7afe0b 22 API calls 94287->94288 94289 7d3157 __fread_nolock 94288->94289 94291 79a59d 94290->94291 94294 79a598 __fread_nolock 94290->94294 94292 7df80f 94291->94292 94293 7afe0b 22 API calls 94291->94293 94293->94294 94294->94286 94295 79f7bf 94296 79f7d3 94295->94296 94297 79fcb6 94295->94297 94298 79fcc2 94296->94298 94300 7afddb 22 API calls 94296->94300 94386 79aceb 23 API calls messages 94297->94386 94387 79aceb 23 API calls messages 94298->94387 94302 79f7e5 94300->94302 94302->94298 94303 79f83e 94302->94303 94304 79fd3d 94302->94304 94328 79ed9d messages 94303->94328 94330 7a1310 94303->94330 94388 801155 22 API calls 94304->94388 94307 79fef7 94307->94328 94390 79a8c7 22 API calls __fread_nolock 94307->94390 94309 7afddb 22 API calls 94326 79ec76 messages 94309->94326 94311 7e4b0b 94392 80359c 82 API calls __wsopen_s 94311->94392 94312 79a8c7 22 API calls 94312->94326 94313 7e4600 94313->94328 94389 79a8c7 22 API calls __fread_nolock 94313->94389 94319 79fbe3 94321 7e4bdc 94319->94321 94319->94328 94329 79f3ae messages 94319->94329 94320 79a961 22 API calls 94320->94326 94393 80359c 82 API calls __wsopen_s 94321->94393 94322 7b0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 94322->94326 94324 7e4beb 94394 80359c 82 API calls __wsopen_s 94324->94394 94325 7b00a3 29 API calls pre_c_initialization 94325->94326 94326->94307 94326->94309 94326->94311 94326->94312 94326->94313 94326->94319 94326->94320 94326->94322 94326->94324 94326->94325 94327 7b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 94326->94327 94326->94328 94326->94329 94384 7a01e0 346 API calls 2 library calls 94326->94384 94385 7a06a0 41 API calls messages 94326->94385 94327->94326 94329->94328 94391 80359c 82 API calls __wsopen_s 94329->94391 94331 7a17b0 94330->94331 94332 7a1376 94330->94332 94443 7b0242 5 API calls __Init_thread_wait 94331->94443 94333 7a1390 94332->94333 94334 7e6331 94332->94334 94395 7a1940 94333->94395 94448 81709c 346 API calls 94334->94448 94338 7a17ba 94341 7a17fb 94338->94341 94343 799cb3 22 API calls 94338->94343 94340 7e633d 94340->94326 94345 7e6346 94341->94345 94347 7a182c 94341->94347 94342 7a1940 9 API calls 94344 7a13b6 94342->94344 94351 7a17d4 94343->94351 94344->94341 94346 7a13ec 94344->94346 94449 80359c 82 API calls __wsopen_s 94345->94449 94346->94345 94370 7a1408 __fread_nolock 94346->94370 94445 79aceb 23 API calls messages 94347->94445 94350 7a1839 94446 7ad217 346 API calls 94350->94446 94444 7b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 94351->94444 94354 7e636e 94450 80359c 82 API calls __wsopen_s 94354->94450 94356 7a152f 94357 7a153c 94356->94357 94358 7e63d1 94356->94358 94359 7a1940 9 API calls 94357->94359 94452 815745 54 API calls _wcslen 94358->94452 94361 7a1549 94359->94361 94365 7e64fa 94361->94365 94367 7a1940 9 API calls 94361->94367 94362 7afddb 22 API calls 94362->94370 94363 7a1872 94447 7afaeb 23 API calls 94363->94447 94364 7afe0b 22 API calls 94364->94370 94374 7e6369 94365->94374 94454 80359c 82 API calls __wsopen_s 94365->94454 94372 7a1563 94367->94372 94370->94350 94370->94354 94370->94356 94370->94362 94370->94364 94371 7e63b2 94370->94371 94370->94374 94418 79ec40 94370->94418 94451 80359c 82 API calls __wsopen_s 94371->94451 94372->94365 94377 7a15c7 messages 94372->94377 94453 79a8c7 22 API calls __fread_nolock 94372->94453 94374->94326 94376 7a1940 9 API calls 94376->94377 94377->94363 94377->94365 94377->94374 94377->94376 94379 7a167b messages 94377->94379 94405 81ab67 94377->94405 94408 81a2ea 94377->94408 94413 805c5a 94377->94413 94378 7a171d 94378->94326 94379->94378 94442 7ace17 22 API calls messages 94379->94442 94384->94326 94385->94326 94386->94298 94387->94304 94388->94328 94389->94328 94390->94328 94391->94328 94392->94328 94393->94324 94394->94328 94396 7a1981 94395->94396 94404 7a195d 94395->94404 94455 7b0242 5 API calls __Init_thread_wait 94396->94455 94397 7a13a0 94397->94342 94399 7a198b 94399->94404 94456 7b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 94399->94456 94401 7a8727 94401->94397 94458 7b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 94401->94458 94404->94397 94457 7b0242 5 API calls __Init_thread_wait 94404->94457 94459 81aff9 94405->94459 94409 797510 53 API calls 94408->94409 94410 81a306 94409->94410 94599 7fd4dc CreateToolhelp32Snapshot Process32FirstW 94410->94599 94412 81a315 94412->94377 94414 797510 53 API calls 94413->94414 94415 805c6d 94414->94415 94620 7fdbbe lstrlenW 94415->94620 94417 805c77 94417->94377 94421 79ec76 messages 94418->94421 94419 7b0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 94419->94421 94420 7afddb 22 API calls 94420->94421 94421->94419 94421->94420 94422 7b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 94421->94422 94423 7e4beb 94421->94423 94424 79ed9d messages 94421->94424 94425 79fef7 94421->94425 94428 7e4b0b 94421->94428 94429 79a8c7 22 API calls 94421->94429 94432 7e4600 94421->94432 94436 79fbe3 94421->94436 94437 79a961 22 API calls 94421->94437 94439 7b00a3 29 API calls pre_c_initialization 94421->94439 94441 79f3ae messages 94421->94441 94625 7a01e0 346 API calls 2 library calls 94421->94625 94626 7a06a0 41 API calls messages 94421->94626 94422->94421 94632 80359c 82 API calls __wsopen_s 94423->94632 94424->94370 94425->94424 94628 79a8c7 22 API calls __fread_nolock 94425->94628 94630 80359c 82 API calls __wsopen_s 94428->94630 94429->94421 94432->94424 94627 79a8c7 22 API calls __fread_nolock 94432->94627 94436->94424 94438 7e4bdc 94436->94438 94436->94441 94437->94421 94631 80359c 82 API calls __wsopen_s 94438->94631 94439->94421 94441->94424 94629 80359c 82 API calls __wsopen_s 94441->94629 94442->94379 94443->94338 94444->94341 94445->94350 94446->94363 94447->94363 94448->94340 94449->94374 94450->94374 94451->94374 94452->94372 94453->94377 94454->94374 94455->94399 94456->94404 94457->94401 94458->94397 94460 81b01d ___scrt_fastfail 94459->94460 94461 81b094 94460->94461 94462 81b058 94460->94462 94467 81b08b 94461->94467 94580 79b567 39 API calls 94461->94580 94577 79b567 39 API calls 94462->94577 94464 81b063 94464->94467 94578 79b567 39 API calls 94464->94578 94465 81b0ed 94550 797510 94465->94550 94467->94465 94582 79b567 39 API calls 94467->94582 94469 81b0a5 94581 79b567 39 API calls 94469->94581 94474 81b078 94579 79b567 39 API calls 94474->94579 94477 81b115 94478 81b1d8 94477->94478 94479 81b11f 94477->94479 94481 81b20a GetCurrentDirectoryW 94478->94481 94484 797510 53 API calls 94478->94484 94480 797510 53 API calls 94479->94480 94482 81b130 94480->94482 94483 7afe0b 22 API calls 94481->94483 94485 797620 22 API calls 94482->94485 94486 81b22f GetCurrentDirectoryW 94483->94486 94487 81b1ef 94484->94487 94488 81b13a 94485->94488 94489 81b23c 94486->94489 94490 797620 22 API calls 94487->94490 94491 797510 53 API calls 94488->94491 94494 81b275 94489->94494 94583 799c6e 22 API calls 94489->94583 94492 81b1f9 _wcslen 94490->94492 94493 81b14b 94491->94493 94492->94481 94492->94494 94495 797620 22 API calls 94493->94495 94501 81b287 94494->94501 94502 81b28b 94494->94502 94497 81b155 94495->94497 94499 797510 53 API calls 94497->94499 94498 81b255 94584 799c6e 22 API calls 94498->94584 94504 81b166 94499->94504 94507 81b2f8 94501->94507 94508 81b39a CreateProcessW 94501->94508 94586 8007c0 10 API calls 94502->94586 94509 797620 22 API calls 94504->94509 94505 81b265 94585 799c6e 22 API calls 94505->94585 94506 81b294 94587 8006e6 10 API calls 94506->94587 94589 7f11c8 39 API calls 94507->94589 94549 81b32f _wcslen 94508->94549 94513 81b170 94509->94513 94516 81b1a6 GetSystemDirectoryW 94513->94516 94521 797510 53 API calls 94513->94521 94514 81b2aa 94588 8005a7 8 API calls 94514->94588 94515 81b2fd 94519 81b323 94515->94519 94520 81b32a 94515->94520 94518 7afe0b 22 API calls 94516->94518 94523 81b1cb GetSystemDirectoryW 94518->94523 94590 7f1201 128 API calls 2 library calls 94519->94590 94591 7f14ce 6 API calls 94520->94591 94525 81b187 94521->94525 94522 81b2d0 94522->94501 94523->94489 94528 797620 22 API calls 94525->94528 94527 81b328 94527->94549 94529 81b191 _wcslen 94528->94529 94529->94489 94529->94516 94530 81b3d6 GetLastError 94539 81b41a 94530->94539 94531 81b42f CloseHandle 94532 81b43f 94531->94532 94540 81b49a 94531->94540 94533 81b451 94532->94533 94534 81b446 CloseHandle 94532->94534 94537 81b463 94533->94537 94538 81b458 CloseHandle 94533->94538 94534->94533 94536 81b4a6 94536->94539 94541 81b475 94537->94541 94542 81b46a CloseHandle 94537->94542 94538->94537 94594 800175 6 API calls 94539->94594 94540->94536 94545 81b4d2 CloseHandle 94540->94545 94592 8009d9 34 API calls 94541->94592 94542->94541 94545->94539 94546 81ab79 94546->94377 94547 81b486 94593 81b536 25 API calls 94547->94593 94549->94530 94549->94531 94551 797522 94550->94551 94552 797525 94550->94552 94573 797620 94551->94573 94553 79755b 94552->94553 94554 79752d 94552->94554 94555 7d50f6 94553->94555 94557 79756d 94553->94557 94564 7d500f 94553->94564 94595 7b51c6 26 API calls 94554->94595 94598 7b5183 26 API calls 94555->94598 94596 7afb21 51 API calls 94557->94596 94558 79753d 94563 7afddb 22 API calls 94558->94563 94561 7d510e 94561->94561 94565 797547 94563->94565 94567 7afe0b 22 API calls 94564->94567 94572 7d5088 94564->94572 94566 799cb3 22 API calls 94565->94566 94566->94551 94568 7d5058 94567->94568 94569 7afddb 22 API calls 94568->94569 94570 7d507f 94569->94570 94571 799cb3 22 API calls 94570->94571 94571->94572 94597 7afb21 51 API calls 94572->94597 94574 79762a _wcslen 94573->94574 94575 7afe0b 22 API calls 94574->94575 94576 79763f 94575->94576 94576->94477 94577->94464 94578->94474 94579->94467 94580->94469 94581->94467 94582->94465 94583->94498 94584->94505 94585->94494 94586->94506 94587->94514 94588->94522 94589->94515 94590->94527 94591->94549 94592->94547 94593->94540 94594->94546 94595->94558 94596->94558 94597->94555 94598->94561 94609 7fdef7 94599->94609 94601 7fd522 94602 7fd5db CloseHandle 94601->94602 94603 7fd529 Process32NextW 94601->94603 94604 79a961 22 API calls 94601->94604 94605 799cb3 22 API calls 94601->94605 94615 79525f 22 API calls 94601->94615 94616 796350 22 API calls 94601->94616 94617 7ace60 41 API calls 94601->94617 94602->94412 94603->94601 94603->94602 94604->94601 94605->94601 94610 7fdf02 94609->94610 94611 7fdf19 94610->94611 94614 7fdf1f 94610->94614 94618 7b63b2 GetStringTypeW _strftime 94610->94618 94619 7b62fb 39 API calls 94611->94619 94614->94601 94615->94601 94616->94601 94617->94601 94618->94610 94619->94614 94621 7fdbdc GetFileAttributesW 94620->94621 94622 7fdc06 94620->94622 94621->94622 94623 7fdbe8 FindFirstFileW 94621->94623 94622->94417 94623->94622 94624 7fdbf9 FindClose 94623->94624 94624->94622 94625->94421 94626->94421 94627->94424 94628->94424 94629->94424 94630->94424 94631->94423 94632->94424 94633 791033 94638 794c91 94633->94638 94637 791042 94639 79a961 22 API calls 94638->94639 94640 794cff 94639->94640 94646 793af0 94640->94646 94642 794d9c 94644 791038 94642->94644 94649 7951f7 22 API calls __fread_nolock 94642->94649 94645 7b00a3 29 API calls __onexit 94644->94645 94645->94637 94650 793b1c 94646->94650 94649->94642 94651 793b0f 94650->94651 94652 793b29 94650->94652 94651->94642 94652->94651 94653 793b30 RegOpenKeyExW 94652->94653 94653->94651 94654 793b4a RegQueryValueExW 94653->94654 94655 793b80 RegCloseKey 94654->94655 94656 793b6b 94654->94656 94655->94651 94656->94655 94657 792e37 94658 79a961 22 API calls 94657->94658 94659 792e4d 94658->94659 94736 794ae3 94659->94736 94661 792e6b 94662 793a5a 24 API calls 94661->94662 94663 792e7f 94662->94663 94664 799cb3 22 API calls 94663->94664 94665 792e8c 94664->94665 94750 794ecb 94665->94750 94668 792ead 94772 79a8c7 22 API calls __fread_nolock 94668->94772 94669 7d2cb0 94790 802cf9 94669->94790 94671 7d2cc3 94673 7d2ccf 94671->94673 94816 794f39 94671->94816 94677 794f39 68 API calls 94673->94677 94675 792ec3 94773 796f88 22 API calls 94675->94773 94679 7d2ce5 94677->94679 94678 792ecf 94680 799cb3 22 API calls 94678->94680 94822 793084 22 API calls 94679->94822 94681 792edc 94680->94681 94774 79a81b 41 API calls 94681->94774 94684 792eec 94686 799cb3 22 API calls 94684->94686 94685 7d2d02 94823 793084 22 API calls 94685->94823 94687 792f12 94686->94687 94775 79a81b 41 API calls 94687->94775 94690 7d2d1e 94691 793a5a 24 API calls 94690->94691 94692 7d2d44 94691->94692 94824 793084 22 API calls 94692->94824 94693 792f21 94696 79a961 22 API calls 94693->94696 94695 7d2d50 94825 79a8c7 22 API calls __fread_nolock 94695->94825 94698 792f3f 94696->94698 94776 793084 22 API calls 94698->94776 94699 7d2d5e 94826 793084 22 API calls 94699->94826 94702 792f4b 94777 7b4a28 40 API calls 2 library calls 94702->94777 94703 7d2d6d 94827 79a8c7 22 API calls __fread_nolock 94703->94827 94705 792f59 94705->94679 94706 792f63 94705->94706 94778 7b4a28 40 API calls 2 library calls 94706->94778 94709 792f6e 94709->94685 94711 792f78 94709->94711 94710 7d2d83 94828 793084 22 API calls 94710->94828 94779 7b4a28 40 API calls 2 library calls 94711->94779 94714 7d2d90 94715 792f83 94715->94690 94716 792f8d 94715->94716 94780 7b4a28 40 API calls 2 library calls 94716->94780 94718 792f98 94719 792fdc 94718->94719 94781 793084 22 API calls 94718->94781 94719->94703 94720 792fe8 94719->94720 94720->94714 94784 7963eb 22 API calls 94720->94784 94723 792fbf 94782 79a8c7 22 API calls __fread_nolock 94723->94782 94724 792ff8 94785 796a50 22 API calls 94724->94785 94727 792fcd 94783 793084 22 API calls 94727->94783 94729 793006 94786 7970b0 23 API calls 94729->94786 94731 793021 94734 793065 94731->94734 94787 796f88 22 API calls 94731->94787 94788 7970b0 23 API calls 94731->94788 94789 793084 22 API calls 94731->94789 94737 794af0 __wsopen_s 94736->94737 94738 796b57 22 API calls 94737->94738 94739 794b22 94737->94739 94738->94739 94749 794b58 94739->94749 94829 794c6d 94739->94829 94741 799cb3 22 API calls 94743 794c52 94741->94743 94742 799cb3 22 API calls 94742->94749 94744 79515f 22 API calls 94743->94744 94747 794c5e 94744->94747 94745 794c6d 22 API calls 94745->94749 94746 79515f 22 API calls 94746->94749 94747->94661 94748 794c29 94748->94741 94748->94747 94749->94742 94749->94745 94749->94746 94749->94748 94832 794e90 LoadLibraryA 94750->94832 94755 7d3ccf 94758 794f39 68 API calls 94755->94758 94756 794ef6 LoadLibraryExW 94840 794e59 LoadLibraryA 94756->94840 94760 7d3cd6 94758->94760 94762 794e59 3 API calls 94760->94762 94764 7d3cde 94762->94764 94763 794f20 94763->94764 94765 794f2c 94763->94765 94862 7950f5 94764->94862 94767 794f39 68 API calls 94765->94767 94769 792ea5 94767->94769 94769->94668 94769->94669 94771 7d3d05 94772->94675 94773->94678 94774->94684 94775->94693 94776->94702 94777->94705 94778->94709 94779->94715 94780->94718 94781->94723 94782->94727 94783->94719 94784->94724 94785->94729 94786->94731 94787->94731 94788->94731 94789->94731 94791 802d15 94790->94791 94792 79511f 64 API calls 94791->94792 94793 802d29 94792->94793 94995 802e66 94793->94995 94796 7950f5 40 API calls 94797 802d56 94796->94797 94798 7950f5 40 API calls 94797->94798 94799 802d66 94798->94799 94800 7950f5 40 API calls 94799->94800 94801 802d81 94800->94801 94802 7950f5 40 API calls 94801->94802 94803 802d9c 94802->94803 94804 79511f 64 API calls 94803->94804 94805 802db3 94804->94805 94806 7bea0c ___std_exception_copy 21 API calls 94805->94806 94807 802dba 94806->94807 94808 7bea0c ___std_exception_copy 21 API calls 94807->94808 94809 802dc4 94808->94809 94810 7950f5 40 API calls 94809->94810 94811 802dd8 94810->94811 94812 8028fe 27 API calls 94811->94812 94813 802dee 94812->94813 94814 802d3f 94813->94814 95001 8022ce 79 API calls 94813->95001 94814->94671 94817 794f43 94816->94817 94819 794f4a 94816->94819 95002 7be678 94817->95002 94820 794f59 94819->94820 94821 794f6a FreeLibrary 94819->94821 94820->94673 94821->94820 94822->94685 94823->94690 94824->94695 94825->94699 94826->94703 94827->94710 94828->94714 94830 79aec9 22 API calls 94829->94830 94831 794c78 94830->94831 94831->94739 94833 794ea8 GetProcAddress 94832->94833 94834 794ec6 94832->94834 94835 794eb8 94833->94835 94837 7be5eb 94834->94837 94835->94834 94836 794ebf FreeLibrary 94835->94836 94836->94834 94870 7be52a 94837->94870 94839 794eea 94839->94755 94839->94756 94841 794e8d 94840->94841 94842 794e6e GetProcAddress 94840->94842 94845 794f80 94841->94845 94843 794e7e 94842->94843 94843->94841 94844 794e86 FreeLibrary 94843->94844 94844->94841 94846 7afe0b 22 API calls 94845->94846 94847 794f95 94846->94847 94848 795722 22 API calls 94847->94848 94849 794fa1 __fread_nolock 94848->94849 94850 7d3d1d 94849->94850 94851 7950a5 94849->94851 94861 794fdc 94849->94861 94935 80304d 74 API calls 94850->94935 94924 7942a2 CreateStreamOnHGlobal 94851->94924 94854 7d3d22 94856 79511f 64 API calls 94854->94856 94855 7950f5 40 API calls 94855->94861 94857 7d3d45 94856->94857 94858 7950f5 40 API calls 94857->94858 94860 79506e messages 94858->94860 94860->94763 94861->94854 94861->94855 94861->94860 94930 79511f 94861->94930 94863 7d3d70 94862->94863 94864 795107 94862->94864 94957 7be8c4 94864->94957 94867 8028fe 94978 80274e 94867->94978 94869 802919 94869->94771 94873 7be536 ___scrt_is_nonwritable_in_current_image 94870->94873 94871 7be544 94895 7bf2d9 20 API calls __dosmaperr 94871->94895 94873->94871 94875 7be574 94873->94875 94874 7be549 94896 7c27ec 26 API calls _strftime 94874->94896 94877 7be579 94875->94877 94878 7be586 94875->94878 94897 7bf2d9 20 API calls __dosmaperr 94877->94897 94887 7c8061 94878->94887 94881 7be58f 94882 7be595 94881->94882 94885 7be5a2 94881->94885 94898 7bf2d9 20 API calls __dosmaperr 94882->94898 94883 7be554 __fread_nolock 94883->94839 94899 7be5d4 LeaveCriticalSection __fread_nolock 94885->94899 94888 7c806d ___scrt_is_nonwritable_in_current_image 94887->94888 94900 7c2f5e EnterCriticalSection 94888->94900 94890 7c807b 94901 7c80fb 94890->94901 94894 7c80ac __fread_nolock 94894->94881 94895->94874 94896->94883 94897->94883 94898->94883 94899->94883 94900->94890 94909 7c811e 94901->94909 94902 7c8177 94920 7c4c7d 20 API calls __dosmaperr 94902->94920 94904 7c8180 94906 7c29c8 _free 20 API calls 94904->94906 94907 7c8189 94906->94907 94910 7c8088 94907->94910 94921 7c3405 11 API calls 2 library calls 94907->94921 94909->94902 94909->94910 94918 7b918d EnterCriticalSection 94909->94918 94919 7b91a1 LeaveCriticalSection 94909->94919 94915 7c80b7 94910->94915 94912 7c81a8 94922 7b918d EnterCriticalSection 94912->94922 94914 7c81bb 94914->94910 94923 7c2fa6 LeaveCriticalSection 94915->94923 94917 7c80be 94917->94894 94918->94909 94919->94909 94920->94904 94921->94912 94922->94914 94923->94917 94925 7942bc FindResourceExW 94924->94925 94929 7942d9 94924->94929 94926 7d35ba LoadResource 94925->94926 94925->94929 94927 7d35cf SizeofResource 94926->94927 94926->94929 94928 7d35e3 LockResource 94927->94928 94927->94929 94928->94929 94929->94861 94931 79512e 94930->94931 94932 7d3d90 94930->94932 94936 7bece3 94931->94936 94935->94854 94939 7beaaa 94936->94939 94938 79513c 94938->94861 94941 7beab6 ___scrt_is_nonwritable_in_current_image 94939->94941 94940 7beac2 94952 7bf2d9 20 API calls __dosmaperr 94940->94952 94941->94940 94943 7beae8 94941->94943 94954 7b918d EnterCriticalSection 94943->94954 94945 7beac7 94953 7c27ec 26 API calls _strftime 94945->94953 94946 7beaf4 94955 7bec0a 62 API calls 2 library calls 94946->94955 94949 7beb08 94956 7beb27 LeaveCriticalSection __fread_nolock 94949->94956 94951 7bead2 __fread_nolock 94951->94938 94952->94945 94953->94951 94954->94946 94955->94949 94956->94951 94960 7be8e1 94957->94960 94959 795118 94959->94867 94961 7be8ed ___scrt_is_nonwritable_in_current_image 94960->94961 94962 7be92d 94961->94962 94963 7be900 ___scrt_fastfail 94961->94963 94964 7be925 __fread_nolock 94961->94964 94975 7b918d EnterCriticalSection 94962->94975 94973 7bf2d9 20 API calls __dosmaperr 94963->94973 94964->94959 94966 7be937 94976 7be6f8 38 API calls 4 library calls 94966->94976 94969 7be91a 94974 7c27ec 26 API calls _strftime 94969->94974 94970 7be94e 94977 7be96c LeaveCriticalSection __fread_nolock 94970->94977 94973->94969 94974->94964 94975->94966 94976->94970 94977->94964 94981 7be4e8 94978->94981 94980 80275d 94980->94869 94984 7be469 94981->94984 94983 7be505 94983->94980 94985 7be478 94984->94985 94986 7be48c 94984->94986 94992 7bf2d9 20 API calls __dosmaperr 94985->94992 94991 7be488 __alldvrm 94986->94991 94994 7c333f 11 API calls 2 library calls 94986->94994 94988 7be47d 94993 7c27ec 26 API calls _strftime 94988->94993 94991->94983 94992->94988 94993->94991 94994->94991 94996 802e7a 94995->94996 94997 7950f5 40 API calls 94996->94997 94998 802d3b 94996->94998 94999 8028fe 27 API calls 94996->94999 95000 79511f 64 API calls 94996->95000 94997->94996 94998->94796 94998->94814 94999->94996 95000->94996 95001->94814 95003 7be684 ___scrt_is_nonwritable_in_current_image 95002->95003 95004 7be6aa 95003->95004 95005 7be695 95003->95005 95013 7be6a5 __fread_nolock 95004->95013 95015 7b918d EnterCriticalSection 95004->95015 95032 7bf2d9 20 API calls __dosmaperr 95005->95032 95007 7be69a 95033 7c27ec 26 API calls _strftime 95007->95033 95010 7be6c6 95016 7be602 95010->95016 95012 7be6d1 95034 7be6ee LeaveCriticalSection __fread_nolock 95012->95034 95013->94819 95015->95010 95017 7be60f 95016->95017 95018 7be624 95016->95018 95067 7bf2d9 20 API calls __dosmaperr 95017->95067 95024 7be61f 95018->95024 95035 7bdc0b 95018->95035 95020 7be614 95068 7c27ec 26 API calls _strftime 95020->95068 95024->95012 95028 7be646 95052 7c862f 95028->95052 95031 7c29c8 _free 20 API calls 95031->95024 95032->95007 95033->95013 95034->95013 95036 7bdc23 95035->95036 95040 7bdc1f 95035->95040 95037 7bd955 __fread_nolock 26 API calls 95036->95037 95036->95040 95038 7bdc43 95037->95038 95069 7c59be 62 API calls 5 library calls 95038->95069 95041 7c4d7a 95040->95041 95042 7c4d90 95041->95042 95044 7be640 95041->95044 95043 7c29c8 _free 20 API calls 95042->95043 95042->95044 95043->95044 95045 7bd955 95044->95045 95046 7bd961 95045->95046 95047 7bd976 95045->95047 95070 7bf2d9 20 API calls __dosmaperr 95046->95070 95047->95028 95049 7bd966 95071 7c27ec 26 API calls _strftime 95049->95071 95051 7bd971 95051->95028 95053 7c863e 95052->95053 95054 7c8653 95052->95054 95075 7bf2c6 20 API calls __dosmaperr 95053->95075 95056 7c868e 95054->95056 95060 7c867a 95054->95060 95077 7bf2c6 20 API calls __dosmaperr 95056->95077 95057 7c8643 95076 7bf2d9 20 API calls __dosmaperr 95057->95076 95072 7c8607 95060->95072 95061 7c8693 95078 7bf2d9 20 API calls __dosmaperr 95061->95078 95064 7c869b 95079 7c27ec 26 API calls _strftime 95064->95079 95065 7be64c 95065->95024 95065->95031 95067->95020 95068->95024 95069->95040 95070->95049 95071->95051 95080 7c8585 95072->95080 95074 7c862b 95074->95065 95075->95057 95076->95065 95077->95061 95078->95064 95079->95065 95081 7c8591 ___scrt_is_nonwritable_in_current_image 95080->95081 95091 7c5147 EnterCriticalSection 95081->95091 95083 7c859f 95084 7c85c6 95083->95084 95085 7c85d1 95083->95085 95092 7c86ae 95084->95092 95107 7bf2d9 20 API calls __dosmaperr 95085->95107 95088 7c85cc 95108 7c85fb LeaveCriticalSection __wsopen_s 95088->95108 95090 7c85ee __fread_nolock 95090->95074 95091->95083 95109 7c53c4 95092->95109 95094 7c86c4 95122 7c5333 21 API calls 2 library calls 95094->95122 95095 7c86be 95095->95094 95097 7c86f6 95095->95097 95099 7c53c4 __wsopen_s 26 API calls 95095->95099 95097->95094 95100 7c53c4 __wsopen_s 26 API calls 95097->95100 95098 7c871c 95102 7c873e 95098->95102 95123 7bf2a3 20 API calls __dosmaperr 95098->95123 95103 7c86ed 95099->95103 95101 7c8702 CloseHandle 95100->95101 95101->95094 95104 7c870e GetLastError 95101->95104 95102->95088 95106 7c53c4 __wsopen_s 26 API calls 95103->95106 95104->95094 95106->95097 95107->95088 95108->95090 95110 7c53d1 95109->95110 95112 7c53e6 95109->95112 95124 7bf2c6 20 API calls __dosmaperr 95110->95124 95117 7c540b 95112->95117 95126 7bf2c6 20 API calls __dosmaperr 95112->95126 95114 7c53d6 95125 7bf2d9 20 API calls __dosmaperr 95114->95125 95115 7c5416 95127 7bf2d9 20 API calls __dosmaperr 95115->95127 95117->95095 95119 7c53de 95119->95095 95120 7c541e 95128 7c27ec 26 API calls _strftime 95120->95128 95122->95098 95123->95102 95124->95114 95125->95119 95126->95115 95127->95120 95128->95119 95129 793156 95132 793170 95129->95132 95133 793187 95132->95133 95134 7931eb 95133->95134 95135 79318c 95133->95135 95172 7931e9 95133->95172 95139 7d2dfb 95134->95139 95140 7931f1 95134->95140 95136 793199 95135->95136 95137 793265 PostQuitMessage 95135->95137 95142 7d2e7c 95136->95142 95143 7931a4 95136->95143 95174 79316a 95137->95174 95138 7931d0 DefWindowProcW 95138->95174 95184 7918e2 10 API calls 95139->95184 95144 7931f8 95140->95144 95145 79321d SetTimer RegisterWindowMessageW 95140->95145 95198 7fbf30 34 API calls ___scrt_fastfail 95142->95198 95147 7d2e68 95143->95147 95148 7931ae 95143->95148 95151 7d2d9c 95144->95151 95152 793201 KillTimer 95144->95152 95149 793246 CreatePopupMenu 95145->95149 95145->95174 95146 7d2e1c 95185 7ae499 42 API calls 95146->95185 95197 7fc161 27 API calls ___scrt_fastfail 95147->95197 95155 7d2e4d 95148->95155 95156 7931b9 95148->95156 95149->95174 95158 7d2dd7 MoveWindow 95151->95158 95159 7d2da1 95151->95159 95177 7930f2 95152->95177 95155->95138 95196 7f0ad7 22 API calls 95155->95196 95161 793253 95156->95161 95170 7931c4 95156->95170 95157 7d2e8e 95157->95138 95157->95174 95158->95174 95162 7d2da7 95159->95162 95163 7d2dc6 SetFocus 95159->95163 95182 79326f 44 API calls ___scrt_fastfail 95161->95182 95166 7d2db0 95162->95166 95162->95170 95163->95174 95183 7918e2 10 API calls 95166->95183 95169 793263 95169->95174 95170->95138 95173 7930f2 Shell_NotifyIconW 95170->95173 95172->95138 95175 7d2e41 95173->95175 95186 793837 95175->95186 95178 793154 95177->95178 95179 793104 ___scrt_fastfail 95177->95179 95181 793c50 DeleteObject DestroyWindow 95178->95181 95180 793123 Shell_NotifyIconW 95179->95180 95180->95178 95181->95174 95182->95169 95183->95174 95184->95146 95185->95170 95187 793862 ___scrt_fastfail 95186->95187 95199 794212 95187->95199 95191 7938e8 95192 7d3386 Shell_NotifyIconW 95191->95192 95193 793906 Shell_NotifyIconW 95191->95193 95203 793923 95193->95203 95195 79391c 95195->95172 95196->95172 95197->95169 95198->95157 95200 7d35a4 95199->95200 95201 7938b7 95199->95201 95200->95201 95202 7d35ad DestroyIcon 95200->95202 95201->95191 95225 7fc874 42 API calls _strftime 95201->95225 95202->95201 95204 79393f 95203->95204 95205 793a13 95203->95205 95226 796270 95204->95226 95205->95195 95208 79395a 95210 796b57 22 API calls 95208->95210 95209 7d3393 LoadStringW 95211 7d33ad 95209->95211 95212 79396f 95210->95212 95220 793994 ___scrt_fastfail 95211->95220 95232 79a8c7 22 API calls __fread_nolock 95211->95232 95213 7d33c9 95212->95213 95214 79397c 95212->95214 95233 796350 22 API calls 95213->95233 95214->95211 95216 793986 95214->95216 95231 796350 22 API calls 95216->95231 95219 7d33d7 95219->95220 95221 7933c6 22 API calls 95219->95221 95222 7939f9 Shell_NotifyIconW 95220->95222 95223 7d33f9 95221->95223 95222->95205 95224 7933c6 22 API calls 95223->95224 95224->95220 95225->95191 95227 7afe0b 22 API calls 95226->95227 95228 796295 95227->95228 95229 7afddb 22 API calls 95228->95229 95230 79394d 95229->95230 95230->95208 95230->95209 95231->95220 95232->95220 95233->95219 95234 791cad SystemParametersInfoW 95235 7d2ba5 95236 7d2baf 95235->95236 95237 792b25 95235->95237 95239 793a5a 24 API calls 95236->95239 95263 792b83 7 API calls 95237->95263 95241 7d2bb8 95239->95241 95243 799cb3 22 API calls 95241->95243 95245 7d2bc6 95243->95245 95244 792b2f 95248 793837 49 API calls 95244->95248 95250 792b44 95244->95250 95246 7d2bce 95245->95246 95247 7d2bf5 95245->95247 95251 7933c6 22 API calls 95246->95251 95249 7933c6 22 API calls 95247->95249 95248->95250 95253 7d2bf1 GetForegroundWindow ShellExecuteW 95249->95253 95256 792b5f 95250->95256 95259 7930f2 Shell_NotifyIconW 95250->95259 95252 7d2bd9 95251->95252 95267 796350 22 API calls 95252->95267 95258 7d2c26 95253->95258 95261 792b66 SetCurrentDirectoryW 95256->95261 95257 7d2be7 95260 7933c6 22 API calls 95257->95260 95258->95256 95259->95256 95260->95253 95262 792b7a 95261->95262 95268 792cd4 7 API calls 95263->95268 95265 792b2a 95266 792c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 95265->95266 95266->95244 95267->95257 95268->95265 95269 792de3 95270 792df0 __wsopen_s 95269->95270 95271 792e09 95270->95271 95272 7d2c2b ___scrt_fastfail 95270->95272 95273 793aa2 23 API calls 95271->95273 95274 7d2c47 GetOpenFileNameW 95272->95274 95275 792e12 95273->95275 95276 7d2c96 95274->95276 95285 792da5 95275->95285 95278 796b57 22 API calls 95276->95278 95280 7d2cab 95278->95280 95280->95280 95282 792e27 95303 7944a8 95282->95303 95286 7d1f50 __wsopen_s 95285->95286 95287 792db2 GetLongPathNameW 95286->95287 95288 796b57 22 API calls 95287->95288 95289 792dda 95288->95289 95290 793598 95289->95290 95291 79a961 22 API calls 95290->95291 95292 7935aa 95291->95292 95293 793aa2 23 API calls 95292->95293 95294 7935b5 95293->95294 95295 7d32eb 95294->95295 95296 7935c0 95294->95296 95301 7d330d 95295->95301 95338 7ace60 41 API calls 95295->95338 95298 79515f 22 API calls 95296->95298 95299 7935cc 95298->95299 95332 7935f3 95299->95332 95302 7935df 95302->95282 95304 794ecb 94 API calls 95303->95304 95305 7944cd 95304->95305 95306 7d3833 95305->95306 95308 794ecb 94 API calls 95305->95308 95307 802cf9 80 API calls 95306->95307 95309 7d3848 95307->95309 95310 7944e1 95308->95310 95311 7d384c 95309->95311 95312 7d3869 95309->95312 95310->95306 95313 7944e9 95310->95313 95314 794f39 68 API calls 95311->95314 95315 7afe0b 22 API calls 95312->95315 95316 7d3854 95313->95316 95317 7944f5 95313->95317 95314->95316 95329 7d38ae 95315->95329 95340 7fda5a 82 API calls 95316->95340 95339 79940c 136 API calls 2 library calls 95317->95339 95320 792e31 95321 7d3862 95321->95312 95322 794f39 68 API calls 95325 7d3a5f 95322->95325 95325->95322 95346 7f989b 82 API calls __wsopen_s 95325->95346 95328 799cb3 22 API calls 95328->95329 95329->95325 95329->95328 95341 7f967e 22 API calls __fread_nolock 95329->95341 95342 7f95ad 42 API calls _wcslen 95329->95342 95343 800b5a 22 API calls 95329->95343 95344 79a4a1 22 API calls __fread_nolock 95329->95344 95345 793ff7 22 API calls 95329->95345 95333 793605 95332->95333 95337 793624 __fread_nolock 95332->95337 95336 7afe0b 22 API calls 95333->95336 95334 7afddb 22 API calls 95335 79363b 95334->95335 95335->95302 95336->95337 95337->95334 95338->95295 95339->95320 95340->95321 95341->95329 95342->95329 95343->95329 95344->95329 95345->95329 95346->95325 95347 791044 95352 7910f3 95347->95352 95349 79104a 95388 7b00a3 29 API calls __onexit 95349->95388 95351 791054 95389 791398 95352->95389 95356 79116a 95357 79a961 22 API calls 95356->95357 95358 791174 95357->95358 95359 79a961 22 API calls 95358->95359 95360 79117e 95359->95360 95361 79a961 22 API calls 95360->95361 95362 791188 95361->95362 95363 79a961 22 API calls 95362->95363 95364 7911c6 95363->95364 95365 79a961 22 API calls 95364->95365 95366 791292 95365->95366 95399 79171c 95366->95399 95370 7912c4 95371 79a961 22 API calls 95370->95371 95372 7912ce 95371->95372 95373 7a1940 9 API calls 95372->95373 95374 7912f9 95373->95374 95420 791aab 95374->95420 95376 791315 95377 791325 GetStdHandle 95376->95377 95378 79137a 95377->95378 95379 7d2485 95377->95379 95382 791387 OleInitialize 95378->95382 95379->95378 95380 7d248e 95379->95380 95381 7afddb 22 API calls 95380->95381 95383 7d2495 95381->95383 95382->95349 95427 80011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 95383->95427 95385 7d249e 95428 800944 CreateThread 95385->95428 95387 7d24aa CloseHandle 95387->95378 95388->95351 95429 7913f1 95389->95429 95392 7913f1 22 API calls 95393 7913d0 95392->95393 95394 79a961 22 API calls 95393->95394 95395 7913dc 95394->95395 95396 796b57 22 API calls 95395->95396 95397 791129 95396->95397 95398 791bc3 6 API calls 95397->95398 95398->95356 95400 79a961 22 API calls 95399->95400 95401 79172c 95400->95401 95402 79a961 22 API calls 95401->95402 95403 791734 95402->95403 95404 79a961 22 API calls 95403->95404 95405 79174f 95404->95405 95406 7afddb 22 API calls 95405->95406 95407 79129c 95406->95407 95408 791b4a 95407->95408 95409 791b58 95408->95409 95410 79a961 22 API calls 95409->95410 95411 791b63 95410->95411 95412 79a961 22 API calls 95411->95412 95413 791b6e 95412->95413 95414 79a961 22 API calls 95413->95414 95415 791b79 95414->95415 95416 79a961 22 API calls 95415->95416 95417 791b84 95416->95417 95418 7afddb 22 API calls 95417->95418 95419 791b96 RegisterWindowMessageW 95418->95419 95419->95370 95421 7d272d 95420->95421 95422 791abb 95420->95422 95436 803209 23 API calls 95421->95436 95423 7afddb 22 API calls 95422->95423 95426 791ac3 95423->95426 95425 7d2738 95426->95376 95427->95385 95428->95387 95437 80092a 28 API calls 95428->95437 95430 79a961 22 API calls 95429->95430 95431 7913fc 95430->95431 95432 79a961 22 API calls 95431->95432 95433 791404 95432->95433 95434 79a961 22 API calls 95433->95434 95435 7913c6 95434->95435 95435->95392 95436->95425 95438 7c8402 95443 7c81be 95438->95443 95442 7c842a 95448 7c81ef try_get_first_available_module 95443->95448 95445 7c83ee 95462 7c27ec 26 API calls _strftime 95445->95462 95447 7c8343 95447->95442 95455 7d0984 95447->95455 95451 7c8338 95448->95451 95458 7b8e0b 40 API calls 2 library calls 95448->95458 95450 7c838c 95450->95451 95459 7b8e0b 40 API calls 2 library calls 95450->95459 95451->95447 95461 7bf2d9 20 API calls __dosmaperr 95451->95461 95453 7c83ab 95453->95451 95460 7b8e0b 40 API calls 2 library calls 95453->95460 95463 7d0081 95455->95463 95457 7d099f 95457->95442 95458->95450 95459->95453 95460->95451 95461->95445 95462->95447 95466 7d008d ___scrt_is_nonwritable_in_current_image 95463->95466 95464 7d009b 95520 7bf2d9 20 API calls __dosmaperr 95464->95520 95466->95464 95468 7d00d4 95466->95468 95467 7d00a0 95521 7c27ec 26 API calls _strftime 95467->95521 95474 7d065b 95468->95474 95473 7d00aa __fread_nolock 95473->95457 95475 7d0678 95474->95475 95476 7d068d 95475->95476 95477 7d06a6 95475->95477 95537 7bf2c6 20 API calls __dosmaperr 95476->95537 95523 7c5221 95477->95523 95480 7d06ab 95482 7d06cb 95480->95482 95483 7d06b4 95480->95483 95481 7d0692 95538 7bf2d9 20 API calls __dosmaperr 95481->95538 95536 7d039a CreateFileW 95482->95536 95539 7bf2c6 20 API calls __dosmaperr 95483->95539 95487 7d00f8 95522 7d0121 LeaveCriticalSection __wsopen_s 95487->95522 95488 7d06b9 95540 7bf2d9 20 API calls __dosmaperr 95488->95540 95490 7d0781 GetFileType 95491 7d078c GetLastError 95490->95491 95492 7d07d3 95490->95492 95543 7bf2a3 20 API calls __dosmaperr 95491->95543 95545 7c516a 21 API calls 2 library calls 95492->95545 95493 7d0756 GetLastError 95542 7bf2a3 20 API calls __dosmaperr 95493->95542 95494 7d0704 95494->95490 95494->95493 95541 7d039a CreateFileW 95494->95541 95498 7d079a CloseHandle 95498->95481 95501 7d07c3 95498->95501 95500 7d0749 95500->95490 95500->95493 95544 7bf2d9 20 API calls __dosmaperr 95501->95544 95502 7d07f4 95504 7d0840 95502->95504 95546 7d05ab 72 API calls 3 library calls 95502->95546 95509 7d086d 95504->95509 95547 7d014d 72 API calls 4 library calls 95504->95547 95505 7d07c8 95505->95481 95508 7d0866 95508->95509 95510 7d087e 95508->95510 95511 7c86ae __wsopen_s 29 API calls 95509->95511 95510->95487 95512 7d08fc CloseHandle 95510->95512 95511->95487 95548 7d039a CreateFileW 95512->95548 95514 7d0927 95515 7d0931 GetLastError 95514->95515 95516 7d095d 95514->95516 95549 7bf2a3 20 API calls __dosmaperr 95515->95549 95516->95487 95518 7d093d 95550 7c5333 21 API calls 2 library calls 95518->95550 95520->95467 95521->95473 95522->95473 95524 7c522d ___scrt_is_nonwritable_in_current_image 95523->95524 95551 7c2f5e EnterCriticalSection 95524->95551 95527 7c5259 95555 7c5000 21 API calls 3 library calls 95527->95555 95529 7c52a4 __fread_nolock 95529->95480 95530 7c5234 95530->95527 95532 7c52c7 EnterCriticalSection 95530->95532 95534 7c527b 95530->95534 95531 7c525e 95531->95534 95556 7c5147 EnterCriticalSection 95531->95556 95533 7c52d4 LeaveCriticalSection 95532->95533 95532->95534 95533->95530 95552 7c532a 95534->95552 95536->95494 95537->95481 95538->95487 95539->95488 95540->95481 95541->95500 95542->95481 95543->95498 95544->95505 95545->95502 95546->95504 95547->95508 95548->95514 95549->95518 95550->95516 95551->95530 95557 7c2fa6 LeaveCriticalSection 95552->95557 95554 7c5331 95554->95529 95555->95531 95556->95534 95557->95554 95558 7e2a00 95573 79d7b0 messages 95558->95573 95559 79db11 PeekMessageW 95559->95573 95560 79d807 GetInputState 95560->95559 95560->95573 95561 7e1cbe TranslateAcceleratorW 95561->95573 95563 79db8f PeekMessageW 95563->95573 95564 79da04 timeGetTime 95564->95573 95565 79db73 TranslateMessage DispatchMessageW 95565->95563 95566 79dbaf Sleep 95584 79dbc0 95566->95584 95567 7e2b74 Sleep 95567->95584 95568 7ae551 timeGetTime 95568->95584 95569 7e1dda timeGetTime 95657 7ae300 23 API calls 95569->95657 95570 7fd4dc 47 API calls 95570->95584 95572 7e2c0b GetExitCodeProcess 95577 7e2c37 CloseHandle 95572->95577 95578 7e2c21 WaitForSingleObject 95572->95578 95573->95559 95573->95560 95573->95561 95573->95563 95573->95564 95573->95565 95573->95566 95573->95567 95573->95569 95575 79d9d5 95573->95575 95586 79ec40 346 API calls 95573->95586 95587 7a1310 346 API calls 95573->95587 95590 79dd50 95573->95590 95597 79bf40 95573->95597 95655 79dfd0 346 API calls 3 library calls 95573->95655 95656 7aedf6 IsDialogMessageW GetClassLongW 95573->95656 95658 803a2a 23 API calls 95573->95658 95659 80359c 82 API calls __wsopen_s 95573->95659 95574 8229bf GetForegroundWindow 95574->95584 95577->95584 95578->95573 95578->95577 95579 7e2a31 95579->95575 95580 7e2ca9 Sleep 95580->95573 95584->95568 95584->95570 95584->95572 95584->95573 95584->95574 95584->95575 95584->95579 95584->95580 95660 815658 23 API calls 95584->95660 95661 7fe97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 95584->95661 95586->95573 95587->95573 95591 79dd6f 95590->95591 95592 79dd83 95590->95592 95662 79d260 95591->95662 95694 80359c 82 API calls __wsopen_s 95592->95694 95594 79dd7a 95594->95573 95596 7e2f75 95596->95596 95702 79adf0 95597->95702 95599 79bf9d 95600 79bfa9 95599->95600 95601 7e04b6 95599->95601 95603 7e04c6 95600->95603 95604 79c01e 95600->95604 95721 80359c 82 API calls __wsopen_s 95601->95721 95722 80359c 82 API calls __wsopen_s 95603->95722 95707 79ac91 95604->95707 95607 79c7da 95611 7afe0b 22 API calls 95607->95611 95616 79c808 __fread_nolock 95611->95616 95613 7e04f5 95617 7e055a 95613->95617 95723 7ad217 346 API calls 95613->95723 95622 7afe0b 22 API calls 95616->95622 95654 79c603 95617->95654 95724 80359c 82 API calls __wsopen_s 95617->95724 95618 79ec40 346 API calls 95653 79c039 __fread_nolock messages 95618->95653 95619 79af8a 22 API calls 95619->95653 95620 7f7120 22 API calls 95620->95653 95621 7e091a 95734 803209 23 API calls 95621->95734 95641 79c350 __fread_nolock messages 95622->95641 95625 7e08a5 95626 79ec40 346 API calls 95625->95626 95628 7e08cf 95626->95628 95628->95654 95732 79a81b 41 API calls 95628->95732 95629 7e0591 95725 80359c 82 API calls __wsopen_s 95629->95725 95632 7e08f6 95733 80359c 82 API calls __wsopen_s 95632->95733 95635 79c3ac 95635->95573 95636 79c237 95638 79c253 95636->95638 95735 79a8c7 22 API calls __fread_nolock 95636->95735 95642 7e0976 95638->95642 95647 79c297 messages 95638->95647 95639 7afe0b 22 API calls 95639->95653 95641->95635 95720 7ace17 22 API calls messages 95641->95720 95736 79aceb 23 API calls messages 95642->95736 95645 7e09bf 95645->95654 95737 80359c 82 API calls __wsopen_s 95645->95737 95646 7afddb 22 API calls 95646->95653 95647->95645 95718 79aceb 23 API calls messages 95647->95718 95649 79c335 95649->95645 95650 79c342 95649->95650 95719 79a704 22 API calls messages 95650->95719 95651 79bbe0 40 API calls 95651->95653 95653->95607 95653->95613 95653->95616 95653->95617 95653->95618 95653->95619 95653->95620 95653->95621 95653->95625 95653->95629 95653->95632 95653->95636 95653->95639 95653->95645 95653->95646 95653->95651 95653->95654 95711 79ad81 95653->95711 95726 7f7099 22 API calls __fread_nolock 95653->95726 95727 815745 54 API calls _wcslen 95653->95727 95728 7aaa42 22 API calls messages 95653->95728 95729 7ff05c 40 API calls 95653->95729 95730 79a993 41 API calls 95653->95730 95731 79aceb 23 API calls messages 95653->95731 95654->95573 95655->95573 95656->95573 95657->95573 95658->95573 95659->95573 95660->95584 95661->95584 95663 79ec40 346 API calls 95662->95663 95664 79d29d 95663->95664 95665 79d30b messages 95664->95665 95666 79d6d5 95664->95666 95668 79d3c3 95664->95668 95674 79d4b8 95664->95674 95678 7afddb 22 API calls 95664->95678 95680 7e1bc4 95664->95680 95689 79d429 __fread_nolock messages 95664->95689 95665->95594 95666->95665 95675 7afe0b 22 API calls 95666->95675 95668->95666 95670 79d3ce 95668->95670 95669 79d5ff 95672 7e1bb5 95669->95672 95673 79d614 95669->95673 95671 7afddb 22 API calls 95670->95671 95682 79d3d5 __fread_nolock 95671->95682 95700 815705 23 API calls 95672->95700 95677 7afddb 22 API calls 95673->95677 95679 7afe0b 22 API calls 95674->95679 95675->95682 95687 79d46a 95677->95687 95678->95664 95679->95689 95701 80359c 82 API calls __wsopen_s 95680->95701 95681 7afddb 22 API calls 95683 79d3f6 95681->95683 95682->95681 95682->95683 95683->95689 95695 79bec0 346 API calls 95683->95695 95685 7e1ba4 95699 80359c 82 API calls __wsopen_s 95685->95699 95687->95594 95689->95669 95689->95685 95689->95687 95690 7e1b7f 95689->95690 95692 7e1b5d 95689->95692 95696 791f6f 346 API calls 95689->95696 95698 80359c 82 API calls __wsopen_s 95690->95698 95697 80359c 82 API calls __wsopen_s 95692->95697 95694->95596 95695->95689 95696->95689 95697->95687 95698->95687 95699->95687 95700->95680 95701->95665 95703 79ae01 95702->95703 95706 79ae1c messages 95702->95706 95704 79aec9 22 API calls 95703->95704 95705 79ae09 CharUpperBuffW 95704->95705 95705->95706 95706->95599 95708 79acae 95707->95708 95710 79acd1 95708->95710 95738 80359c 82 API calls __wsopen_s 95708->95738 95710->95653 95712 7dfadb 95711->95712 95713 79ad92 95711->95713 95714 7afddb 22 API calls 95713->95714 95715 79ad99 95714->95715 95739 79adcd 95715->95739 95718->95649 95719->95641 95720->95641 95721->95603 95722->95654 95723->95617 95724->95654 95725->95654 95726->95653 95727->95653 95728->95653 95729->95653 95730->95653 95731->95653 95732->95632 95733->95654 95734->95636 95735->95638 95736->95645 95737->95654 95738->95710 95745 79addd 95739->95745 95740 79adb6 95740->95653 95741 7afddb 22 API calls 95741->95745 95742 79a961 22 API calls 95742->95745 95743 79adcd 22 API calls 95743->95745 95745->95740 95745->95741 95745->95742 95745->95743 95746 79a8c7 22 API calls __fread_nolock 95745->95746 95746->95745 95747 7d2402 95750 791410 95747->95750 95751 7d24b8 DestroyWindow 95750->95751 95752 79144f mciSendStringW 95750->95752 95757 7d24c4 95751->95757 95753 79146b 95752->95753 95756 7916c6 95752->95756 95754 791479 95753->95754 95753->95757 95783 79182e 95754->95783 95755 7916d5 UnregisterHotKey 95755->95756 95756->95753 95756->95755 95759 7d2509 95757->95759 95760 7d24d8 95757->95760 95761 7d24e2 FindClose 95757->95761 95765 7d252d 95759->95765 95766 7d251c FreeLibrary 95759->95766 95760->95757 95789 796246 CloseHandle 95760->95789 95761->95757 95764 79148e 95764->95765 95771 79149c 95764->95771 95767 7d2541 VirtualFree 95765->95767 95774 791509 95765->95774 95766->95759 95767->95765 95768 7914f8 CoUninitialize 95768->95774 95769 7d2589 95776 7d2598 messages 95769->95776 95790 8032eb 6 API calls messages 95769->95790 95770 791514 95773 791524 95770->95773 95771->95768 95787 791944 VirtualFreeEx CloseHandle 95773->95787 95774->95769 95774->95770 95779 7d2627 95776->95779 95791 7f64d4 22 API calls messages 95776->95791 95778 79153a 95778->95776 95780 79161f 95778->95780 95779->95779 95780->95779 95788 791876 CloseHandle InternetCloseHandle InternetCloseHandle WaitForSingleObject 95780->95788 95782 7916c1 95785 79183b 95783->95785 95784 791480 95784->95759 95784->95764 95785->95784 95792 7f702a 22 API calls 95785->95792 95787->95778 95788->95782 95789->95760 95790->95769 95791->95776 95792->95785

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 400 7942de-79434d call 79a961 GetVersionExW call 796b57 405 7d3617-7d362a 400->405 406 794353 400->406 407 7d362b-7d362f 405->407 408 794355-794357 406->408 409 7d3631 407->409 410 7d3632-7d363e 407->410 411 79435d-7943bc call 7993b2 call 7937a0 408->411 412 7d3656 408->412 409->410 410->407 413 7d3640-7d3642 410->413 428 7d37df-7d37e6 411->428 429 7943c2-7943c4 411->429 417 7d365d-7d3660 412->417 413->408 416 7d3648-7d364f 413->416 416->405 419 7d3651 416->419 420 79441b-794435 GetCurrentProcess IsWow64Process 417->420 421 7d3666-7d36a8 417->421 419->412 424 794494-79449a 420->424 425 794437 420->425 421->420 422 7d36ae-7d36b1 421->422 426 7d36db-7d36e5 422->426 427 7d36b3-7d36bd 422->427 430 79443d-794449 424->430 425->430 434 7d36f8-7d3702 426->434 435 7d36e7-7d36f3 426->435 431 7d36bf-7d36c5 427->431 432 7d36ca-7d36d6 427->432 436 7d37e8 428->436 437 7d3806-7d3809 428->437 429->417 433 7943ca-7943dd 429->433 438 79444f-79445e LoadLibraryA 430->438 439 7d3824-7d3828 GetSystemInfo 430->439 431->420 432->420 440 7943e3-7943e5 433->440 441 7d3726-7d372f 433->441 443 7d3715-7d3721 434->443 444 7d3704-7d3710 434->444 435->420 442 7d37ee 436->442 445 7d380b-7d381a 437->445 446 7d37f4-7d37fc 437->446 447 79449c-7944a6 GetSystemInfo 438->447 448 794460-79446e GetProcAddress 438->448 450 7d374d-7d3762 440->450 451 7943eb-7943ee 440->451 452 7d373c-7d3748 441->452 453 7d3731-7d3737 441->453 442->446 443->420 444->420 445->442 454 7d381c-7d3822 445->454 446->437 449 794476-794478 447->449 448->447 455 794470-794474 GetNativeSystemInfo 448->455 456 79447a-79447b FreeLibrary 449->456 457 794481-794493 449->457 460 7d376f-7d377b 450->460 461 7d3764-7d376a 450->461 458 7d3791-7d3794 451->458 459 7943f4-79440f 451->459 452->420 453->420 454->446 455->449 456->457 458->420 462 7d379a-7d37c1 458->462 463 794415 459->463 464 7d3780-7d378c 459->464 460->420 461->420 465 7d37ce-7d37da 462->465 466 7d37c3-7d37c9 462->466 463->420 464->420 465->420 466->420
                                                          APIs
                                                          • GetVersionExW.KERNEL32(?), ref: 0079430D
                                                            • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                          • GetCurrentProcess.KERNEL32(?,0082CB64,00000000,?,?), ref: 00794422
                                                          • IsWow64Process.KERNEL32(00000000,?,?), ref: 00794429
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00794454
                                                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00794466
                                                          • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00794474
                                                          • FreeLibrary.KERNEL32(00000000,?,?), ref: 0079447B
                                                          • GetSystemInfo.KERNEL32(?,?,?), ref: 007944A0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                          • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                          • API String ID: 3290436268-3101561225
                                                          • Opcode ID: 2228f5b7b828b149cff7f3c8b2499314bc9c8ed214828699881e29244aa9ffe6
                                                          • Instruction ID: 935d42eda8074b7b9355b454a01aaabd4ec989fa7af42986b73f2fb7e7bcab03
                                                          • Opcode Fuzzy Hash: 2228f5b7b828b149cff7f3c8b2499314bc9c8ed214828699881e29244aa9ffe6
                                                          • Instruction Fuzzy Hash: C8A1957590A2C0DFCF11CB797E896AA7FB57B36300B1E6499D04393B23D6AC4509CB62

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 804 7942a2-7942ba CreateStreamOnHGlobal 805 7942da-7942dd 804->805 806 7942bc-7942d3 FindResourceExW 804->806 807 7942d9 806->807 808 7d35ba-7d35c9 LoadResource 806->808 807->805 808->807 809 7d35cf-7d35dd SizeofResource 808->809 809->807 810 7d35e3-7d35ee LockResource 809->810 810->807 811 7d35f4-7d3612 810->811 811->807
                                                          APIs
                                                          • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,007950AA,?,?,00000000,00000000), ref: 007942B2
                                                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,007950AA,?,?,00000000,00000000), ref: 007942C9
                                                          • LoadResource.KERNEL32(?,00000000,?,?,007950AA,?,?,00000000,00000000,?,?,?,?,?,?,00794F20), ref: 007D35BE
                                                          • SizeofResource.KERNEL32(?,00000000,?,?,007950AA,?,?,00000000,00000000,?,?,?,?,?,?,00794F20), ref: 007D35D3
                                                          • LockResource.KERNEL32(007950AA,?,?,007950AA,?,?,00000000,00000000,?,?,?,?,?,?,00794F20,?), ref: 007D35E6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                          • String ID: SCRIPT
                                                          • API String ID: 3051347437-3967369404
                                                          • Opcode ID: df762fc7142339c7c8f76ed7cd9f90705af9451b7ab60a759ab47e22ca71a3d1
                                                          • Instruction ID: 10dc61bd9401ea3704bbcba36bd53c346990acf38339ccb6d1e52d825f8aea60
                                                          • Opcode Fuzzy Hash: df762fc7142339c7c8f76ed7cd9f90705af9451b7ab60a759ab47e22ca71a3d1
                                                          • Instruction Fuzzy Hash: C6113C71200701BFEB218B65EC49F6B7BB9FFC5B51F248169B412D6250DB71D8019660

                                                          Control-flow Graph

                                                          APIs
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00792B6B
                                                            • Part of subcall function 00793A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00861418,?,00792E7F,?,?,?,00000000), ref: 00793A78
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                          • GetForegroundWindow.USER32(runas,?,?,?,?,?,00852224), ref: 007D2C10
                                                          • ShellExecuteW.SHELL32(00000000,?,?,00852224), ref: 007D2C17
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                          • String ID: runas
                                                          • API String ID: 448630720-4000483414
                                                          • Opcode ID: 166809002b5f5bd619aa244b9b0e33685f561968ff92ed27c58b7515637e77ac
                                                          • Instruction ID: 9577fe96b75e3bb4f651245f3c57196b9cf4e365eafc822a574ccb1d5414e23c
                                                          • Opcode Fuzzy Hash: 166809002b5f5bd619aa244b9b0e33685f561968ff92ed27c58b7515637e77ac
                                                          • Instruction Fuzzy Hash: FC11D271208301EACF14FF64F85AD7EBBA5ABA1341F48542DF556431A3DF2D890A8712

                                                          Control-flow Graph

                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 007FD501
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 007FD50F
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 007FD52F
                                                          • CloseHandle.KERNELBASE(00000000), ref: 007FD5DC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                          • String ID:
                                                          • API String ID: 420147892-0
                                                          • Opcode ID: b5c7125f56644b8de74e19901f072bbf0970f0e3dd880d0e1f39df9921627f91
                                                          • Instruction ID: 0d489c860c6a58efff2ea05f20a90145d5df0d4f63e5a10a395194879a70808c
                                                          • Opcode Fuzzy Hash: b5c7125f56644b8de74e19901f072bbf0970f0e3dd880d0e1f39df9921627f91
                                                          • Instruction Fuzzy Hash: B831A1710083049FD711EF64D885ABFBBE8FF99354F10092DF681832A1EB759949CBA2

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1004 7fdbbe-7fdbda lstrlenW 1005 7fdbdc-7fdbe6 GetFileAttributesW 1004->1005 1006 7fdc06 1004->1006 1007 7fdc09-7fdc0d 1005->1007 1008 7fdbe8-7fdbf7 FindFirstFileW 1005->1008 1006->1007 1008->1006 1009 7fdbf9-7fdc04 FindClose 1008->1009 1009->1007
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,007D5222), ref: 007FDBCE
                                                          • GetFileAttributesW.KERNELBASE(?), ref: 007FDBDD
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 007FDBEE
                                                          • FindClose.KERNEL32(00000000), ref: 007FDBFA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: FileFind$AttributesCloseFirstlstrlen
                                                          • String ID:
                                                          • API String ID: 2695905019-0
                                                          • Opcode ID: 296031b08773853ac09f0e63b522701cb638e50aa2617ff01bc314b57e813bb3
                                                          • Instruction ID: 792e1cac755db5d6ba580578b15ecdaa7cace16a7210d0a25c971493f3e8700e
                                                          • Opcode Fuzzy Hash: 296031b08773853ac09f0e63b522701cb638e50aa2617ff01bc314b57e813bb3
                                                          • Instruction Fuzzy Hash: 9CF0A0308109189B82306B78AC0E8BE37ADAE01334F108702F976C22E0EBB45D56C6E5
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(007C28E9,?,007B4CBE,007C28E9,008588B8,0000000C,007B4E15,007C28E9,00000002,00000000,?,007C28E9), ref: 007B4D09
                                                          • TerminateProcess.KERNEL32(00000000,?,007B4CBE,007C28E9,008588B8,0000000C,007B4E15,007C28E9,00000002,00000000,?,007C28E9), ref: 007B4D10
                                                          • ExitProcess.KERNEL32 ref: 007B4D22
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$CurrentExitTerminate
                                                          • String ID:
                                                          • API String ID: 1703294689-0
                                                          • Opcode ID: ddbbdcd63b95460933b6b6a44a87526f81cc0f187cb2093658d1e3e09be0ce39
                                                          • Instruction ID: 2dceb215dccfcaab69cfa35605a1c5dcf440cc4098ecdd23db729d6cd84d813e
                                                          • Opcode Fuzzy Hash: ddbbdcd63b95460933b6b6a44a87526f81cc0f187cb2093658d1e3e09be0ce39
                                                          • Instruction Fuzzy Hash: F7E0B631100548ABCF21AF64DD0EBA83B69FB41795B108418FD059A223CB39DD52DB84

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 0 81aff9-81b056 call 7b2340 3 81b094-81b098 0->3 4 81b058-81b06b call 79b567 0->4 6 81b09a-81b0bb call 79b567 * 2 3->6 7 81b0dd-81b0e0 3->7 12 81b0c8 4->12 13 81b06d-81b092 call 79b567 * 2 4->13 30 81b0bf-81b0c4 6->30 9 81b0e2-81b0e5 7->9 10 81b0f5-81b119 call 797510 call 797620 7->10 14 81b0e8-81b0ed call 79b567 9->14 33 81b1d8-81b1e0 10->33 34 81b11f-81b178 call 797510 call 797620 call 797510 call 797620 call 797510 call 797620 10->34 17 81b0cb-81b0cf 12->17 13->30 14->10 22 81b0d1-81b0d7 17->22 23 81b0d9-81b0db 17->23 22->14 23->7 23->10 30->7 31 81b0c6 30->31 31->17 36 81b1e2-81b1fd call 797510 call 797620 33->36 37 81b20a-81b238 GetCurrentDirectoryW call 7afe0b GetCurrentDirectoryW 33->37 82 81b1a6-81b1d6 GetSystemDirectoryW call 7afe0b GetSystemDirectoryW 34->82 83 81b17a-81b195 call 797510 call 797620 34->83 36->37 53 81b1ff-81b208 call 7b4963 36->53 45 81b23c 37->45 48 81b240-81b244 45->48 51 81b275-81b285 call 8000d9 48->51 52 81b246-81b270 call 799c6e * 3 48->52 64 81b287-81b289 51->64 65 81b28b-81b2e1 call 8007c0 call 8006e6 call 8005a7 51->65 52->51 53->37 53->51 69 81b2ee-81b2f2 64->69 65->69 97 81b2e3 65->97 71 81b2f8-81b321 call 7f11c8 69->71 72 81b39a-81b3be CreateProcessW 69->72 87 81b323-81b328 call 7f1201 71->87 88 81b32a call 7f14ce 71->88 76 81b3c1-81b3d4 call 7afe14 * 2 72->76 103 81b3d6-81b3e8 76->103 104 81b42f-81b43d CloseHandle 76->104 82->45 83->82 105 81b197-81b1a0 call 7b4963 83->105 96 81b32f-81b33c call 7b4963 87->96 88->96 112 81b347-81b357 call 7b4963 96->112 113 81b33e-81b345 96->113 97->69 109 81b3ea 103->109 110 81b3ed-81b3fc 103->110 107 81b49c 104->107 108 81b43f-81b444 104->108 105->48 105->82 118 81b4a0-81b4a4 107->118 114 81b451-81b456 108->114 115 81b446-81b44c CloseHandle 108->115 109->110 116 81b401-81b42a GetLastError call 79630c call 79cfa0 110->116 117 81b3fe 110->117 136 81b362-81b372 call 7b4963 112->136 137 81b359-81b360 112->137 113->112 113->113 123 81b463-81b468 114->123 124 81b458-81b45e CloseHandle 114->124 115->114 126 81b4e5-81b4f6 call 800175 116->126 117->116 119 81b4b2-81b4bc 118->119 120 81b4a6-81b4b0 118->120 127 81b4c4-81b4e3 call 79cfa0 CloseHandle 119->127 128 81b4be 119->128 120->126 130 81b475-81b49a call 8009d9 call 81b536 123->130 131 81b46a-81b470 CloseHandle 123->131 124->123 127->126 128->127 130->118 131->130 146 81b374-81b37b 136->146 147 81b37d-81b398 call 7afe14 * 3 136->147 137->136 137->137 146->146 146->147 147->76
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 0081B198
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0081B1B0
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0081B1D4
                                                          • _wcslen.LIBCMT ref: 0081B200
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0081B214
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0081B236
                                                          • _wcslen.LIBCMT ref: 0081B332
                                                            • Part of subcall function 008005A7: GetStdHandle.KERNEL32(000000F6), ref: 008005C6
                                                          • _wcslen.LIBCMT ref: 0081B34B
                                                          • _wcslen.LIBCMT ref: 0081B366
                                                          • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0081B3B6
                                                          • GetLastError.KERNEL32(00000000), ref: 0081B407
                                                          • CloseHandle.KERNEL32(?), ref: 0081B439
                                                          • CloseHandle.KERNEL32(00000000), ref: 0081B44A
                                                          • CloseHandle.KERNEL32(00000000), ref: 0081B45C
                                                          • CloseHandle.KERNEL32(00000000), ref: 0081B46E
                                                          • CloseHandle.KERNEL32(?), ref: 0081B4E3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 2178637699-0
                                                          • Opcode ID: c9e17b869887194d7d1befd611df9f79d03abb670a00f251f826027e198da6ec
                                                          • Instruction ID: 203d3f5f10fc92cf8c479dd990ce0a53f1582e222c9d83a057180ef5787548ea
                                                          • Opcode Fuzzy Hash: c9e17b869887194d7d1befd611df9f79d03abb670a00f251f826027e198da6ec
                                                          • Instruction Fuzzy Hash: 40F17931508240DFCB24EF24D885BAABBE5FF85314F14855DF8999B2A2DB35EC84CB52
                                                          APIs
                                                          • GetInputState.USER32 ref: 0079D807
                                                          • timeGetTime.WINMM ref: 0079DA07
                                                          • Sleep.KERNEL32(0000000A), ref: 0079DBB1
                                                          • Sleep.KERNEL32(0000000A), ref: 007E2B76
                                                          • GetExitCodeProcess.KERNEL32(?,?), ref: 007E2C11
                                                          • WaitForSingleObject.KERNEL32(?,00000000), ref: 007E2C29
                                                          • CloseHandle.KERNEL32(?), ref: 007E2C3D
                                                          • Sleep.KERNEL32(?,CCCCCCCC,00000000), ref: 007E2CA9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Sleep$CloseCodeExitHandleInputObjectProcessSingleStateTimeWaittime
                                                          • String ID:
                                                          • API String ID: 388478766-0
                                                          • Opcode ID: 7c3555ac56c85302e52d362c21f2036380405e236f3a30806c46987ee51741b5
                                                          • Instruction ID: 5ba9065383869afa9532a8f43e3f433886421c8e58b578957856e4d8a77b243c
                                                          • Opcode Fuzzy Hash: 7c3555ac56c85302e52d362c21f2036380405e236f3a30806c46987ee51741b5
                                                          • Instruction Fuzzy Hash: F1423370608281DFDB34DF25D848B7AB7E5FF8A310F148619E456872A2D778EC45CB92

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00792D07
                                                          • RegisterClassExW.USER32(00000030), ref: 00792D31
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00792D42
                                                          • InitCommonControlsEx.COMCTL32(?), ref: 00792D5F
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00792D6F
                                                          • LoadIconW.USER32(000000A9), ref: 00792D85
                                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00792D94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                          • API String ID: 2914291525-1005189915
                                                          • Opcode ID: d7a834d8f64b3c85fc428541e9d4ea17a40d9ce48508736c057a7efdf9eb092b
                                                          • Instruction ID: 80e129b6d6d74aa8acd9c5711094b239631249b26e6baf77557b16a61d606595
                                                          • Opcode Fuzzy Hash: d7a834d8f64b3c85fc428541e9d4ea17a40d9ce48508736c057a7efdf9eb092b
                                                          • Instruction Fuzzy Hash: 2121E0B1901218AFDF10DFA8E889BEDBFB4FB08701F04811AF611A62A0D7B54544CF91

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 468 7d065b-7d068b call 7d042f 471 7d068d-7d0698 call 7bf2c6 468->471 472 7d06a6-7d06b2 call 7c5221 468->472 477 7d069a-7d06a1 call 7bf2d9 471->477 478 7d06cb-7d0714 call 7d039a 472->478 479 7d06b4-7d06c9 call 7bf2c6 call 7bf2d9 472->479 486 7d097d-7d0983 477->486 488 7d0716-7d071f 478->488 489 7d0781-7d078a GetFileType 478->489 479->477 493 7d0756-7d077c GetLastError call 7bf2a3 488->493 494 7d0721-7d0725 488->494 490 7d078c-7d07bd GetLastError call 7bf2a3 CloseHandle 489->490 491 7d07d3-7d07d6 489->491 490->477 507 7d07c3-7d07ce call 7bf2d9 490->507 498 7d07df-7d07e5 491->498 499 7d07d8-7d07dd 491->499 493->477 494->493 495 7d0727-7d0754 call 7d039a 494->495 495->489 495->493 500 7d07e9-7d0837 call 7c516a 498->500 501 7d07e7 498->501 499->500 510 7d0839-7d0845 call 7d05ab 500->510 511 7d0847-7d086b call 7d014d 500->511 501->500 507->477 510->511 517 7d086f-7d0879 call 7c86ae 510->517 518 7d086d 511->518 519 7d087e-7d08c1 511->519 517->486 518->517 521 7d08c3-7d08c7 519->521 522 7d08e2-7d08f0 519->522 521->522 523 7d08c9-7d08dd 521->523 524 7d097b 522->524 525 7d08f6-7d08fa 522->525 523->522 524->486 525->524 527 7d08fc-7d092f CloseHandle call 7d039a 525->527 530 7d0931-7d095d GetLastError call 7bf2a3 call 7c5333 527->530 531 7d0963-7d0977 527->531 530->531 531->524
                                                          APIs
                                                            • Part of subcall function 007D039A: CreateFileW.KERNELBASE(00000000,00000000,?,007D0704,?,?,00000000,?,007D0704,00000000,0000000C), ref: 007D03B7
                                                          • GetLastError.KERNEL32 ref: 007D076F
                                                          • __dosmaperr.LIBCMT ref: 007D0776
                                                          • GetFileType.KERNELBASE(00000000), ref: 007D0782
                                                          • GetLastError.KERNEL32 ref: 007D078C
                                                          • __dosmaperr.LIBCMT ref: 007D0795
                                                          • CloseHandle.KERNEL32(00000000), ref: 007D07B5
                                                          • CloseHandle.KERNEL32(?), ref: 007D08FF
                                                          • GetLastError.KERNEL32 ref: 007D0931
                                                          • __dosmaperr.LIBCMT ref: 007D0938
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                          • String ID: H
                                                          • API String ID: 4237864984-2852464175
                                                          • Opcode ID: 65d95e3a64dd887d27aeda33d1edca6085ba6861d52afa7e25bd68a292311cad
                                                          • Instruction ID: e41a6e7cdb754b49df84f6c576ad8e7cce330381d4aac5ee217ae32bc909bc39
                                                          • Opcode Fuzzy Hash: 65d95e3a64dd887d27aeda33d1edca6085ba6861d52afa7e25bd68a292311cad
                                                          • Instruction Fuzzy Hash: 51A10232A001089FDF19EF68DC55BAE7BB0AB46320F14515EF8159F3D1DB799812CB91

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00793A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00861418,?,00792E7F,?,?,?,00000000), ref: 00793A78
                                                            • Part of subcall function 00793357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00793379
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 0079356A
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 007D318D
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 007D31CE
                                                          • RegCloseKey.ADVAPI32(?), ref: 007D3210
                                                          • _wcslen.LIBCMT ref: 007D3277
                                                          • _wcslen.LIBCMT ref: 007D3286
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                          • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                          • API String ID: 98802146-2727554177
                                                          • Opcode ID: 500c3fa2b2f2f10b514114ef606fc7ee5cb9e34e79f8ae63043f2498e339e241
                                                          • Instruction ID: d5fa5aa0d6b791d432f35919a0b0239c36dec11d36a9d2d3caac563c402812ee
                                                          • Opcode Fuzzy Hash: 500c3fa2b2f2f10b514114ef606fc7ee5cb9e34e79f8ae63043f2498e339e241
                                                          • Instruction Fuzzy Hash: 6971AB714047019EC714EF69ED859ABBBE8FF85340F41182EF185833B0EB789A48CB62

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00792B8E
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00792B9D
                                                          • LoadIconW.USER32(00000063), ref: 00792BB3
                                                          • LoadIconW.USER32(000000A4), ref: 00792BC5
                                                          • LoadIconW.USER32(000000A2), ref: 00792BD7
                                                          • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00792BEF
                                                          • RegisterClassExW.USER32(?), ref: 00792C40
                                                            • Part of subcall function 00792CD4: GetSysColorBrush.USER32(0000000F), ref: 00792D07
                                                            • Part of subcall function 00792CD4: RegisterClassExW.USER32(00000030), ref: 00792D31
                                                            • Part of subcall function 00792CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00792D42
                                                            • Part of subcall function 00792CD4: InitCommonControlsEx.COMCTL32(?), ref: 00792D5F
                                                            • Part of subcall function 00792CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00792D6F
                                                            • Part of subcall function 00792CD4: LoadIconW.USER32(000000A9), ref: 00792D85
                                                            • Part of subcall function 00792CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00792D94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                          • String ID: #$0$AutoIt v3
                                                          • API String ID: 423443420-4155596026
                                                          • Opcode ID: 8b5a332919a86c8be80270d368716aeca54c43b3f662a562aba5404b9c292e24
                                                          • Instruction ID: d398288a8b67f5b24e8047e9290b19c75eedd2a1bc62831b76022c300fefb2a6
                                                          • Opcode Fuzzy Hash: 8b5a332919a86c8be80270d368716aeca54c43b3f662a562aba5404b9c292e24
                                                          • Instruction Fuzzy Hash: F4213970E10318AFDF119FA9EE49AAD7FB4FB08B50F09502AE501A67A1D7F90540DF90

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 609 793170-793185 610 7931e5-7931e7 609->610 611 793187-79318a 609->611 610->611 612 7931e9 610->612 613 7931eb 611->613 614 79318c-793193 611->614 617 7931d0-7931d8 DefWindowProcW 612->617 618 7d2dfb-7d2e23 call 7918e2 call 7ae499 613->618 619 7931f1-7931f6 613->619 615 793199-79319e 614->615 616 793265-79326d PostQuitMessage 614->616 621 7d2e7c-7d2e90 call 7fbf30 615->621 622 7931a4-7931a8 615->622 624 793219-79321b 616->624 623 7931de-7931e4 617->623 652 7d2e28-7d2e2f 618->652 625 7931f8-7931fb 619->625 626 79321d-793244 SetTimer RegisterWindowMessageW 619->626 621->624 646 7d2e96 621->646 628 7d2e68-7d2e77 call 7fc161 622->628 629 7931ae-7931b3 622->629 624->623 632 7d2d9c-7d2d9f 625->632 633 793201-79320f KillTimer call 7930f2 625->633 626->624 630 793246-793251 CreatePopupMenu 626->630 628->624 636 7d2e4d-7d2e54 629->636 637 7931b9-7931be 629->637 630->624 639 7d2dd7-7d2df6 MoveWindow 632->639 640 7d2da1-7d2da5 632->640 650 793214 call 793c50 633->650 636->617 649 7d2e5a-7d2e63 call 7f0ad7 636->649 644 793253-793263 call 79326f 637->644 645 7931c4-7931ca 637->645 639->624 647 7d2da7-7d2daa 640->647 648 7d2dc6-7d2dd2 SetFocus 640->648 644->624 645->617 645->652 646->617 647->645 653 7d2db0-7d2dc1 call 7918e2 647->653 648->624 649->617 650->624 652->617 657 7d2e35-7d2e48 call 7930f2 call 793837 652->657 653->624 657->617
                                                          APIs
                                                          • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,0079316A,?,?), ref: 007931D8
                                                          • KillTimer.USER32(?,00000001,?,?,?,?,?,0079316A,?,?), ref: 00793204
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00793227
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,0079316A,?,?), ref: 00793232
                                                          • CreatePopupMenu.USER32 ref: 00793246
                                                          • PostQuitMessage.USER32(00000000), ref: 00793267
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                          • String ID: TaskbarCreated
                                                          • API String ID: 129472671-2362178303
                                                          • Opcode ID: a0145c9709dc296e7ae81ae31b4e14ad4f6eeeef6134001a27ecabe8e587a4a0
                                                          • Instruction ID: b88ead795fda486ace0de007072902b9d5d3a1b483f53d4068bbec3cff35ffe2
                                                          • Opcode Fuzzy Hash: a0145c9709dc296e7ae81ae31b4e14ad4f6eeeef6134001a27ecabe8e587a4a0
                                                          • Instruction Fuzzy Hash: CC41EA31244608ABDF245BB8BD4DB7D3A5AF705340F094126F512C63B3C7AD9A42D7A1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 665 791410-791449 666 7d24b8-7d24b9 DestroyWindow 665->666 667 79144f-791465 mciSendStringW 665->667 670 7d24c4-7d24d1 666->670 668 79146b-791473 667->668 669 7916c6-7916d3 667->669 668->670 671 791479-791488 call 79182e 668->671 672 7916f8-7916ff 669->672 673 7916d5-7916f0 UnregisterHotKey 669->673 675 7d2500-7d2507 670->675 676 7d24d3-7d24d6 670->676 686 7d250e-7d251a 671->686 687 79148e-791496 671->687 672->668 674 791705 672->674 673->672 678 7916f2-7916f3 call 7910d0 673->678 674->669 675->670 680 7d2509 675->680 681 7d24d8-7d24e0 call 796246 676->681 682 7d24e2-7d24e5 FindClose 676->682 678->672 680->686 685 7d24eb-7d24f8 681->685 682->685 685->675 688 7d24fa-7d24fb call 8032b1 685->688 691 7d251c-7d251e FreeLibrary 686->691 692 7d2524-7d252b 686->692 689 79149c-7914c1 call 79cfa0 687->689 690 7d2532-7d253f 687->690 688->675 702 7914f8-791503 CoUninitialize 689->702 703 7914c3 689->703 697 7d2566-7d256d 690->697 698 7d2541-7d255e VirtualFree 690->698 691->692 692->686 696 7d252d 692->696 696->690 697->690 701 7d256f 697->701 698->697 700 7d2560-7d2561 call 803317 698->700 700->697 705 7d2574-7d2578 701->705 702->705 707 791509-79150e 702->707 706 7914c6-7914f6 call 791a05 call 7919ae 703->706 705->707 708 7d257e-7d2584 705->708 706->702 710 7d2589-7d2596 call 8032eb 707->710 711 791514-79151e 707->711 708->707 723 7d2598 710->723 714 791524-7915a5 call 79988f call 791944 call 7917d5 call 7afe14 call 79177c call 79988f call 79cfa0 call 7917fe call 7afe14 711->714 715 791707-791714 call 7af80e 711->715 728 7d259d-7d25bf call 7afdcd 714->728 755 7915ab-7915cf call 7afe14 714->755 715->714 725 79171a 715->725 723->728 725->715 734 7d25c1 728->734 737 7d25c6-7d25e8 call 7afdcd 734->737 742 7d25ea 737->742 745 7d25ef-7d2611 call 7afdcd 742->745 751 7d2613 745->751 754 7d2618-7d2625 call 7f64d4 751->754 761 7d2627 754->761 755->737 760 7915d5-7915f9 call 7afe14 755->760 760->745 765 7915ff-791619 call 7afe14 760->765 764 7d262c-7d2639 call 7aac64 761->764 769 7d263b 764->769 765->754 771 79161f-791643 call 7917d5 call 7afe14 765->771 772 7d2640-7d264d call 803245 769->772 771->764 780 791649-791651 771->780 778 7d264f 772->778 781 7d2654-7d2661 call 8032cc 778->781 780->772 782 791657-791675 call 79988f call 79190a 780->782 788 7d2663 781->788 782->781 790 79167b-791689 782->790 791 7d2668-7d2675 call 8032cc 788->791 790->791 792 79168f-7916c5 call 79988f * 3 call 791876 790->792 796 7d2677 791->796 796->796
                                                          APIs
                                                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00791459
                                                          • CoUninitialize.COMBASE ref: 007914F8
                                                          • UnregisterHotKey.USER32(?), ref: 007916DD
                                                          • DestroyWindow.USER32(?), ref: 007D24B9
                                                          • FreeLibrary.KERNEL32(?), ref: 007D251E
                                                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 007D254B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                          • String ID: close all
                                                          • API String ID: 469580280-3243417748
                                                          • Opcode ID: d7f2caede86ea2f3fe1ff051645b07194a4106331aa0673e4822095c3a68a477
                                                          • Instruction ID: c7861e0bdc8097eba4ee072285c9850986ecb3fcb0f69fcd631089ab8104a70d
                                                          • Opcode Fuzzy Hash: d7f2caede86ea2f3fe1ff051645b07194a4106331aa0673e4822095c3a68a477
                                                          • Instruction Fuzzy Hash: 28D17C31701212CFDB29DF54E899A29F7A0BF15700F5542AEE54AAB352DB38AC23CF51

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 814 792c63-792cd3 CreateWindowExW * 2 ShowWindow * 2
                                                          APIs
                                                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00792C91
                                                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00792CB2
                                                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,00791CAD,?), ref: 00792CC6
                                                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,00791CAD,?), ref: 00792CCF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$CreateShow
                                                          • String ID: AutoIt v3$edit
                                                          • API String ID: 1584632944-3779509399
                                                          • Opcode ID: 00493fde55ffb1af6400b394ba6a67bef2637cb5254a8929ed13d0807753ef19
                                                          • Instruction ID: 85e585367615bd840bfe22b5ca990b4eff3bd5d3110f68de9ec868e68df2204f
                                                          • Opcode Fuzzy Hash: 00493fde55ffb1af6400b394ba6a67bef2637cb5254a8929ed13d0807753ef19
                                                          • Instruction Fuzzy Hash: ECF03A755402907AEB310717AC0CE7B2EBDF7CAF50B06501AF901A63A1C2A90881EAB0

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 965 793b1c-793b27 966 793b99-793b9b 965->966 967 793b29-793b2e 965->967 968 793b8c-793b8f 966->968 967->966 969 793b30-793b48 RegOpenKeyExW 967->969 969->966 970 793b4a-793b69 RegQueryValueExW 969->970 971 793b6b-793b76 970->971 972 793b80-793b8b RegCloseKey 970->972 973 793b78-793b7a 971->973 974 793b90-793b97 971->974 972->968 975 793b7e 973->975 974->975 975->972
                                                          APIs
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00793B0F,SwapMouseButtons,00000004,?), ref: 00793B40
                                                          • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00793B0F,SwapMouseButtons,00000004,?), ref: 00793B61
                                                          • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00793B0F,SwapMouseButtons,00000004,?), ref: 00793B83
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseOpenQueryValue
                                                          • String ID: Control Panel\Mouse
                                                          • API String ID: 3677997916-824357125
                                                          • Opcode ID: 249429c760726edc3870b2f86ba118e131a9672e9b2d1e0bf4046d90c28a6e4d
                                                          • Instruction ID: d5c9a689b2db10edfac13b2b75b3d4d61fdd74f3280ff45a762a947ee92bd976
                                                          • Opcode Fuzzy Hash: 249429c760726edc3870b2f86ba118e131a9672e9b2d1e0bf4046d90c28a6e4d
                                                          • Instruction Fuzzy Hash: 8E1127B5610208FFDF208FA5EC84EAEBBB8EF04744B10846AA805D7210E2759E419BA0
                                                          APIs
                                                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 007D33A2
                                                            • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00793A04
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: IconLoadNotifyShell_String_wcslen
                                                          • String ID: Line:
                                                          • API String ID: 2289894680-1585850449
                                                          • Opcode ID: 144237a5fdc609f7cccada962d3bf688dfd29444f4b4c51b1bc335682e86a814
                                                          • Instruction ID: 2fdb00029ab7ed4d7db430bf05aacc577d295dbbb240c7a3af1a915a491b316a
                                                          • Opcode Fuzzy Hash: 144237a5fdc609f7cccada962d3bf688dfd29444f4b4c51b1bc335682e86a814
                                                          • Instruction Fuzzy Hash: 7F31B871408300AADB25EB10EC49FEFB7E8BB44714F14451EF59993292DB7CA649C7C2
                                                          APIs
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 007B0668
                                                            • Part of subcall function 007B32A4: RaiseException.KERNEL32(?,?,?,007B068A,?,00861444,?,?,?,?,?,?,007B068A,00791129,00858738,00791129), ref: 007B3304
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 007B0685
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$ExceptionRaise
                                                          • String ID: Unknown exception
                                                          • API String ID: 3476068407-410509341
                                                          • Opcode ID: 32f8c3f8a1a307bed351d67b627b4cf15a218f392094821e8216635faaf5020a
                                                          • Instruction ID: 3626fd04f278ba540db8005f23b9ba1035353744a8bb6961e8f182ee64b1ecff
                                                          • Opcode Fuzzy Hash: 32f8c3f8a1a307bed351d67b627b4cf15a218f392094821e8216635faaf5020a
                                                          • Instruction Fuzzy Hash: 61F0C23490020DF78F14B6A4D85AEDF776CAE40354B608131F924D6592EF79DA69C6C0
                                                          APIs
                                                            • Part of subcall function 00791BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00791BF4
                                                            • Part of subcall function 00791BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00791BFC
                                                            • Part of subcall function 00791BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00791C07
                                                            • Part of subcall function 00791BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00791C12
                                                            • Part of subcall function 00791BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00791C1A
                                                            • Part of subcall function 00791BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00791C22
                                                            • Part of subcall function 00791B4A: RegisterWindowMessageW.USER32(00000004,?,007912C4), ref: 00791BA2
                                                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0079136A
                                                          • OleInitialize.OLE32 ref: 00791388
                                                          • CloseHandle.KERNEL32(00000000,00000000), ref: 007D24AB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                          • String ID:
                                                          • API String ID: 1986988660-0
                                                          • Opcode ID: 26b710dcb7c6dbcc100c2c69d4f86dbe573aa0300342dd89a3340e7b97fd4c13
                                                          • Instruction ID: 738ae330082690405791bbdc6ff39a4a900652620ebc1d55467ed0fde97f0abe
                                                          • Opcode Fuzzy Hash: 26b710dcb7c6dbcc100c2c69d4f86dbe573aa0300342dd89a3340e7b97fd4c13
                                                          • Instruction Fuzzy Hash: 9B71BFB49112018ECF84DFBAB94D659BAE1FB8834475EA23AD10BC7363EBB44445CF85
                                                          APIs
                                                          • CloseHandle.KERNELBASE(00000000,00000000,?,?,007C85CC,?,00858CC8,0000000C), ref: 007C8704
                                                          • GetLastError.KERNEL32(?,007C85CC,?,00858CC8,0000000C), ref: 007C870E
                                                          • __dosmaperr.LIBCMT ref: 007C8739
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseErrorHandleLast__dosmaperr
                                                          • String ID:
                                                          • API String ID: 2583163307-0
                                                          • Opcode ID: 348e4b55f818ce13211189e69421eb253f990cfd02c929ba47121f57de5b561d
                                                          • Instruction ID: 038aedd8378d93648f40ed4e035e14a38a920da34e65a84ba1646d2e9795eb76
                                                          • Opcode Fuzzy Hash: 348e4b55f818ce13211189e69421eb253f990cfd02c929ba47121f57de5b561d
                                                          • Instruction Fuzzy Hash: 75018E3260526066C3B06334684DF7F67494B8177CF39021DF804AB1D3DEADECC18192
                                                          APIs
                                                          • __Init_thread_footer.LIBCMT ref: 007A17F6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Init_thread_footer
                                                          • String ID: CALL
                                                          • API String ID: 1385522511-4196123274
                                                          • Opcode ID: 5f7f20310ea16946041550130c4f84e8f28b38370c7f4d3e2ac7f91195d3232b
                                                          • Instruction ID: 386abfe4fa2cc6255c56fa3ff80ec4ef6cd7231a6847f22c8e390bce480d29e5
                                                          • Opcode Fuzzy Hash: 5f7f20310ea16946041550130c4f84e8f28b38370c7f4d3e2ac7f91195d3232b
                                                          • Instruction Fuzzy Hash: E2229B70608241DFE714CF14C894A2ABBF1BFDA354F548A6DF4968B3A1D739E851CB82
                                                          APIs
                                                          • GetOpenFileNameW.COMDLG32(?), ref: 007D2C8C
                                                            • Part of subcall function 00793AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00793A97,?,?,00792E7F,?,?,?,00000000), ref: 00793AC2
                                                            • Part of subcall function 00792DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00792DC4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Name$Path$FileFullLongOpen
                                                          • String ID: X
                                                          • API String ID: 779396738-3081909835
                                                          • Opcode ID: b0892f50dab0fdb90e979a0c08abf6ee6e34749eb112054469749e03c6d2799d
                                                          • Instruction ID: 6695ef9d248abe62d98f549ebebb0cddeb006256bb336571e705132d4875a4cb
                                                          • Opcode Fuzzy Hash: b0892f50dab0fdb90e979a0c08abf6ee6e34749eb112054469749e03c6d2799d
                                                          • Instruction Fuzzy Hash: FA219971A102589FDF41EF94D849BDE7BF8AF48305F404059E505E7341EBB8594E8F61
                                                          APIs
                                                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00793908
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_
                                                          • String ID:
                                                          • API String ID: 1144537725-0
                                                          • Opcode ID: b5dddf3616de1c14322087bba828c515b648396e8c795a4b88e7caeae5184eb1
                                                          • Instruction ID: 2f3ebd533947ee924f3b2a3686ff50593c3ea215e7337e3bdf96b13b0f1c93eb
                                                          • Opcode Fuzzy Hash: b5dddf3616de1c14322087bba828c515b648396e8c795a4b88e7caeae5184eb1
                                                          • Instruction Fuzzy Hash: 71318070504301DFDB20DF24E989B97BBE4FB49718F04092EF59A87341E7B9AA44CB92
                                                          APIs
                                                            • Part of subcall function 00794E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00794EDD,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794E9C
                                                            • Part of subcall function 00794E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00794EAE
                                                            • Part of subcall function 00794E90: FreeLibrary.KERNEL32(00000000,?,?,00794EDD,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794EC0
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794EFD
                                                            • Part of subcall function 00794E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,007D3CDE,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794E62
                                                            • Part of subcall function 00794E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00794E74
                                                            • Part of subcall function 00794E59: FreeLibrary.KERNEL32(00000000,?,?,007D3CDE,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794E87
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$Load$AddressFreeProc
                                                          • String ID:
                                                          • API String ID: 2632591731-0
                                                          • Opcode ID: 6b0ad246482d5bcc4af6abb3e9e1b2656c99c02d8eff87cb9adcf234ab7ebb1d
                                                          • Instruction ID: 4608e6460e2bfca4f21fd3460a3852ce9c5619733259aed49a218a51784e7ec1
                                                          • Opcode Fuzzy Hash: 6b0ad246482d5bcc4af6abb3e9e1b2656c99c02d8eff87cb9adcf234ab7ebb1d
                                                          • Instruction Fuzzy Hash: 72110632610216EACF24FF74EC0AFAD77A6AF40750F10842EF542B62D1EE789E469750
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: __wsopen_s
                                                          • String ID:
                                                          • API String ID: 3347428461-0
                                                          • Opcode ID: 0e3e01f478f0258b616d666f9a9170da5369c23d459bd0903d20ef8a05105f49
                                                          • Instruction ID: 7bb2b5691baea7f0c2c3c6a4ae491c475b1ed32b7a06d529656d13672050ff95
                                                          • Opcode Fuzzy Hash: 0e3e01f478f0258b616d666f9a9170da5369c23d459bd0903d20ef8a05105f49
                                                          • Instruction Fuzzy Hash: FC11187590410AAFCB09DF58E945E9A7BF5EF48314F154069FC08AB312DA31EA11CBA5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                          • Instruction ID: 7bb0f0430eb54cbbb47a9fce119b1fbec87699e6dee5000cb9f6e4fa74dbe20c
                                                          • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                          • Instruction Fuzzy Hash: C1F0C832511A14EAD7313A699C0DFDA37989F52339F10072DF925D33D2DB7CE80286A6
                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(00000000,?,00861444,?,007AFDF5,?,?,0079A976,00000010,00861440,007913FC,?,007913C6,?,00791129), ref: 007C3852
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1279760036-0
                                                          • Opcode ID: 8bfe129dfaa8ca46d198a6b2e6fc050d4d607ed43eb5b0f1de04e6591ac01abc
                                                          • Instruction ID: 07332740cedc7133cc962f4ceeded3eb6984d74b6c6f6981516ee786fe0059a7
                                                          • Opcode Fuzzy Hash: 8bfe129dfaa8ca46d198a6b2e6fc050d4d607ed43eb5b0f1de04e6591ac01abc
                                                          • Instruction Fuzzy Hash: 03E0E532104624AAF6312A669C09FEA37D8AB42BB0F09802EFC0592581CB1CDD0185F0
                                                          APIs
                                                          • FreeLibrary.KERNEL32(?,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794F6D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: FreeLibrary
                                                          • String ID:
                                                          • API String ID: 3664257935-0
                                                          • Opcode ID: 4cf7c5689717d4d054889eadd488f04ae3ac5b7b44b46e583645f250e3ce79b2
                                                          • Instruction ID: 0e67bf06989733bd46296256f6149fd0240226587a8bc39da44dcc509a31d4be
                                                          • Opcode Fuzzy Hash: 4cf7c5689717d4d054889eadd488f04ae3ac5b7b44b46e583645f250e3ce79b2
                                                          • Instruction Fuzzy Hash: F0F03971105752CFDF349F64E494C66BBE6FF143293288A7EE1EA82621C7399845DF10
                                                          APIs
                                                          • Shell_NotifyIconW.SHELL32(00000002,?), ref: 0079314E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_
                                                          • String ID:
                                                          • API String ID: 1144537725-0
                                                          • Opcode ID: 5cac19a2d90a0d7d5cc49f7d1b29aae9b93343ef7e94b52d41423b01951069ed
                                                          • Instruction ID: 654498989bdc73b2077ec103a7ef98db9f1c363d2a2dec2b83f7ab59727ed30d
                                                          • Opcode Fuzzy Hash: 5cac19a2d90a0d7d5cc49f7d1b29aae9b93343ef7e94b52d41423b01951069ed
                                                          • Instruction Fuzzy Hash: 9FF0A7709043089FEB529B24DC49BDA7BFCB701708F0400E5E14997392D7B85788CF81
                                                          APIs
                                                          • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00792DC4
                                                            • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: LongNamePath_wcslen
                                                          • String ID:
                                                          • API String ID: 541455249-0
                                                          • Opcode ID: 997c9b6fc8f19d5a5c771d19df4cb0670038ed7d52bb793577be507ebf3cf128
                                                          • Instruction ID: a2e3175cc91fe7520817b2dfa6f963f0b0fba8e271ecbdcf22382962eb9483d2
                                                          • Opcode Fuzzy Hash: 997c9b6fc8f19d5a5c771d19df4cb0670038ed7d52bb793577be507ebf3cf128
                                                          • Instruction Fuzzy Hash: 85E0CD726001249BCB209398DC09FEA77EDDFC8790F044171FD09D724CDA64AD848550
                                                          APIs
                                                            • Part of subcall function 00793837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00793908
                                                            • Part of subcall function 0079D730: GetInputState.USER32 ref: 0079D807
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00792B6B
                                                            • Part of subcall function 007930F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 0079314E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                          • String ID:
                                                          • API String ID: 3667716007-0
                                                          • Opcode ID: 4d7e7fab0a873c5b38a5752417760c00142bf77593179257a43a6b83af0d061b
                                                          • Instruction ID: c9c7c91cda7b62c87ad5b59d47a01f173c7cb81440686caa6b04665ce1df4674
                                                          • Opcode Fuzzy Hash: 4d7e7fab0a873c5b38a5752417760c00142bf77593179257a43a6b83af0d061b
                                                          • Instruction Fuzzy Hash: C3E0262130020486CE08BBB5B85E87DA38AABD1351F40143EF242831A3DE2C494A4252
                                                          APIs
                                                          • CreateFileW.KERNELBASE(00000000,00000000,?,007D0704,?,?,00000000,?,007D0704,00000000,0000000C), ref: 007D03B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateFile
                                                          • String ID:
                                                          • API String ID: 823142352-0
                                                          • Opcode ID: 004e4a2504058e6188035501fcd7b60f631c654d2630587c800ad25ee0b3f8f0
                                                          • Instruction ID: 50dd765e8125d2160cd10d6c859b739a08b8a276e089b88899d424796b31df96
                                                          • Opcode Fuzzy Hash: 004e4a2504058e6188035501fcd7b60f631c654d2630587c800ad25ee0b3f8f0
                                                          • Instruction Fuzzy Hash: 4FD06C3204010DBBDF128F84DD06EDA3BAAFB48714F018000BE1856020C732E832AB90
                                                          APIs
                                                          • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00791CBC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: InfoParametersSystem
                                                          • String ID:
                                                          • API String ID: 3098949447-0
                                                          • Opcode ID: f981dc6f2a027177d5094b34aa241f08e2033c2447979bae6667f8eb4135b8e4
                                                          • Instruction ID: 666b9bc7056fadd4f3b1fa689200c29b2859419a5c5e8daec44f423b0fe6eb51
                                                          • Opcode Fuzzy Hash: f981dc6f2a027177d5094b34aa241f08e2033c2447979bae6667f8eb4135b8e4
                                                          • Instruction Fuzzy Hash: 2DC09236280304AFF6258B80BE4EF247764B758B00F099001F60AA96E3C3E26820EA90
                                                          APIs
                                                            • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                          • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0082961A
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0082965B
                                                          • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0082969F
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 008296C9
                                                          • SendMessageW.USER32 ref: 008296F2
                                                          • GetKeyState.USER32(00000011), ref: 0082978B
                                                          • GetKeyState.USER32(00000009), ref: 00829798
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 008297AE
                                                          • GetKeyState.USER32(00000010), ref: 008297B8
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 008297E9
                                                          • SendMessageW.USER32 ref: 00829810
                                                          • SendMessageW.USER32(?,00001030,?,00827E95), ref: 00829918
                                                          • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0082992E
                                                          • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00829941
                                                          • SetCapture.USER32(?), ref: 0082994A
                                                          • ClientToScreen.USER32(?,?), ref: 008299AF
                                                          • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 008299BC
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 008299D6
                                                          • ReleaseCapture.USER32 ref: 008299E1
                                                          • GetCursorPos.USER32(?), ref: 00829A19
                                                          • ScreenToClient.USER32(?,?), ref: 00829A26
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00829A80
                                                          • SendMessageW.USER32 ref: 00829AAE
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00829AEB
                                                          • SendMessageW.USER32 ref: 00829B1A
                                                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00829B3B
                                                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00829B4A
                                                          • GetCursorPos.USER32(?), ref: 00829B68
                                                          • ScreenToClient.USER32(?,?), ref: 00829B75
                                                          • GetParent.USER32(?), ref: 00829B93
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00829BFA
                                                          • SendMessageW.USER32 ref: 00829C2B
                                                          • ClientToScreen.USER32(?,?), ref: 00829C84
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00829CB4
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00829CDE
                                                          • SendMessageW.USER32 ref: 00829D01
                                                          • ClientToScreen.USER32(?,?), ref: 00829D4E
                                                          • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00829D82
                                                            • Part of subcall function 007A9944: GetWindowLongW.USER32(?,000000EB), ref: 007A9952
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00829E05
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                          • String ID: @GUI_DRAGID$F
                                                          • API String ID: 3429851547-4164748364
                                                          • Opcode ID: 8e1c27fa4a237ca7aef404305f49132a18adfe0583d54bc3fbc9a5ccdadbba82
                                                          • Instruction ID: 4a1f28d18568b38dfdee9ff48bffe747953bd6a735ddb6c99f88c26092201aa4
                                                          • Opcode Fuzzy Hash: 8e1c27fa4a237ca7aef404305f49132a18adfe0583d54bc3fbc9a5ccdadbba82
                                                          • Instruction Fuzzy Hash: 72429B34204210AFDB20CF68DC48AAABBE5FF99310F15461DF699C72A1E771E8A1CF51
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 008248F3
                                                          • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00824908
                                                          • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00824927
                                                          • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 0082494B
                                                          • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 0082495C
                                                          • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 0082497B
                                                          • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 008249AE
                                                          • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 008249D4
                                                          • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00824A0F
                                                          • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00824A56
                                                          • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00824A7E
                                                          • IsMenu.USER32(?), ref: 00824A97
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00824AF2
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00824B20
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00824B94
                                                          • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00824BE3
                                                          • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00824C82
                                                          • wsprintfW.USER32 ref: 00824CAE
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00824CC9
                                                          • GetWindowTextW.USER32(?,00000000,00000001), ref: 00824CF1
                                                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00824D13
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00824D33
                                                          • GetWindowTextW.USER32(?,00000000,00000001), ref: 00824D5A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                          • String ID: %d/%02d/%02d
                                                          • API String ID: 4054740463-328681919
                                                          • Opcode ID: 525cf05a5cebb12ee71a563c17ee111be99b2042e916e12b3b9cd0d5c216fa25
                                                          • Instruction ID: aa01ab2cd42fd019fba34516a20200475caa48fe33463ee4adb058d5fc8d755c
                                                          • Opcode Fuzzy Hash: 525cf05a5cebb12ee71a563c17ee111be99b2042e916e12b3b9cd0d5c216fa25
                                                          • Instruction Fuzzy Hash: 3212D071500228ABEB248F28ED49FBE7BF8FF85714F105129F516DA2E1DB749981CB60
                                                          APIs
                                                          • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 007AF998
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 007EF474
                                                          • IsIconic.USER32(00000000), ref: 007EF47D
                                                          • ShowWindow.USER32(00000000,00000009), ref: 007EF48A
                                                          • SetForegroundWindow.USER32(00000000), ref: 007EF494
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 007EF4AA
                                                          • GetCurrentThreadId.KERNEL32 ref: 007EF4B1
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 007EF4BD
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 007EF4CE
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 007EF4D6
                                                          • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 007EF4DE
                                                          • SetForegroundWindow.USER32(00000000), ref: 007EF4E1
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 007EF4F6
                                                          • keybd_event.USER32(00000012,00000000), ref: 007EF501
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 007EF50B
                                                          • keybd_event.USER32(00000012,00000000), ref: 007EF510
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 007EF519
                                                          • keybd_event.USER32(00000012,00000000), ref: 007EF51E
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 007EF528
                                                          • keybd_event.USER32(00000012,00000000), ref: 007EF52D
                                                          • SetForegroundWindow.USER32(00000000), ref: 007EF530
                                                          • AttachThreadInput.USER32(?,000000FF,00000000), ref: 007EF557
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 4125248594-2988720461
                                                          • Opcode ID: 6b7f21e4564a87992630fafc7180233029efae4f20c4479336457e120cb54a07
                                                          • Instruction ID: 2d3897dfa6400a26ca3d656342a7f540263c416d755d12ca45cc08510e494c5c
                                                          • Opcode Fuzzy Hash: 6b7f21e4564a87992630fafc7180233029efae4f20c4479336457e120cb54a07
                                                          • Instruction Fuzzy Hash: DD317471A40258BFEB316FB65C4AFBF7E6CFB48B50F104065FA01E61D1C6B49D11AAA0
                                                          APIs
                                                            • Part of subcall function 007F16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 007F170D
                                                            • Part of subcall function 007F16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 007F173A
                                                            • Part of subcall function 007F16C3: GetLastError.KERNEL32 ref: 007F174A
                                                          • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 007F1286
                                                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 007F12A8
                                                          • CloseHandle.KERNEL32(?), ref: 007F12B9
                                                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 007F12D1
                                                          • GetProcessWindowStation.USER32 ref: 007F12EA
                                                          • SetProcessWindowStation.USER32(00000000), ref: 007F12F4
                                                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 007F1310
                                                            • Part of subcall function 007F10BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,007F11FC), ref: 007F10D4
                                                            • Part of subcall function 007F10BF: CloseHandle.KERNEL32(?,?,007F11FC), ref: 007F10E9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                          • String ID: $default$winsta0
                                                          • API String ID: 22674027-1027155976
                                                          • Opcode ID: cd4952f7a782da7ba237e16b126c3a02ee2b1a1f8d291d651d9233edc86d5115
                                                          • Instruction ID: 3387e1024a864a21c27968c27e2409fcd3b485cac4c2bc1541e1bb20b1e3d2a2
                                                          • Opcode Fuzzy Hash: cd4952f7a782da7ba237e16b126c3a02ee2b1a1f8d291d651d9233edc86d5115
                                                          • Instruction Fuzzy Hash: EA817871900249EFDF259FA8DC49BFE7BB9FF44704F148129FA11A62A0D7398945CB60
                                                          APIs
                                                            • Part of subcall function 007F10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 007F1114
                                                            • Part of subcall function 007F10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F1120
                                                            • Part of subcall function 007F10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F112F
                                                            • Part of subcall function 007F10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F1136
                                                            • Part of subcall function 007F10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 007F114D
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 007F0BCC
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 007F0C00
                                                          • GetLengthSid.ADVAPI32(?), ref: 007F0C17
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 007F0C51
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 007F0C6D
                                                          • GetLengthSid.ADVAPI32(?), ref: 007F0C84
                                                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 007F0C8C
                                                          • HeapAlloc.KERNEL32(00000000), ref: 007F0C93
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 007F0CB4
                                                          • CopySid.ADVAPI32(00000000), ref: 007F0CBB
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 007F0CEA
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 007F0D0C
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 007F0D1E
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F0D45
                                                          • HeapFree.KERNEL32(00000000), ref: 007F0D4C
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F0D55
                                                          • HeapFree.KERNEL32(00000000), ref: 007F0D5C
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F0D65
                                                          • HeapFree.KERNEL32(00000000), ref: 007F0D6C
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 007F0D78
                                                          • HeapFree.KERNEL32(00000000), ref: 007F0D7F
                                                            • Part of subcall function 007F1193: GetProcessHeap.KERNEL32(00000008,007F0BB1,?,00000000,?,007F0BB1,?), ref: 007F11A1
                                                            • Part of subcall function 007F1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,007F0BB1,?), ref: 007F11A8
                                                            • Part of subcall function 007F1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,007F0BB1,?), ref: 007F11B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                          • String ID:
                                                          • API String ID: 4175595110-0
                                                          • Opcode ID: 0a216c6cba73808e4c9555374052ff55d141981cebfedf49c65bf6dfda41a37c
                                                          • Instruction ID: 87e917a45c0ed873d60f689c491700a57f99fa2e7f34f4774ee8ded026841f66
                                                          • Opcode Fuzzy Hash: 0a216c6cba73808e4c9555374052ff55d141981cebfedf49c65bf6dfda41a37c
                                                          • Instruction Fuzzy Hash: 00715C75A0020EABDF20DFA4DC45FFEBBB9BF04300F148515EA14A6392D775A906CBA0
                                                          APIs
                                                          • OpenClipboard.USER32(0082CC08), ref: 0080EB29
                                                          • IsClipboardFormatAvailable.USER32(0000000D), ref: 0080EB37
                                                          • GetClipboardData.USER32(0000000D), ref: 0080EB43
                                                          • CloseClipboard.USER32 ref: 0080EB4F
                                                          • GlobalLock.KERNEL32(00000000), ref: 0080EB87
                                                          • CloseClipboard.USER32 ref: 0080EB91
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 0080EBBC
                                                          • IsClipboardFormatAvailable.USER32(00000001), ref: 0080EBC9
                                                          • GetClipboardData.USER32(00000001), ref: 0080EBD1
                                                          • GlobalLock.KERNEL32(00000000), ref: 0080EBE2
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 0080EC22
                                                          • IsClipboardFormatAvailable.USER32(0000000F), ref: 0080EC38
                                                          • GetClipboardData.USER32(0000000F), ref: 0080EC44
                                                          • GlobalLock.KERNEL32(00000000), ref: 0080EC55
                                                          • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0080EC77
                                                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0080EC94
                                                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0080ECD2
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 0080ECF3
                                                          • CountClipboardFormats.USER32 ref: 0080ED14
                                                          • CloseClipboard.USER32 ref: 0080ED59
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                          • String ID:
                                                          • API String ID: 420908878-0
                                                          • Opcode ID: 5ae28e4d00a9c437e9ae791fc4b421f5cbb13a56e76bc9762b5e9ec11935ed50
                                                          • Instruction ID: 08ccb7095ff6cdc30b60d8fc6a226bf15b8074d5f3d69deb092d368a5544fbae
                                                          • Opcode Fuzzy Hash: 5ae28e4d00a9c437e9ae791fc4b421f5cbb13a56e76bc9762b5e9ec11935ed50
                                                          • Instruction Fuzzy Hash: E7619935204205AFD710EF28DC99E3AB7A4FF84714F04891DF856D72A2CB35E906CBA2
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 008069BE
                                                          • FindClose.KERNEL32(00000000), ref: 00806A12
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00806A4E
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00806A75
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00806AB2
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00806ADF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                          • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                          • API String ID: 3830820486-3289030164
                                                          • Opcode ID: 0d2922aba8d92f04852ee4b13451533b2b49aca18caf987190f0ca434c6d5c2d
                                                          • Instruction ID: a313c4aabc67a2b279c05082c132daf825af2ba28705b16824fafbaa467cbd9f
                                                          • Opcode Fuzzy Hash: 0d2922aba8d92f04852ee4b13451533b2b49aca18caf987190f0ca434c6d5c2d
                                                          • Instruction Fuzzy Hash: 37D15DB2508340EEC714EBA4DC85EABB7E8FF89704F44491DF585D6191EB38DA18CB62
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00809663
                                                          • GetFileAttributesW.KERNEL32(?), ref: 008096A1
                                                          • SetFileAttributesW.KERNEL32(?,?), ref: 008096BB
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 008096D3
                                                          • FindClose.KERNEL32(00000000), ref: 008096DE
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 008096FA
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0080974A
                                                          • SetCurrentDirectoryW.KERNEL32(00856B7C), ref: 00809768
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00809772
                                                          • FindClose.KERNEL32(00000000), ref: 0080977F
                                                          • FindClose.KERNEL32(00000000), ref: 0080978F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                          • String ID: *.*
                                                          • API String ID: 1409584000-438819550
                                                          • Opcode ID: 8550aa92e28889332113344556a5514fc490aa553ebbc1b9a30c2dabb81bcc6c
                                                          • Instruction ID: 65070dd117a2c54228a01f108d7f41920a9ec575a44ff318598d138c8820a665
                                                          • Opcode Fuzzy Hash: 8550aa92e28889332113344556a5514fc490aa553ebbc1b9a30c2dabb81bcc6c
                                                          • Instruction Fuzzy Hash: 1031F172541219AECB20EFB4EC09AEE77ACFF09320F108155F8A5E31E1EB35DE458A50
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 008097BE
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00809819
                                                          • FindClose.KERNEL32(00000000), ref: 00809824
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00809840
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00809890
                                                          • SetCurrentDirectoryW.KERNEL32(00856B7C), ref: 008098AE
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 008098B8
                                                          • FindClose.KERNEL32(00000000), ref: 008098C5
                                                          • FindClose.KERNEL32(00000000), ref: 008098D5
                                                            • Part of subcall function 007FDAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 007FDB00
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                          • String ID: *.*
                                                          • API String ID: 2640511053-438819550
                                                          • Opcode ID: 84ece0104f62e23f9625e7732de773188bf5ca4b8466d2b086356c7fdfcde44b
                                                          • Instruction ID: 0b29b097577971a94591eb8085efcce5d01ab285b588696a001104242ea885fc
                                                          • Opcode Fuzzy Hash: 84ece0104f62e23f9625e7732de773188bf5ca4b8466d2b086356c7fdfcde44b
                                                          • Instruction Fuzzy Hash: 0431C571501619AEDB20EFB4EC48AEE77ACFF06320F108165E950E22D1DB35DD498A60
                                                          APIs
                                                            • Part of subcall function 0081C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0081B6AE,?,?), ref: 0081C9B5
                                                            • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081C9F1
                                                            • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA68
                                                            • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0081BF3E
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 0081BFA9
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 0081BFCD
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0081C02C
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 0081C0E7
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0081C154
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0081C1E9
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 0081C23A
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0081C2E3
                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0081C382
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 0081C38F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                          • String ID:
                                                          • API String ID: 3102970594-0
                                                          • Opcode ID: b06af5cc714d7ab7ac897a52f1320200130d01fbe1f85092fb4b706d87cb1a69
                                                          • Instruction ID: 12042d6074a9fb7cef3ec8ba5b29fc551de4b4e5d705530a95eab6b8b37ad93a
                                                          • Opcode Fuzzy Hash: b06af5cc714d7ab7ac897a52f1320200130d01fbe1f85092fb4b706d87cb1a69
                                                          • Instruction Fuzzy Hash: FF022C71604200AFD714DF28C895E6ABBE9FF49318F18849DF45ACB2A2DB31ED46CB51
                                                          APIs
                                                          • GetLocalTime.KERNEL32(?), ref: 00808257
                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 00808267
                                                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00808273
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00808310
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00808324
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00808356
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0080838C
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00808395
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectoryTime$File$Local$System
                                                          • String ID: *.*
                                                          • API String ID: 1464919966-438819550
                                                          • Opcode ID: 32df0a72be52f69511aaaaceba6651a46850aa2783d903c11f00402401511753
                                                          • Instruction ID: b0d016f65493d0c55fbcc146c4f6b2bc6410b579ce76592a819203a6967cd945
                                                          • Opcode Fuzzy Hash: 32df0a72be52f69511aaaaceba6651a46850aa2783d903c11f00402401511753
                                                          • Instruction Fuzzy Hash: CE615972508705DFCB10EF64D8449AEB3E8FF89314F04892AF999C7291EB35E945CB92
                                                          APIs
                                                            • Part of subcall function 00793AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00793A97,?,?,00792E7F,?,?,?,00000000), ref: 00793AC2
                                                            • Part of subcall function 007FE199: GetFileAttributesW.KERNEL32(?,007FCF95), ref: 007FE19A
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 007FD122
                                                          • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 007FD1DD
                                                          • MoveFileW.KERNEL32(?,?), ref: 007FD1F0
                                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 007FD20D
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 007FD237
                                                            • Part of subcall function 007FD29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,007FD21C,?,?), ref: 007FD2B2
                                                          • FindClose.KERNEL32(00000000,?,?,?), ref: 007FD253
                                                          • FindClose.KERNEL32(00000000), ref: 007FD264
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 1946585618-1173974218
                                                          • Opcode ID: 3f0aaebfc227b29100fca08829198ac24a58a8f8e23cada6bf91ddfd719af62b
                                                          • Instruction ID: 04191d91f9bf6f52465efc0b8b95500bf80acb6f9107eb32e1f83c98e7282544
                                                          • Opcode Fuzzy Hash: 3f0aaebfc227b29100fca08829198ac24a58a8f8e23cada6bf91ddfd719af62b
                                                          • Instruction Fuzzy Hash: 6F617C3180110DEACF15EBE4DA969FDB7B6BF15300F208169E50177291EB396F09CBA1
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                          • String ID:
                                                          • API String ID: 1737998785-0
                                                          • Opcode ID: bc61fa30c478d5a84f4bcd1d00fed7fb2bbd9dfe08766cfc104d6bf549784e87
                                                          • Instruction ID: bb1eecc316680dd2c4aec7f9a0ed8a77d646f7ab90a8dda14c185d0832c2ce75
                                                          • Opcode Fuzzy Hash: bc61fa30c478d5a84f4bcd1d00fed7fb2bbd9dfe08766cfc104d6bf549784e87
                                                          • Instruction Fuzzy Hash: 8C417E35204611DFE760DF15D848B2ABBA5FF44318F58C499E819CB6A2C775EC42CB90
                                                          APIs
                                                            • Part of subcall function 007F16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 007F170D
                                                            • Part of subcall function 007F16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 007F173A
                                                            • Part of subcall function 007F16C3: GetLastError.KERNEL32 ref: 007F174A
                                                          • ExitWindowsEx.USER32(?,00000000), ref: 007FE932
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                          • String ID: $ $@$SeShutdownPrivilege
                                                          • API String ID: 2234035333-3163812486
                                                          • Opcode ID: cbca14323ac431514cfdfab91b27f15428a74acb46d8b259b3216f3807c9c733
                                                          • Instruction ID: 44afdb9294037cbc9a906ebf56e6d56622e1916894a42899d225520d93447870
                                                          • Opcode Fuzzy Hash: cbca14323ac431514cfdfab91b27f15428a74acb46d8b259b3216f3807c9c733
                                                          • Instruction Fuzzy Hash: A201DB72610219EBEB64A7749C89FBF729CAB14751F154521FE12E23E1D9E86C4081B1
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00811276
                                                          • WSAGetLastError.WSOCK32 ref: 00811283
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 008112BA
                                                          • WSAGetLastError.WSOCK32 ref: 008112C5
                                                          • closesocket.WSOCK32(00000000), ref: 008112F4
                                                          • listen.WSOCK32(00000000,00000005), ref: 00811303
                                                          • WSAGetLastError.WSOCK32 ref: 0081130D
                                                          • closesocket.WSOCK32(00000000), ref: 0081133C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$closesocket$bindlistensocket
                                                          • String ID:
                                                          • API String ID: 540024437-0
                                                          • Opcode ID: bebaa16c9be4a17a5c868d2b6a6b1432acfdc221606e342b04ff5708daa9747a
                                                          • Instruction ID: ec508aa8479262f5f4677ec24c773585f7a1b135f74fdd559990848d93d8cff5
                                                          • Opcode Fuzzy Hash: bebaa16c9be4a17a5c868d2b6a6b1432acfdc221606e342b04ff5708daa9747a
                                                          • Instruction Fuzzy Hash: DB417D316001409FDB20DF24D488B69BBEAFF46318F18C198E9569F296C775EC82CBA1
                                                          APIs
                                                            • Part of subcall function 00793AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00793A97,?,?,00792E7F,?,?,?,00000000), ref: 00793AC2
                                                            • Part of subcall function 007FE199: GetFileAttributesW.KERNEL32(?,007FCF95), ref: 007FE19A
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 007FD420
                                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 007FD470
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 007FD481
                                                          • FindClose.KERNEL32(00000000), ref: 007FD498
                                                          • FindClose.KERNEL32(00000000), ref: 007FD4A1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 2649000838-1173974218
                                                          • Opcode ID: 5d29e3602c3ceacac4ada50f09f09f57b2f410069520c73429460c04c078f4d1
                                                          • Instruction ID: 1c9008397c8bd582ac5b724000111ff6edef299f1866e6f7b06a465acd0feab2
                                                          • Opcode Fuzzy Hash: 5d29e3602c3ceacac4ada50f09f09f57b2f410069520c73429460c04c078f4d1
                                                          • Instruction Fuzzy Hash: B3319031008385EBC710EF64D8558BFB7E9BE91314F408A1DF9D593291EB28AE09D763
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: __floor_pentium4
                                                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                          • API String ID: 4168288129-2761157908
                                                          • Opcode ID: 040a8d22a5d9694257d84049090ac90afc9f993267212bf8d046ac6ac37b54c7
                                                          • Instruction ID: e5beb4df6eaee2b1ac73ac987d046b2329fc44e2ec0222b5e6bd4f1170046017
                                                          • Opcode Fuzzy Hash: 040a8d22a5d9694257d84049090ac90afc9f993267212bf8d046ac6ac37b54c7
                                                          • Instruction Fuzzy Hash: FBC21B72E046288FDB25CE28DD45BEAB7B6EB48305F1541EED44DE7241E778AE818F40
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 008064DC
                                                          • CoInitialize.OLE32(00000000), ref: 00806639
                                                          • CoCreateInstance.OLE32(0082FCF8,00000000,00000001,0082FB68,?), ref: 00806650
                                                          • CoUninitialize.OLE32 ref: 008068D4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                          • String ID: .lnk
                                                          • API String ID: 886957087-24824748
                                                          • Opcode ID: b605831bc5631adc4cd5d4d1ee6cfe9ca56e840d3c380a2227d88499d22125dd
                                                          • Instruction ID: beb57eb1727d87fd2c3c3f3300dd572f8244e3ba3f83329b05d8510d25f6ca2b
                                                          • Opcode Fuzzy Hash: b605831bc5631adc4cd5d4d1ee6cfe9ca56e840d3c380a2227d88499d22125dd
                                                          • Instruction Fuzzy Hash: F7D16771508201AFD714EF24D885E6BB7E9FF98704F00492DF595CB2A1EB30E919CBA2
                                                          APIs
                                                          • GetForegroundWindow.USER32(?,?,00000000), ref: 008122E8
                                                            • Part of subcall function 0080E4EC: GetWindowRect.USER32(?,?), ref: 0080E504
                                                          • GetDesktopWindow.USER32 ref: 00812312
                                                          • GetWindowRect.USER32(00000000), ref: 00812319
                                                          • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00812355
                                                          • GetCursorPos.USER32(?), ref: 00812381
                                                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 008123DF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                          • String ID:
                                                          • API String ID: 2387181109-0
                                                          • Opcode ID: 7c9e5c82ff1c150a47180dbac0b27e0e5661c3a9ccc10e68fbffe9b4e46f558a
                                                          • Instruction ID: a0ddd38641ed2b6b1a5b319bf4f7ad8d41003acb4e425e3e97b7a2aa16909f1e
                                                          • Opcode Fuzzy Hash: 7c9e5c82ff1c150a47180dbac0b27e0e5661c3a9ccc10e68fbffe9b4e46f558a
                                                          • Instruction Fuzzy Hash: 3231FC72104305AFC720DF14C848BABBBADFF88314F000A19F994D72A1DB34EA59CB92
                                                          APIs
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                          • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00809B78
                                                          • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00809C8B
                                                            • Part of subcall function 00803874: GetInputState.USER32 ref: 008038CB
                                                            • Part of subcall function 00803874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00803966
                                                          • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00809BA8
                                                          • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00809C75
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                          • String ID: *.*
                                                          • API String ID: 1972594611-438819550
                                                          • Opcode ID: f0c218b7ce49d364968849ab756b7f5bea74864ec069f06cbcc37ad9369d9368
                                                          • Instruction ID: 550ddd6c60c5b4e53ac3df685cfc47eba43177a81d3869b04e318d8a7dab7795
                                                          • Opcode Fuzzy Hash: f0c218b7ce49d364968849ab756b7f5bea74864ec069f06cbcc37ad9369d9368
                                                          • Instruction Fuzzy Hash: C3415D7190020AAFDF54DF64DC49AEEBBB8FF05310F248156E855E2192EB349E84CB61
                                                          APIs
                                                            • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                          • DefDlgProcW.USER32(?,?,?,?,?), ref: 007A9A4E
                                                          • GetSysColor.USER32(0000000F), ref: 007A9B23
                                                          • SetBkColor.GDI32(?,00000000), ref: 007A9B36
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$LongProcWindow
                                                          • String ID:
                                                          • API String ID: 3131106179-0
                                                          • Opcode ID: 036f94cbefc01d2c5606c28b173e987d4b8a19b98a5e29c31a194aba90634a71
                                                          • Instruction ID: b70c9863afa87f6ccf1faf51e98147ac3fd007f0a3af4b3cf04d8856e6dfc925
                                                          • Opcode Fuzzy Hash: 036f94cbefc01d2c5606c28b173e987d4b8a19b98a5e29c31a194aba90634a71
                                                          • Instruction Fuzzy Hash: 77A12B7010A454BEE72C9A3D9C4DE7B3A9DFBC7344F15830AF602C6692CA2D9D61D272
                                                          APIs
                                                            • Part of subcall function 0081304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0081307A
                                                            • Part of subcall function 0081304E: _wcslen.LIBCMT ref: 0081309B
                                                          • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0081185D
                                                          • WSAGetLastError.WSOCK32 ref: 00811884
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 008118DB
                                                          • WSAGetLastError.WSOCK32 ref: 008118E6
                                                          • closesocket.WSOCK32(00000000), ref: 00811915
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 1601658205-0
                                                          • Opcode ID: 3308bc399637b6b9ebfd79aae8713a9d7c012759f3e03209a9adc9cd533cb877
                                                          • Instruction ID: f63b7758ce9b8d65172c948cf763552459ad3228474c2798a17fdccd5dfe83ab
                                                          • Opcode Fuzzy Hash: 3308bc399637b6b9ebfd79aae8713a9d7c012759f3e03209a9adc9cd533cb877
                                                          • Instruction Fuzzy Hash: 7351C271A002009FDB10AF24D88AF6A77E5EF49718F48C558F9059F3C3D775AD418BA1
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                          • String ID:
                                                          • API String ID: 292994002-0
                                                          • Opcode ID: 7016e73022356559ed53bb44ee01d44294adf87be963d826bb247f4f1b3afe37
                                                          • Instruction ID: e7a45d9df50a8f6afc4c8049a6f61efacfb05bd5c490f97fba0936bd961baa57
                                                          • Opcode Fuzzy Hash: 7016e73022356559ed53bb44ee01d44294adf87be963d826bb247f4f1b3afe37
                                                          • Instruction Fuzzy Hash: C221F9357402209FDB218F1AE848B2A7BE5FFA5314F69806CE846CB351C775EC82CB90
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                          • API String ID: 0-1546025612
                                                          • Opcode ID: 051add98d6b3c9d7ae63df98d26b7f7a0fb879394e2b73a67e34d138380520ec
                                                          • Instruction ID: 974301e3b955ccde248a0c0b1c79022884b9df21816303eb6f9641f88a0bfc86
                                                          • Opcode Fuzzy Hash: 051add98d6b3c9d7ae63df98d26b7f7a0fb879394e2b73a67e34d138380520ec
                                                          • Instruction Fuzzy Hash: F3A29271E0061ACBDF64CF58D8407AEB7B1BF55310F2481AAE815AB385EB789D81CF91
                                                          APIs
                                                          • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 007FAAAC
                                                          • SetKeyboardState.USER32(00000080), ref: 007FAAC8
                                                          • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 007FAB36
                                                          • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 007FAB88
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: de20f5250952d737e07ac6df9216d8410b755cb179ec3e2ee8e76389e1deb8fa
                                                          • Instruction ID: 1f00a8ae82c701095f22f29554fd7c022c8e3aea95d727f8a43e854d9f88cf4a
                                                          • Opcode Fuzzy Hash: de20f5250952d737e07ac6df9216d8410b755cb179ec3e2ee8e76389e1deb8fa
                                                          • Instruction Fuzzy Hash: 2431E7F0A4024CBEFF358A64CC05BFA7BA6BB44320F04821AE689567D1D37D8985D762
                                                          APIs
                                                          • _free.LIBCMT ref: 007CBB7F
                                                            • Part of subcall function 007C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000), ref: 007C29DE
                                                            • Part of subcall function 007C29C8: GetLastError.KERNEL32(00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000,00000000), ref: 007C29F0
                                                          • GetTimeZoneInformation.KERNEL32 ref: 007CBB91
                                                          • WideCharToMultiByte.KERNEL32(00000000,?,0086121C,000000FF,?,0000003F,?,?), ref: 007CBC09
                                                          • WideCharToMultiByte.KERNEL32(00000000,?,00861270,000000FF,?,0000003F,?,?,?,0086121C,000000FF,?,0000003F,?,?), ref: 007CBC36
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                          • String ID:
                                                          • API String ID: 806657224-0
                                                          • Opcode ID: 2c26283257a8025157f5f49fbbbe4cc5edda50aaefc72924d9df5fd3ceb296ab
                                                          • Instruction ID: 47004cefb1f2200ca695c988d096407a2f49798dd7aa2e02e2c3a2a883f2d7c5
                                                          • Opcode Fuzzy Hash: 2c26283257a8025157f5f49fbbbe4cc5edda50aaefc72924d9df5fd3ceb296ab
                                                          • Instruction Fuzzy Hash: 34319C70904245DFCB21DF698C96A29BBB8FF45710B19826EF120D73A2D7749D01DB60
                                                          APIs
                                                          • InternetReadFile.WININET(?,?,00000400,?), ref: 0080CE89
                                                          • GetLastError.KERNEL32(?,00000000), ref: 0080CEEA
                                                          • SetEvent.KERNEL32(?,?,00000000), ref: 0080CEFE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorEventFileInternetLastRead
                                                          • String ID:
                                                          • API String ID: 234945975-0
                                                          • Opcode ID: fc2d3c9b1324e93e1d29ee5bf9addd2fed7c7428079ddd1231df8fd9192937a7
                                                          • Instruction ID: d1d93d45a02faf7428e7540e0cafd90b1009604fe8d440e13d7199934aa59bf5
                                                          • Opcode Fuzzy Hash: fc2d3c9b1324e93e1d29ee5bf9addd2fed7c7428079ddd1231df8fd9192937a7
                                                          • Instruction Fuzzy Hash: D7217AB1500605DBD7709F65CD48BAA77F8FB40358F20862AE646D2191EB74AA058B64
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 007F82AA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: lstrlen
                                                          • String ID: ($|
                                                          • API String ID: 1659193697-1631851259
                                                          • Opcode ID: edc5c4f791e35850d360c4f9a2443cc049dc3a18317bb51a542309ff71064e72
                                                          • Instruction ID: f3f586babdcf63c422f9b535bde0ecd80988facaba6187fdb36a02a3e08385b2
                                                          • Opcode Fuzzy Hash: edc5c4f791e35850d360c4f9a2443cc049dc3a18317bb51a542309ff71064e72
                                                          • Instruction Fuzzy Hash: 20325574A00609DFCB68CF59C081A6AB7F0FF48710B11C56EE59ADB3A1EB74E981CB41
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00805CC1
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00805D17
                                                          • FindClose.KERNEL32(?), ref: 00805D5F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$CloseFirstNext
                                                          • String ID:
                                                          • API String ID: 3541575487-0
                                                          • Opcode ID: f59679abb8dd50f988c97685b7f54282772166f3d570ec279c393996468aff06
                                                          • Instruction ID: 1b584282d0d0c11570c916a7912afcbcbdf790f4cc136098794888e3fe6cd250
                                                          • Opcode Fuzzy Hash: f59679abb8dd50f988c97685b7f54282772166f3d570ec279c393996468aff06
                                                          • Instruction Fuzzy Hash: B9518675604A01DFC714CF28D898A9AB7E4FF49324F14856EE95A8B3A1DB34E904CFA1
                                                          APIs
                                                          • IsDebuggerPresent.KERNEL32 ref: 007C271A
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 007C2724
                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 007C2731
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                          • String ID:
                                                          • API String ID: 3906539128-0
                                                          • Opcode ID: 4a7e32e5f07ae824d0e7368e204ca651bda278b7e892be04feac4c950d4fa74b
                                                          • Instruction ID: 780563e998dfa7772f88585cf3f37d0919f7075f99a8be88ac9f6dc6cd9ab461
                                                          • Opcode Fuzzy Hash: 4a7e32e5f07ae824d0e7368e204ca651bda278b7e892be04feac4c950d4fa74b
                                                          • Instruction Fuzzy Hash: A231B4749112189BCB21DF64DC89BDDB7B8BF08310F5085EAE41CA7261E7749F818F45
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 008051DA
                                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00805238
                                                          • SetErrorMode.KERNEL32(00000000), ref: 008052A1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DiskFreeSpace
                                                          • String ID:
                                                          • API String ID: 1682464887-0
                                                          • Opcode ID: fd0e58ccfd64a58ea1dfdc47e4942650a3ebb4c1ea7da8d16976e2dba34e51d9
                                                          • Instruction ID: 890025b381fc7699ee46f775be1d96a3fa3ba8f6cc3f18d4cd79616bd6c6c4d4
                                                          • Opcode Fuzzy Hash: fd0e58ccfd64a58ea1dfdc47e4942650a3ebb4c1ea7da8d16976e2dba34e51d9
                                                          • Instruction Fuzzy Hash: DD316175A00518DFDB00DF54D889EAEBBB5FF49314F088099E805AB3A2DB35EC56CB60
                                                          APIs
                                                            • Part of subcall function 007AFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 007B0668
                                                            • Part of subcall function 007AFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 007B0685
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 007F170D
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 007F173A
                                                          • GetLastError.KERNEL32 ref: 007F174A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                          • String ID:
                                                          • API String ID: 577356006-0
                                                          • Opcode ID: 68bf4b9264ee86f1aace78bdc150c6a3598ec2188dc861175f25699a0e09ed20
                                                          • Instruction ID: ef6196f6097aa1db0fd88c95e6ca1b2591b41ae3d9721b91fb176a5806414b14
                                                          • Opcode Fuzzy Hash: 68bf4b9264ee86f1aace78bdc150c6a3598ec2188dc861175f25699a0e09ed20
                                                          • Instruction Fuzzy Hash: 0A1191B2504308EFE728AF54DC8AD7AB7B9FB44714B20852EE05657241EB74BC428A60
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 007FD608
                                                          • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 007FD645
                                                          • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 007FD650
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseControlCreateDeviceFileHandle
                                                          • String ID:
                                                          • API String ID: 33631002-0
                                                          • Opcode ID: d7a1dd615730675d6d5e6a610dfa4485c7c90ca19978b5d668789ef948444176
                                                          • Instruction ID: ceda65a3643ee56a87b00c06d9ac2d41906b3d8ea8a9085e41cf698d49147944
                                                          • Opcode Fuzzy Hash: d7a1dd615730675d6d5e6a610dfa4485c7c90ca19978b5d668789ef948444176
                                                          • Instruction Fuzzy Hash: 57115E75E05228BFDB208F95DC45FAFBBBCEB45B60F108115F904E7290D6704E058BA1
                                                          APIs
                                                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 007F168C
                                                          • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 007F16A1
                                                          • FreeSid.ADVAPI32(?), ref: 007F16B1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: AllocateCheckFreeInitializeMembershipToken
                                                          • String ID:
                                                          • API String ID: 3429775523-0
                                                          • Opcode ID: d0a9ad561a2830413aa48fe6f6edc19e37552e72bb4f9d8af9b3ae48ee94f896
                                                          • Instruction ID: c75f1e9fb1eb370896fca2c36a82ce850ef8f056b3d8528975d299b4ddba53a5
                                                          • Opcode Fuzzy Hash: d0a9ad561a2830413aa48fe6f6edc19e37552e72bb4f9d8af9b3ae48ee94f896
                                                          • Instruction Fuzzy Hash: 64F0F47195030DFBDB00DFE49C89EAEBBBCFB08644F508565E501E2181E774AA448A54
                                                          APIs
                                                          • GetUserNameW.ADVAPI32(?,?), ref: 007ED28C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: NameUser
                                                          • String ID: X64
                                                          • API String ID: 2645101109-893830106
                                                          • Opcode ID: 2fcb3a19c7681df6c7b204ce926db805514b581c842818ef31c1b02933d86dc6
                                                          • Instruction ID: c38ff2dd1a63394ed9207fa7c204da530f5b596025507abcc9c54323b8bdd79a
                                                          • Opcode Fuzzy Hash: 2fcb3a19c7681df6c7b204ce926db805514b581c842818ef31c1b02933d86dc6
                                                          • Instruction Fuzzy Hash: 88D0C9B480111DEACBA4CB90DC88DDEB37CBB14305F104251F106A2000D77499498F10
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                          • Instruction ID: e0cbd1430cf070e8dfb52b5acbaaa1763c9e92cae761eed0445aa402b99277fe
                                                          • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                          • Instruction Fuzzy Hash: 5E021C72E001199FDF15CFA9C8807EEBBF1EF48314F25816AE919EB380D735A9418B94
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00806918
                                                          • FindClose.KERNEL32(00000000), ref: 00806961
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseFileFirst
                                                          • String ID:
                                                          • API String ID: 2295610775-0
                                                          • Opcode ID: d6abdc19e7abf7807af4cf8dd5c7619729af767d37a509e0477d25a498e29685
                                                          • Instruction ID: 4f3ed29d8fe1fb562be3b48a4a3c94ea199503b043321a3eea4d22f664cdf527
                                                          • Opcode Fuzzy Hash: d6abdc19e7abf7807af4cf8dd5c7619729af767d37a509e0477d25a498e29685
                                                          • Instruction Fuzzy Hash: BB119332614201DFCB10DF29D888A16BBE5FF85328F14C699F4698F6A2DB34EC15CB91
                                                          APIs
                                                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00814891,?,?,00000035,?), ref: 008037E4
                                                          • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00814891,?,?,00000035,?), ref: 008037F4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorFormatLastMessage
                                                          • String ID:
                                                          • API String ID: 3479602957-0
                                                          • Opcode ID: 188b1051aec37c2cee09fc0871b787c98e8ef30854857812c55f46482ee7e116
                                                          • Instruction ID: 3889dacd2ad7a5fafc9f8679eae46027775b29a632907978cc72eb95dce59253
                                                          • Opcode Fuzzy Hash: 188b1051aec37c2cee09fc0871b787c98e8ef30854857812c55f46482ee7e116
                                                          • Instruction Fuzzy Hash: F3F0E5B06052286AEB6057B69C4DFEB3AAEFFC9761F000275F509D22C1D9609904C6B0
                                                          APIs
                                                          • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 007FB25D
                                                          • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 007FB270
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: InputSendkeybd_event
                                                          • String ID:
                                                          • API String ID: 3536248340-0
                                                          • Opcode ID: 7fe0650316488195a7fc32019b2272c822e06ddc6d94b264344fef12992ac37c
                                                          • Instruction ID: c890560050e39cb5da56cec97c4e80f032d5998e1d0e280e7561d9cf75e16b3a
                                                          • Opcode Fuzzy Hash: 7fe0650316488195a7fc32019b2272c822e06ddc6d94b264344fef12992ac37c
                                                          • Instruction Fuzzy Hash: A1F01D7180424DABDF159FA4C805BBE7BB4FF08305F108009F955A5191C37DC6119F94
                                                          APIs
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,007F11FC), ref: 007F10D4
                                                          • CloseHandle.KERNEL32(?,?,007F11FC), ref: 007F10E9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: AdjustCloseHandlePrivilegesToken
                                                          • String ID:
                                                          • API String ID: 81990902-0
                                                          • Opcode ID: f1b9a4fc37b235653f16c30e3f11ec2d0849246c7328fad8c7439fa35962e1c4
                                                          • Instruction ID: 43d6fbc30e1f94a128e218c52d6d5e078cd3779ee0c2f0cf7dd09f5a5f6ea8c1
                                                          • Opcode Fuzzy Hash: f1b9a4fc37b235653f16c30e3f11ec2d0849246c7328fad8c7439fa35962e1c4
                                                          • Instruction Fuzzy Hash: 0FE04F32008600EEE7352B61FC09E7777E9FB04320F20C92DF5A5804B1DB626CA1DB54
                                                          Strings
                                                          • Variable is not of type 'Object'., xrefs: 007E0C40
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Variable is not of type 'Object'.
                                                          • API String ID: 0-1840281001
                                                          • Opcode ID: 2b54aed8b405e40f453eaca81005fc276ced74669ed8c5009bff0f9d00f35374
                                                          • Instruction ID: 507e7acc3c452a09c9c0fc598bffc05bd2948282b38a2d22031383c958972cb0
                                                          • Opcode Fuzzy Hash: 2b54aed8b405e40f453eaca81005fc276ced74669ed8c5009bff0f9d00f35374
                                                          • Instruction Fuzzy Hash: DA32B071A00218DFCF15DF94E985AEDB7B5FF09304F244069E806AB292D77DAE45CBA0
                                                          APIs
                                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,007C6766,?,?,00000008,?,?,007CFEFE,00000000), ref: 007C6998
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ExceptionRaise
                                                          • String ID:
                                                          • API String ID: 3997070919-0
                                                          • Opcode ID: 7b736a1ccc8499ea28f7003dde5faa1d8b0e5c8489394a21404660dc3c9aa918
                                                          • Instruction ID: 6b35f7d625804dd395cd3bf9883673a4bb02331b3f18c55017d697f8069cdddc
                                                          • Opcode Fuzzy Hash: 7b736a1ccc8499ea28f7003dde5faa1d8b0e5c8489394a21404660dc3c9aa918
                                                          • Instruction Fuzzy Hash: 4BB107716106099FDB15CF28C4CAB697BE0FF45364F25865CE89ACF2A2C739E991CB40
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID: 0-3916222277
                                                          • Opcode ID: 4e01ffd66aa36933cd08493481b97d94988c031fc088e80b661f51aed07c6675
                                                          • Instruction ID: 6412c816050d989cc5dbc7c8e72aa33196b09ee8131d5c21f221eaea0b2b5c78
                                                          • Opcode Fuzzy Hash: 4e01ffd66aa36933cd08493481b97d94988c031fc088e80b661f51aed07c6675
                                                          • Instruction Fuzzy Hash: 60126F71900269DFCB54CF59C8806EEB7B5FF49310F14819AE849EB256EB389E81CF91
                                                          APIs
                                                          • BlockInput.USER32(00000001), ref: 0080EABD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: BlockInput
                                                          • String ID:
                                                          • API String ID: 3456056419-0
                                                          • Opcode ID: 09e48e417e2591a64ef18b34ddaf1837d8fbfcce689932befd7aa253da765fab
                                                          • Instruction ID: 98c47bc4ab179aef1765087e19e3ac59249e204c95f8fceb7449949a83d97e0d
                                                          • Opcode Fuzzy Hash: 09e48e417e2591a64ef18b34ddaf1837d8fbfcce689932befd7aa253da765fab
                                                          • Instruction Fuzzy Hash: 0BE012322002149FCB10DF59E804D5AB7D9FF68760F008416FC49C7291D674A8418B90
                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,007B03EE), ref: 007B09DA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: 49b1095928e32ec75f4a990dd89f606cb14c53f72592c42b25949635472b9435
                                                          • Instruction ID: af1bc35d23e2399a57af8c80792b50b17d8556278b317bb58204e7ba9afe0d3b
                                                          • Opcode Fuzzy Hash: 49b1095928e32ec75f4a990dd89f606cb14c53f72592c42b25949635472b9435
                                                          • Instruction Fuzzy Hash:
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0
                                                          • API String ID: 0-4108050209
                                                          • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                          • Instruction ID: 0947600d16f4d78c414a9cbbe09c27318584e10632c7905776673dbe026ad83c
                                                          • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                          • Instruction Fuzzy Hash: 7351797160C7459BDF3C8978889EBFE67999BD2340F180909E882DB282CA1DFE41D356
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4d40947ff133f29ebf7e240fe3130261925376357d5435024e5d79e1941fb9a6
                                                          • Instruction ID: 85f66951ecf42f89dd533548d2212f61aea9f79617c4cc87209f7d6fd2982288
                                                          • Opcode Fuzzy Hash: 4d40947ff133f29ebf7e240fe3130261925376357d5435024e5d79e1941fb9a6
                                                          • Instruction Fuzzy Hash: EE322032D29F414DD7279634D822335A789AFB73D5F14DB2BE81AB59A6EF29C4838100
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b0528c00a0ea134341c0f7129c3503537aac65a79db9f4ada00f9886ab377383
                                                          • Instruction ID: 75338121a62093a7d4497d064214123989f63b6e272ad52ed86cbdcba671e2b5
                                                          • Opcode Fuzzy Hash: b0528c00a0ea134341c0f7129c3503537aac65a79db9f4ada00f9886ab377383
                                                          • Instruction Fuzzy Hash: BC326C35A052859FDF2BCF2AC49067D77A1EB8E310F28866AD449CB291D63CDD83DB11
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4bc56bf54640fef790d4f8d826edb37cb927f667d8ae90b61328f70b23c35e60
                                                          • Instruction ID: e4474a663191a78b494dd3bac9cbd92e27d1316545f0dfafaffed3733b68b348
                                                          • Opcode Fuzzy Hash: 4bc56bf54640fef790d4f8d826edb37cb927f667d8ae90b61328f70b23c35e60
                                                          • Instruction Fuzzy Hash: 392291B0A04609DFDF14DFA8D885AAEB7B5FF44300F14462AE816A7391EB39ED15CB50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: bf4bd37d74872c2f2bc7ca25a542a6ab3566cbda892e9c9cf283791d66252698
                                                          • Instruction ID: 210afb9fe1647cd6d29311d207cb8bf91705a387fdff33469fcb0ae1766e5990
                                                          • Opcode Fuzzy Hash: bf4bd37d74872c2f2bc7ca25a542a6ab3566cbda892e9c9cf283791d66252698
                                                          • Instruction Fuzzy Hash: 5E02A8B1E00205EBDF05EF64D885AADB7B1FF44300F11816AE9169B391EB39EE51CB91
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: fe9e0a549b0a17cb889c6c51d82349f0ed81e6a4dc3097177b813c58be7ac577
                                                          • Instruction ID: d50a71d2ab997734502fa7184cb3b6cf1a394dff8fc74e8a311b8fcbe152bc39
                                                          • Opcode Fuzzy Hash: fe9e0a549b0a17cb889c6c51d82349f0ed81e6a4dc3097177b813c58be7ac577
                                                          • Instruction Fuzzy Hash: 63B1DF20D2AF414DD62396399831336B65CBFFB6D5F91DB1BFC1674E22EB2686834140
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                          • Instruction ID: b6c65f68496dda2495bb1f60ab21c3b12370484ba0811112d50b7dc273c86e36
                                                          • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                          • Instruction Fuzzy Hash: EF918A722090E34EDB29463D85742BEFFE15A523A23DA079DD4F2CB1C5FE18D554D620
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                          • Instruction ID: e15677cf5abb354c37d063c178826bda3c72f5755b7c967f213b0117db2a9079
                                                          • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                          • Instruction Fuzzy Hash: 3D91977220A0E74DDB69423D84342BEFFE15A923A135A079DE4F2CB1C6EE28D955D720
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                          • Instruction ID: c77933ce8837816d6e62b04d9da987beeba9cce0451de227ad0e909aeebd0472
                                                          • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                          • Instruction Fuzzy Hash: A191C7722090E34EDB2D427A84782BEFFE15A923A13DA479ED4F2CA1C5FE18D554D620
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 12b8504087a163d646630f09cf2a35f81b020ecc2536e77996d1d30addf6ac54
                                                          • Instruction ID: 16c4990eaf2a9a89a6afe561cc9cba91634638a96ce7b68e5c2ea0361c09ff1d
                                                          • Opcode Fuzzy Hash: 12b8504087a163d646630f09cf2a35f81b020ecc2536e77996d1d30addf6ac54
                                                          • Instruction Fuzzy Hash: 6F6158B1208709A6DE7C9A2C8C99BFF2398DFC1700F14491DF942DB2C1DA1D9E42CB66
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 89a6b251be4824c88ac4787686f845362f13458f8295febdba4076e57b2f6a6e
                                                          • Instruction ID: 7a8325083ccde233944252fb85974602253e76dee0ee42e630ffc4a263ba0a50
                                                          • Opcode Fuzzy Hash: 89a6b251be4824c88ac4787686f845362f13458f8295febdba4076e57b2f6a6e
                                                          • Instruction Fuzzy Hash: 5E616B7170870996DE3C5A2888AABFF2398DFC2784F140959E943DF681DA1EED42C356
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                          • Instruction ID: 5476f6c61ce6310007842f3624b7063137bca70e0b115320b0732fc79c2f3415
                                                          • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                          • Instruction Fuzzy Hash: FC8186336090E349DB2D423A85346BEFFE16A923B13DA079DD4F2CB1C1EE28D554D620
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4e5afb15ee16d1dff8589335a9f855b007da7de51d2b1d997130f622bee49108
                                                          • Instruction ID: 2de44db092f6c16f8ef519faeb430bbc6009c0fa534deaaf62e2f36868b44145
                                                          • Opcode Fuzzy Hash: 4e5afb15ee16d1dff8589335a9f855b007da7de51d2b1d997130f622bee49108
                                                          • Instruction Fuzzy Hash: 3E21A8326206118BD728CE79C81667A73E5F764310F15866EE4A7C37D0DE75A904CB40
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 00812B30
                                                          • DeleteObject.GDI32(00000000), ref: 00812B43
                                                          • DestroyWindow.USER32 ref: 00812B52
                                                          • GetDesktopWindow.USER32 ref: 00812B6D
                                                          • GetWindowRect.USER32(00000000), ref: 00812B74
                                                          • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00812CA3
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00812CB1
                                                          • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812CF8
                                                          • GetClientRect.USER32(00000000,?), ref: 00812D04
                                                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00812D40
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812D62
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812D75
                                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812D80
                                                          • GlobalLock.KERNEL32(00000000), ref: 00812D89
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812D98
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00812DA1
                                                          • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812DA8
                                                          • GlobalFree.KERNEL32(00000000), ref: 00812DB3
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812DC5
                                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,0082FC38,00000000), ref: 00812DDB
                                                          • GlobalFree.KERNEL32(00000000), ref: 00812DEB
                                                          • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00812E11
                                                          • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00812E30
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812E52
                                                          • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0081303F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                          • String ID: $AutoIt v3$DISPLAY$static
                                                          • API String ID: 2211948467-2373415609
                                                          • Opcode ID: 5cd08b1563c148fd53f4d0e7b7a8c5211d132cddc9e3fa82e970d7ecf8881b6b
                                                          • Instruction ID: 40726c38ef8819e61b32013846eb22f583c60654fabf7037ca03d33f8eea346c
                                                          • Opcode Fuzzy Hash: 5cd08b1563c148fd53f4d0e7b7a8c5211d132cddc9e3fa82e970d7ecf8881b6b
                                                          • Instruction Fuzzy Hash: F1025871900218EFDB24DF64DD89EAE7BB9FF48710F048158F915AB2A1CB74AD51CB60
                                                          APIs
                                                          • SetTextColor.GDI32(?,00000000), ref: 0082712F
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00827160
                                                          • GetSysColor.USER32(0000000F), ref: 0082716C
                                                          • SetBkColor.GDI32(?,000000FF), ref: 00827186
                                                          • SelectObject.GDI32(?,?), ref: 00827195
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 008271C0
                                                          • GetSysColor.USER32(00000010), ref: 008271C8
                                                          • CreateSolidBrush.GDI32(00000000), ref: 008271CF
                                                          • FrameRect.USER32(?,?,00000000), ref: 008271DE
                                                          • DeleteObject.GDI32(00000000), ref: 008271E5
                                                          • InflateRect.USER32(?,000000FE,000000FE), ref: 00827230
                                                          • FillRect.USER32(?,?,?), ref: 00827262
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00827284
                                                            • Part of subcall function 008273E8: GetSysColor.USER32(00000012), ref: 00827421
                                                            • Part of subcall function 008273E8: SetTextColor.GDI32(?,?), ref: 00827425
                                                            • Part of subcall function 008273E8: GetSysColorBrush.USER32(0000000F), ref: 0082743B
                                                            • Part of subcall function 008273E8: GetSysColor.USER32(0000000F), ref: 00827446
                                                            • Part of subcall function 008273E8: GetSysColor.USER32(00000011), ref: 00827463
                                                            • Part of subcall function 008273E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00827471
                                                            • Part of subcall function 008273E8: SelectObject.GDI32(?,00000000), ref: 00827482
                                                            • Part of subcall function 008273E8: SetBkColor.GDI32(?,00000000), ref: 0082748B
                                                            • Part of subcall function 008273E8: SelectObject.GDI32(?,?), ref: 00827498
                                                            • Part of subcall function 008273E8: InflateRect.USER32(?,000000FF,000000FF), ref: 008274B7
                                                            • Part of subcall function 008273E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 008274CE
                                                            • Part of subcall function 008273E8: GetWindowLongW.USER32(00000000,000000F0), ref: 008274DB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                          • String ID:
                                                          • API String ID: 4124339563-0
                                                          • Opcode ID: 084a62ee390b32947447bdf4217d067cf1704ce266a28c4635257309c84aaddc
                                                          • Instruction ID: efc8f9389f1a49955b8a1d58b8d6ba25f651557c7fed1fbb0c7e3d619a124442
                                                          • Opcode Fuzzy Hash: 084a62ee390b32947447bdf4217d067cf1704ce266a28c4635257309c84aaddc
                                                          • Instruction Fuzzy Hash: F3A1AE72008311EFDB209F61DC49A6F7BA9FF89320F104A19F962D61E1D774E945CB92
                                                          APIs
                                                          • DestroyWindow.USER32(?,?), ref: 007A8E14
                                                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 007E6AC5
                                                          • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 007E6AFE
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 007E6F43
                                                            • Part of subcall function 007A8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,007A8BE8,?,00000000,?,?,?,?,007A8BBA,00000000,?), ref: 007A8FC5
                                                          • SendMessageW.USER32(?,00001053), ref: 007E6F7F
                                                          • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 007E6F96
                                                          • ImageList_Destroy.COMCTL32(00000000,?), ref: 007E6FAC
                                                          • ImageList_Destroy.COMCTL32(00000000,?), ref: 007E6FB7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                          • String ID: 0
                                                          • API String ID: 2760611726-4108050209
                                                          • Opcode ID: edf38948b86b4f7f40d69c979cb0a296acf907cd8f36ee3461a3d0ccb9849b7a
                                                          • Instruction ID: a7d8e33c8a9b13272e37dfb0be76833e3326fcec1774a8ba315659746f3d6a94
                                                          • Opcode Fuzzy Hash: edf38948b86b4f7f40d69c979cb0a296acf907cd8f36ee3461a3d0ccb9849b7a
                                                          • Instruction Fuzzy Hash: E312B030206241DFDB65CF25C848BA9BBE1FB69340F588569F545CB262CB39EC52CF52
                                                          APIs
                                                          • DestroyWindow.USER32(00000000), ref: 0081273E
                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0081286A
                                                          • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 008128A9
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 008128B9
                                                          • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00812900
                                                          • GetClientRect.USER32(00000000,?), ref: 0081290C
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00812955
                                                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00812964
                                                          • GetStockObject.GDI32(00000011), ref: 00812974
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00812978
                                                          • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00812988
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00812991
                                                          • DeleteDC.GDI32(00000000), ref: 0081299A
                                                          • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 008129C6
                                                          • SendMessageW.USER32(00000030,00000000,00000001), ref: 008129DD
                                                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00812A1D
                                                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00812A31
                                                          • SendMessageW.USER32(00000404,00000001,00000000), ref: 00812A42
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00812A77
                                                          • GetStockObject.GDI32(00000011), ref: 00812A82
                                                          • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00812A8D
                                                          • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00812A97
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                          • API String ID: 2910397461-517079104
                                                          • Opcode ID: b4b4ec2d1717230e08b2bd61559cc710dd88aa6d21a7fa04b022c5e175b477e4
                                                          • Instruction ID: d91a4a98165dd2f279b074ef8f86646d399dda04647d875c6fa4b757e0875dfe
                                                          • Opcode Fuzzy Hash: b4b4ec2d1717230e08b2bd61559cc710dd88aa6d21a7fa04b022c5e175b477e4
                                                          • Instruction Fuzzy Hash: 3EB17B71A00219AFEB24DF68DD4AEAE7BA9FF08710F008114FA15E7291D774ED50CB94
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00804AED
                                                          • GetDriveTypeW.KERNEL32(?,0082CB68,?,\\.\,0082CC08), ref: 00804BCA
                                                          • SetErrorMode.KERNEL32(00000000,0082CB68,?,\\.\,0082CC08), ref: 00804D36
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DriveType
                                                          • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                          • API String ID: 2907320926-4222207086
                                                          • Opcode ID: 14c6c26b038800a519fae89d0ff6887ddfb7aeeecbf182ac419b8b8f44df8880
                                                          • Instruction ID: 8c98d2d3bacbf36325ea7e370d7aaedc803c0ac8a650b0d23aae8c353e054fbd
                                                          • Opcode Fuzzy Hash: 14c6c26b038800a519fae89d0ff6887ddfb7aeeecbf182ac419b8b8f44df8880
                                                          • Instruction Fuzzy Hash: B561EEB028110AEBDBA4DB24CE8297877B0FB04305B649415FE06EB2D1EB3AED55DB41
                                                          APIs
                                                          • GetSysColor.USER32(00000012), ref: 00827421
                                                          • SetTextColor.GDI32(?,?), ref: 00827425
                                                          • GetSysColorBrush.USER32(0000000F), ref: 0082743B
                                                          • GetSysColor.USER32(0000000F), ref: 00827446
                                                          • CreateSolidBrush.GDI32(?), ref: 0082744B
                                                          • GetSysColor.USER32(00000011), ref: 00827463
                                                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00827471
                                                          • SelectObject.GDI32(?,00000000), ref: 00827482
                                                          • SetBkColor.GDI32(?,00000000), ref: 0082748B
                                                          • SelectObject.GDI32(?,?), ref: 00827498
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 008274B7
                                                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 008274CE
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 008274DB
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0082752A
                                                          • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00827554
                                                          • InflateRect.USER32(?,000000FD,000000FD), ref: 00827572
                                                          • DrawFocusRect.USER32(?,?), ref: 0082757D
                                                          • GetSysColor.USER32(00000011), ref: 0082758E
                                                          • SetTextColor.GDI32(?,00000000), ref: 00827596
                                                          • DrawTextW.USER32(?,008270F5,000000FF,?,00000000), ref: 008275A8
                                                          • SelectObject.GDI32(?,?), ref: 008275BF
                                                          • DeleteObject.GDI32(?), ref: 008275CA
                                                          • SelectObject.GDI32(?,?), ref: 008275D0
                                                          • DeleteObject.GDI32(?), ref: 008275D5
                                                          • SetTextColor.GDI32(?,?), ref: 008275DB
                                                          • SetBkColor.GDI32(?,?), ref: 008275E5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                          • String ID:
                                                          • API String ID: 1996641542-0
                                                          • Opcode ID: 3055a2af22a591c3660975ebc475d2ab38d48e4130183b4a0fed1a37b81eeb00
                                                          • Instruction ID: bd3bfc4ce18ef433bbebce3adce7eea7005a960ea5226d0d9b2bb93a945ef838
                                                          • Opcode Fuzzy Hash: 3055a2af22a591c3660975ebc475d2ab38d48e4130183b4a0fed1a37b81eeb00
                                                          • Instruction Fuzzy Hash: 7C616F72904218AFDF119FA4DC49EAEBFB9FF08320F118115F915AB2A1D7749941DF90
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 00821128
                                                          • GetDesktopWindow.USER32 ref: 0082113D
                                                          • GetWindowRect.USER32(00000000), ref: 00821144
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00821199
                                                          • DestroyWindow.USER32(?), ref: 008211B9
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 008211ED
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0082120B
                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0082121D
                                                          • SendMessageW.USER32(00000000,00000421,?,?), ref: 00821232
                                                          • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00821245
                                                          • IsWindowVisible.USER32(00000000), ref: 008212A1
                                                          • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 008212BC
                                                          • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 008212D0
                                                          • GetWindowRect.USER32(00000000,?), ref: 008212E8
                                                          • MonitorFromPoint.USER32(?,?,00000002), ref: 0082130E
                                                          • GetMonitorInfoW.USER32(00000000,?), ref: 00821328
                                                          • CopyRect.USER32(?,?), ref: 0082133F
                                                          • SendMessageW.USER32(00000000,00000412,00000000), ref: 008213AA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                          • String ID: ($0$tooltips_class32
                                                          • API String ID: 698492251-4156429822
                                                          • Opcode ID: b22ba427496e1bd879ede881a6cb08744a73f6c723e3576042821b93cbf6fa67
                                                          • Instruction ID: ec3674ef39f87b4ca5fde797a60ab518ea3f2b2751faa928fc285c1c9e63e8eb
                                                          • Opcode Fuzzy Hash: b22ba427496e1bd879ede881a6cb08744a73f6c723e3576042821b93cbf6fa67
                                                          • Instruction Fuzzy Hash: AAB18971604350EFDB10DF64E888A6ABBE5FF98340F10891CF999DB261C735E885CB92
                                                          APIs
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007A8968
                                                          • GetSystemMetrics.USER32(00000007), ref: 007A8970
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007A899B
                                                          • GetSystemMetrics.USER32(00000008), ref: 007A89A3
                                                          • GetSystemMetrics.USER32(00000004), ref: 007A89C8
                                                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 007A89E5
                                                          • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 007A89F5
                                                          • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 007A8A28
                                                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 007A8A3C
                                                          • GetClientRect.USER32(00000000,000000FF), ref: 007A8A5A
                                                          • GetStockObject.GDI32(00000011), ref: 007A8A76
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 007A8A81
                                                            • Part of subcall function 007A912D: GetCursorPos.USER32(?), ref: 007A9141
                                                            • Part of subcall function 007A912D: ScreenToClient.USER32(00000000,?), ref: 007A915E
                                                            • Part of subcall function 007A912D: GetAsyncKeyState.USER32(00000001), ref: 007A9183
                                                            • Part of subcall function 007A912D: GetAsyncKeyState.USER32(00000002), ref: 007A919D
                                                          • SetTimer.USER32(00000000,00000000,00000028,007A90FC), ref: 007A8AA8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                          • String ID: AutoIt v3 GUI
                                                          • API String ID: 1458621304-248962490
                                                          • Opcode ID: 3221b45258677e39feebc739576f271668ec0beef2dca036a921eaca3a186008
                                                          • Instruction ID: 5733f870c1ea37d9d53139212c2df07dc91ebd632b0752fe4b737fd73936a9f0
                                                          • Opcode Fuzzy Hash: 3221b45258677e39feebc739576f271668ec0beef2dca036a921eaca3a186008
                                                          • Instruction Fuzzy Hash: 1EB16771A002099FDF24DFA8CD49BAE7BA5FB48314F158229FA15E7290DB78E841CB51
                                                          APIs
                                                            • Part of subcall function 007F10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 007F1114
                                                            • Part of subcall function 007F10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F1120
                                                            • Part of subcall function 007F10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F112F
                                                            • Part of subcall function 007F10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F1136
                                                            • Part of subcall function 007F10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 007F114D
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 007F0DF5
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 007F0E29
                                                          • GetLengthSid.ADVAPI32(?), ref: 007F0E40
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 007F0E7A
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 007F0E96
                                                          • GetLengthSid.ADVAPI32(?), ref: 007F0EAD
                                                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 007F0EB5
                                                          • HeapAlloc.KERNEL32(00000000), ref: 007F0EBC
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 007F0EDD
                                                          • CopySid.ADVAPI32(00000000), ref: 007F0EE4
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 007F0F13
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 007F0F35
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 007F0F47
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F0F6E
                                                          • HeapFree.KERNEL32(00000000), ref: 007F0F75
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F0F7E
                                                          • HeapFree.KERNEL32(00000000), ref: 007F0F85
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F0F8E
                                                          • HeapFree.KERNEL32(00000000), ref: 007F0F95
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 007F0FA1
                                                          • HeapFree.KERNEL32(00000000), ref: 007F0FA8
                                                            • Part of subcall function 007F1193: GetProcessHeap.KERNEL32(00000008,007F0BB1,?,00000000,?,007F0BB1,?), ref: 007F11A1
                                                            • Part of subcall function 007F1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,007F0BB1,?), ref: 007F11A8
                                                            • Part of subcall function 007F1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,007F0BB1,?), ref: 007F11B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                          • String ID:
                                                          • API String ID: 4175595110-0
                                                          • Opcode ID: 4d1129d58bf368e9f150b5d42ba1676fa61206064db65cc44db675672a49fe68
                                                          • Instruction ID: deba33db624cda877c14a548fcc09d6170fe1452e487c8f6d2956bff394a85f2
                                                          • Opcode Fuzzy Hash: 4d1129d58bf368e9f150b5d42ba1676fa61206064db65cc44db675672a49fe68
                                                          • Instruction Fuzzy Hash: 5F714F7190020AEBDF209FA4DC49FBEBBB8BF04310F148115FA19A6352D7759A15CBA0
                                                          APIs
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0081C4BD
                                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,0082CC08,00000000,?,00000000,?,?), ref: 0081C544
                                                          • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0081C5A4
                                                          • _wcslen.LIBCMT ref: 0081C5F4
                                                          • _wcslen.LIBCMT ref: 0081C66F
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0081C6B2
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0081C7C1
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0081C84D
                                                          • RegCloseKey.ADVAPI32(?), ref: 0081C881
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 0081C88E
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0081C960
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                          • API String ID: 9721498-966354055
                                                          • Opcode ID: 56cf64cb419366656d2d17754b37b0c8554557e9ee75b86e59d25001934cedc0
                                                          • Instruction ID: 434f3b16bdd54d061d7bac9036be9f70de0476387fc9a51ecedbe5c16e552ad2
                                                          • Opcode Fuzzy Hash: 56cf64cb419366656d2d17754b37b0c8554557e9ee75b86e59d25001934cedc0
                                                          • Instruction Fuzzy Hash: 69126835608201DFDB14DF24D885A6AB7E9FF88714F05885CF89A9B3A2DB35ED41CB81
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 008209C6
                                                          • _wcslen.LIBCMT ref: 00820A01
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00820A54
                                                          • _wcslen.LIBCMT ref: 00820A8A
                                                          • _wcslen.LIBCMT ref: 00820B06
                                                          • _wcslen.LIBCMT ref: 00820B81
                                                            • Part of subcall function 007AF9F2: _wcslen.LIBCMT ref: 007AF9FD
                                                            • Part of subcall function 007F2BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 007F2BFA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$MessageSend$BuffCharUpper
                                                          • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                          • API String ID: 1103490817-4258414348
                                                          • Opcode ID: 44074d0768ee94944391d0e822600157d67f17d044958be0b05176f02a8e8642
                                                          • Instruction ID: 8ae43ea0a0d4ebaea5cdd553971ac29ddaf9d9f2415634221645e46a8a80ac16
                                                          • Opcode Fuzzy Hash: 44074d0768ee94944391d0e822600157d67f17d044958be0b05176f02a8e8642
                                                          • Instruction Fuzzy Hash: D2E16A32208321DFCB14DF24D45092AB7E2FF98318B558A5DF8969B362D735ED89CB81
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharUpper
                                                          • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                          • API String ID: 1256254125-909552448
                                                          • Opcode ID: ac088f5333aab3a5c0ed15537e2b3a23f7048a2d54e1cf4aa84a96cfe2fe3367
                                                          • Instruction ID: 594931b0f206e970918ddfe47936ab2763dc716a22efd50d71aedfb8ceb2145a
                                                          • Opcode Fuzzy Hash: ac088f5333aab3a5c0ed15537e2b3a23f7048a2d54e1cf4aa84a96cfe2fe3367
                                                          • Instruction Fuzzy Hash: 9C71F37268412A8BCB20DE6CD9416FF3399FFA1764B254128FC66D7284E635DDC8C3A0
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 0082835A
                                                          • _wcslen.LIBCMT ref: 0082836E
                                                          • _wcslen.LIBCMT ref: 00828391
                                                          • _wcslen.LIBCMT ref: 008283B4
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 008283F2
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,0082361A,?), ref: 0082844E
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00828487
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 008284CA
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00828501
                                                          • FreeLibrary.KERNEL32(?), ref: 0082850D
                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0082851D
                                                          • DestroyIcon.USER32(?), ref: 0082852C
                                                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00828549
                                                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00828555
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                          • String ID: .dll$.exe$.icl
                                                          • API String ID: 799131459-1154884017
                                                          • Opcode ID: 6112bb6e4ed6673744854affc4da53c04343ce0d2ccb841e3dae94ec91ffee4e
                                                          • Instruction ID: 439021fd78480377417c5ff7736219d6ad8338b6d08477ccdbc59b5bb3b9081c
                                                          • Opcode Fuzzy Hash: 6112bb6e4ed6673744854affc4da53c04343ce0d2ccb841e3dae94ec91ffee4e
                                                          • Instruction Fuzzy Hash: 05619E71500629FAEF24DF64EC45BBE77A8FF08B11F108509F815E61D1DB74AA91CBA0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                          • API String ID: 0-1645009161
                                                          • Opcode ID: d80428d8619846014b19c167d8a00e10b89d4d0d8c69efdbf91de94fe88be43b
                                                          • Instruction ID: 00a2e6790f4a8dfe976cb40be8217dabb66bdb072d0e8ef1b0b63ce68f17261b
                                                          • Opcode Fuzzy Hash: d80428d8619846014b19c167d8a00e10b89d4d0d8c69efdbf91de94fe88be43b
                                                          • Instruction Fuzzy Hash: 1B81FF71614605FBDF28AFA0EC46FAE37B9BF15300F044025F914AA292EB7DDA51C6A1
                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?), ref: 00803EF8
                                                          • _wcslen.LIBCMT ref: 00803F03
                                                          • _wcslen.LIBCMT ref: 00803F5A
                                                          • _wcslen.LIBCMT ref: 00803F98
                                                          • GetDriveTypeW.KERNEL32(?), ref: 00803FD6
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0080401E
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00804059
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00804087
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                          • API String ID: 1839972693-4113822522
                                                          • Opcode ID: 8e660d1ada978a23e48fbaaf29143875e8ad8edbc720d5d03f86a8d9509cb854
                                                          • Instruction ID: 2bd18acbe70952d7ba9fc189324d812493a28586e7b958e8e465a3a8ef5eb1ff
                                                          • Opcode Fuzzy Hash: 8e660d1ada978a23e48fbaaf29143875e8ad8edbc720d5d03f86a8d9509cb854
                                                          • Instruction Fuzzy Hash: CB71D0726042029FC750EF24C88086AB7F4FF94768F504A2DF995D7291EB35ED49CB91
                                                          APIs
                                                          • LoadIconW.USER32(00000063), ref: 007F5A2E
                                                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 007F5A40
                                                          • SetWindowTextW.USER32(?,?), ref: 007F5A57
                                                          • GetDlgItem.USER32(?,000003EA), ref: 007F5A6C
                                                          • SetWindowTextW.USER32(00000000,?), ref: 007F5A72
                                                          • GetDlgItem.USER32(?,000003E9), ref: 007F5A82
                                                          • SetWindowTextW.USER32(00000000,?), ref: 007F5A88
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 007F5AA9
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 007F5AC3
                                                          • GetWindowRect.USER32(?,?), ref: 007F5ACC
                                                          • _wcslen.LIBCMT ref: 007F5B33
                                                          • SetWindowTextW.USER32(?,?), ref: 007F5B6F
                                                          • GetDesktopWindow.USER32 ref: 007F5B75
                                                          • GetWindowRect.USER32(00000000), ref: 007F5B7C
                                                          • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 007F5BD3
                                                          • GetClientRect.USER32(?,?), ref: 007F5BE0
                                                          • PostMessageW.USER32(?,00000005,00000000,?), ref: 007F5C05
                                                          • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 007F5C2F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                          • String ID:
                                                          • API String ID: 895679908-0
                                                          • Opcode ID: f2fa7f91ea938f3ef23e02f076d6ccde0dc1c505dcc06249df2d944e16b1dc4c
                                                          • Instruction ID: 5dde087c220daeefb9297f2d7072f33f2578c03c59e01f9456e85cfadf558bf0
                                                          • Opcode Fuzzy Hash: f2fa7f91ea938f3ef23e02f076d6ccde0dc1c505dcc06249df2d944e16b1dc4c
                                                          • Instruction Fuzzy Hash: C6715E71900B09EFDB20DFA8CE89A7EBBF5FF48704F104519E642A26A0D779E945CB50
                                                          APIs
                                                          • LoadCursorW.USER32(00000000,00007F89), ref: 0080FE27
                                                          • LoadCursorW.USER32(00000000,00007F8A), ref: 0080FE32
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 0080FE3D
                                                          • LoadCursorW.USER32(00000000,00007F03), ref: 0080FE48
                                                          • LoadCursorW.USER32(00000000,00007F8B), ref: 0080FE53
                                                          • LoadCursorW.USER32(00000000,00007F01), ref: 0080FE5E
                                                          • LoadCursorW.USER32(00000000,00007F81), ref: 0080FE69
                                                          • LoadCursorW.USER32(00000000,00007F88), ref: 0080FE74
                                                          • LoadCursorW.USER32(00000000,00007F80), ref: 0080FE7F
                                                          • LoadCursorW.USER32(00000000,00007F86), ref: 0080FE8A
                                                          • LoadCursorW.USER32(00000000,00007F83), ref: 0080FE95
                                                          • LoadCursorW.USER32(00000000,00007F85), ref: 0080FEA0
                                                          • LoadCursorW.USER32(00000000,00007F82), ref: 0080FEAB
                                                          • LoadCursorW.USER32(00000000,00007F84), ref: 0080FEB6
                                                          • LoadCursorW.USER32(00000000,00007F04), ref: 0080FEC1
                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 0080FECC
                                                          • GetCursorInfo.USER32(?), ref: 0080FEDC
                                                          • GetLastError.KERNEL32 ref: 0080FF1E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Cursor$Load$ErrorInfoLast
                                                          • String ID:
                                                          • API String ID: 3215588206-0
                                                          • Opcode ID: 691ae4a0dc4f3d5fdd67b843ab26d01416e802d1befbc1945c68ccb4824d4572
                                                          • Instruction ID: 198e6bc944b30feb5f9f54974b6ef8ce37ad2ca9feb30931b62cbe9db2de02ac
                                                          • Opcode Fuzzy Hash: 691ae4a0dc4f3d5fdd67b843ab26d01416e802d1befbc1945c68ccb4824d4572
                                                          • Instruction Fuzzy Hash: 064168B0D043196ADB60DF768C8985EBFE8FF04754B50852AF11DE7681DB789901CF91
                                                          APIs
                                                          • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 007B00C6
                                                            • Part of subcall function 007B00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0086070C,00000FA0,268697C1,?,?,?,?,007D23B3,000000FF), ref: 007B011C
                                                            • Part of subcall function 007B00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,007D23B3,000000FF), ref: 007B0127
                                                            • Part of subcall function 007B00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,007D23B3,000000FF), ref: 007B0138
                                                            • Part of subcall function 007B00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 007B014E
                                                            • Part of subcall function 007B00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 007B015C
                                                            • Part of subcall function 007B00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 007B016A
                                                            • Part of subcall function 007B00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 007B0195
                                                            • Part of subcall function 007B00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 007B01A0
                                                          • ___scrt_fastfail.LIBCMT ref: 007B00E7
                                                            • Part of subcall function 007B00A3: __onexit.LIBCMT ref: 007B00A9
                                                          Strings
                                                          • kernel32.dll, xrefs: 007B0133
                                                          • InitializeConditionVariable, xrefs: 007B0148
                                                          • SleepConditionVariableCS, xrefs: 007B0154
                                                          • WakeAllConditionVariable, xrefs: 007B0162
                                                          • api-ms-win-core-synch-l1-2-0.dll, xrefs: 007B0122
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                          • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                          • API String ID: 66158676-1714406822
                                                          • Opcode ID: fe55e69d94d879e1dd7c2809332f00eb16d899d1b034b8385daaf438fcaea31f
                                                          • Instruction ID: bc20af31da7cb3a645cf387c5314d5bc3eb69a6d135ab3dc9ccc3b9687990ff8
                                                          • Opcode Fuzzy Hash: fe55e69d94d879e1dd7c2809332f00eb16d899d1b034b8385daaf438fcaea31f
                                                          • Instruction Fuzzy Hash: FF21FC72644718ABD7245BA4AC0ABAF77E4FB45B51F014535F911E3391DB7C9800CAD4
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                          • API String ID: 176396367-1603158881
                                                          • Opcode ID: 39f72a4e4e654409762d9b3aeccd903f236c19a783df96074ce73f44bd7236be
                                                          • Instruction ID: d7a4b4c4c2fbf84cf07147c49b4fb430c72213f925291a7680713aca9de86738
                                                          • Opcode Fuzzy Hash: 39f72a4e4e654409762d9b3aeccd903f236c19a783df96074ce73f44bd7236be
                                                          • Instruction Fuzzy Hash: B5E1C532A0051AEBCB14DFB8C455BFDBBB0BF54710F548219EA56E7340DB38AE899790
                                                          APIs
                                                          • CharLowerBuffW.USER32(00000000,00000000,0082CC08), ref: 00804527
                                                          • _wcslen.LIBCMT ref: 0080453B
                                                          • _wcslen.LIBCMT ref: 00804599
                                                          • _wcslen.LIBCMT ref: 008045F4
                                                          • _wcslen.LIBCMT ref: 0080463F
                                                          • _wcslen.LIBCMT ref: 008046A7
                                                            • Part of subcall function 007AF9F2: _wcslen.LIBCMT ref: 007AF9FD
                                                          • GetDriveTypeW.KERNEL32(?,00856BF0,00000061), ref: 00804743
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharDriveLowerType
                                                          • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                          • API String ID: 2055661098-1000479233
                                                          • Opcode ID: 10519a2ae1df1ba5563e0bde46823c535456909802b9491bae2aace880bcc178
                                                          • Instruction ID: 97ffdc9563e65ad492af33957a03e6995ae3670c335bf489c7db3d938a99c182
                                                          • Opcode Fuzzy Hash: 10519a2ae1df1ba5563e0bde46823c535456909802b9491bae2aace880bcc178
                                                          • Instruction Fuzzy Hash: 4BB11FB16483029FC750DF28DC90A6AB7E5FFA5720F505A1CF6A6C32D1E734D844CA92
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,0082CC08), ref: 008140BB
                                                          • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 008140CD
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,0082CC08), ref: 008140F2
                                                          • FreeLibrary.KERNEL32(00000000,?,0082CC08), ref: 0081413E
                                                          • StringFromGUID2.OLE32(?,?,00000028,?,0082CC08), ref: 008141A8
                                                          • SysFreeString.OLEAUT32(00000009), ref: 00814262
                                                          • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 008142C8
                                                          • SysFreeString.OLEAUT32(?), ref: 008142F2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                          • String ID: GetModuleHandleExW$kernel32.dll
                                                          • API String ID: 354098117-199464113
                                                          • Opcode ID: 3bb51c217dfe036ba6b66a7bb37a3fe21ab14f0b7e41b52f4d2c470f276cbb17
                                                          • Instruction ID: 8b5d51da787d9b62f9046059c3c341576e69c0078b8a8629a41e6c544f4bdb55
                                                          • Opcode Fuzzy Hash: 3bb51c217dfe036ba6b66a7bb37a3fe21ab14f0b7e41b52f4d2c470f276cbb17
                                                          • Instruction Fuzzy Hash: 48122B75A00119EFDB14DF94C884EAEB7B9FF49318F248098E905EB251D731ED86CBA0
                                                          APIs
                                                          • GetMenuItemCount.USER32(00861990), ref: 007D2F8D
                                                          • GetMenuItemCount.USER32(00861990), ref: 007D303D
                                                          • GetCursorPos.USER32(?), ref: 007D3081
                                                          • SetForegroundWindow.USER32(00000000), ref: 007D308A
                                                          • TrackPopupMenuEx.USER32(00861990,00000000,?,00000000,00000000,00000000), ref: 007D309D
                                                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 007D30A9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                          • String ID: 0
                                                          • API String ID: 36266755-4108050209
                                                          • Opcode ID: d4dc18a7f4db79d86464f53ede90421787d96cdb826f0cfe4f27610e47a97491
                                                          • Instruction ID: 02c70986d88c7a395dbf2a68e260d3065e9c7be3eac87e15c556e9f4a0ab87ca
                                                          • Opcode Fuzzy Hash: d4dc18a7f4db79d86464f53ede90421787d96cdb826f0cfe4f27610e47a97491
                                                          • Instruction Fuzzy Hash: F8713831644205BEEB218F24DD49FAEBF75FF05324F204207F524AA2E1C7B9A912CB90
                                                          APIs
                                                          • DestroyWindow.USER32(00000000,?), ref: 00826DEB
                                                            • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00826E5F
                                                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00826E81
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00826E94
                                                          • DestroyWindow.USER32(?), ref: 00826EB5
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00790000,00000000), ref: 00826EE4
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00826EFD
                                                          • GetDesktopWindow.USER32 ref: 00826F16
                                                          • GetWindowRect.USER32(00000000), ref: 00826F1D
                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00826F35
                                                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00826F4D
                                                            • Part of subcall function 007A9944: GetWindowLongW.USER32(?,000000EB), ref: 007A9952
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                          • String ID: 0$tooltips_class32
                                                          • API String ID: 2429346358-3619404913
                                                          • Opcode ID: 8c9ca771c2e680eb46f10629532bb9a982182a74179e8665eaafc9c3abe3b899
                                                          • Instruction ID: f281788b7991f7896b8b3265c647370b20b6a04bebae8b1cd665f1f0450cf583
                                                          • Opcode Fuzzy Hash: 8c9ca771c2e680eb46f10629532bb9a982182a74179e8665eaafc9c3abe3b899
                                                          • Instruction Fuzzy Hash: 7D718774104244AFDB21CF18EC48FBABBE9FB88304F54441DF999D7261EB70A956CB11
                                                          APIs
                                                            • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                          • DragQueryPoint.SHELL32(?,?), ref: 00829147
                                                            • Part of subcall function 00827674: ClientToScreen.USER32(?,?), ref: 0082769A
                                                            • Part of subcall function 00827674: GetWindowRect.USER32(?,?), ref: 00827710
                                                            • Part of subcall function 00827674: PtInRect.USER32(?,?,00828B89), ref: 00827720
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 008291B0
                                                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 008291BB
                                                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 008291DE
                                                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00829225
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 0082923E
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00829255
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00829277
                                                          • DragFinish.SHELL32(?), ref: 0082927E
                                                          • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00829371
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                          • API String ID: 221274066-3440237614
                                                          • Opcode ID: 7a857c3821a67aaf099c75ac3cb4996007577ea8356c81012a276f0a9d529e64
                                                          • Instruction ID: 1e9fb36b658e1efe701474a6e69a5557ce8f71ba6fc23f76b3c8387de6d2f690
                                                          • Opcode Fuzzy Hash: 7a857c3821a67aaf099c75ac3cb4996007577ea8356c81012a276f0a9d529e64
                                                          • Instruction Fuzzy Hash: 7C617C71108301AFD701DF64EC89DAFBBE8FF99350F40491DF695922A1DB349A49CBA2
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0080C4B0
                                                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0080C4C3
                                                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0080C4D7
                                                          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0080C4F0
                                                          • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0080C533
                                                          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0080C549
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0080C554
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0080C584
                                                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0080C5DC
                                                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0080C5F0
                                                          • InternetCloseHandle.WININET(00000000), ref: 0080C5FB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                          • String ID:
                                                          • API String ID: 3800310941-3916222277
                                                          • Opcode ID: e9add2049420b3297af69510c994b5bf485ccde8ed4cb4709062745779efa488
                                                          • Instruction ID: df2e09b39e59a3e6cf63d3726b01f7d08b11ef9278705539f2ccf1ee09a8402a
                                                          • Opcode Fuzzy Hash: e9add2049420b3297af69510c994b5bf485ccde8ed4cb4709062745779efa488
                                                          • Instruction Fuzzy Hash: 6B514AB5500608BFDB718F64CD88ABB7BBCFF08754F108619F945D6290DB34E9459BA0
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00828592
                                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 008285A2
                                                          • GlobalAlloc.KERNEL32(00000002,00000000), ref: 008285AD
                                                          • CloseHandle.KERNEL32(00000000), ref: 008285BA
                                                          • GlobalLock.KERNEL32(00000000), ref: 008285C8
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 008285D7
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 008285E0
                                                          • CloseHandle.KERNEL32(00000000), ref: 008285E7
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 008285F8
                                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,0082FC38,?), ref: 00828611
                                                          • GlobalFree.KERNEL32(00000000), ref: 00828621
                                                          • GetObjectW.GDI32(?,00000018,000000FF), ref: 00828641
                                                          • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00828671
                                                          • DeleteObject.GDI32(00000000), ref: 00828699
                                                          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 008286AF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                          • String ID:
                                                          • API String ID: 3840717409-0
                                                          • Opcode ID: 44adb319900364b315d367530b2954d5cfcefb65322a5ba2246966c776d98239
                                                          • Instruction ID: 671b0dff41a313f157185d31d543efb55114d433fda2bcec0732fe6ac3c8cf95
                                                          • Opcode Fuzzy Hash: 44adb319900364b315d367530b2954d5cfcefb65322a5ba2246966c776d98239
                                                          • Instruction Fuzzy Hash: 9E411975601218EFDB21DFA5DD48EAE7BB8FF99715F108058F909E7260DB30A942CB60
                                                          APIs
                                                          • VariantInit.OLEAUT32(00000000), ref: 00801502
                                                          • VariantCopy.OLEAUT32(?,?), ref: 0080150B
                                                          • VariantClear.OLEAUT32(?), ref: 00801517
                                                          • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 008015FB
                                                          • VarR8FromDec.OLEAUT32(?,?), ref: 00801657
                                                          • VariantInit.OLEAUT32(?), ref: 00801708
                                                          • SysFreeString.OLEAUT32(?), ref: 0080178C
                                                          • VariantClear.OLEAUT32(?), ref: 008017D8
                                                          • VariantClear.OLEAUT32(?), ref: 008017E7
                                                          • VariantInit.OLEAUT32(00000000), ref: 00801823
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                          • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                          • API String ID: 1234038744-3931177956
                                                          • Opcode ID: 58bd0985ae82f51803397c50034d9d7cd1e345c9ecb03ca10017bb9a293edc83
                                                          • Instruction ID: ad7f24d5db209d6dbf1397f3307f74bda0af65c137ed21b54fc2bdcedeb27412
                                                          • Opcode Fuzzy Hash: 58bd0985ae82f51803397c50034d9d7cd1e345c9ecb03ca10017bb9a293edc83
                                                          • Instruction Fuzzy Hash: 71D1DD32A00619EBDF50AF64EC8EA7DB7B5FF45724F14815AE406EB1C0DB34A841DBA1
                                                          APIs
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                            • Part of subcall function 0081C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0081B6AE,?,?), ref: 0081C9B5
                                                            • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081C9F1
                                                            • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA68
                                                            • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0081B6F4
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0081B772
                                                          • RegDeleteValueW.ADVAPI32(?,?), ref: 0081B80A
                                                          • RegCloseKey.ADVAPI32(?), ref: 0081B87E
                                                          • RegCloseKey.ADVAPI32(?), ref: 0081B89C
                                                          • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0081B8F2
                                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0081B904
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 0081B922
                                                          • FreeLibrary.KERNEL32(00000000), ref: 0081B983
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 0081B994
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 146587525-4033151799
                                                          • Opcode ID: 2349a5b3e9b81fa236edfecc979666ecd314f8fa6e0f4790c7694654d0c0f4a7
                                                          • Instruction ID: 737e3100edc9977c6fdeebce40ae307fb3036e297e4d5c8a7d3d36e53518ddf0
                                                          • Opcode Fuzzy Hash: 2349a5b3e9b81fa236edfecc979666ecd314f8fa6e0f4790c7694654d0c0f4a7
                                                          • Instruction Fuzzy Hash: 2AC17D31204201EFDB14DF14C495F6ABBE5FF84318F14855CE55A8B2A2DB75EC86CB91
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 008125D8
                                                          • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 008125E8
                                                          • CreateCompatibleDC.GDI32(?), ref: 008125F4
                                                          • SelectObject.GDI32(00000000,?), ref: 00812601
                                                          • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 0081266D
                                                          • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 008126AC
                                                          • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 008126D0
                                                          • SelectObject.GDI32(?,?), ref: 008126D8
                                                          • DeleteObject.GDI32(?), ref: 008126E1
                                                          • DeleteDC.GDI32(?), ref: 008126E8
                                                          • ReleaseDC.USER32(00000000,?), ref: 008126F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                          • String ID: (
                                                          • API String ID: 2598888154-3887548279
                                                          • Opcode ID: c032e0193d0e247eab9c83c12822d494aadd307d918a116cb401861ff9bcf628
                                                          • Instruction ID: ed4a05cfda1c9a04da96c477f4b3848e8cd7d302140903ba04ac77bbd232a1b8
                                                          • Opcode Fuzzy Hash: c032e0193d0e247eab9c83c12822d494aadd307d918a116cb401861ff9bcf628
                                                          • Instruction Fuzzy Hash: 1061D275D00219EFCF14CFA8D885AAEBBB9FF48310F208529E955A7250D770A951CF94
                                                          APIs
                                                          • ___free_lconv_mon.LIBCMT ref: 007CDAA1
                                                            • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD659
                                                            • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD66B
                                                            • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD67D
                                                            • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD68F
                                                            • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD6A1
                                                            • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD6B3
                                                            • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD6C5
                                                            • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD6D7
                                                            • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD6E9
                                                            • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD6FB
                                                            • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD70D
                                                            • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD71F
                                                            • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD731
                                                          • _free.LIBCMT ref: 007CDA96
                                                            • Part of subcall function 007C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000), ref: 007C29DE
                                                            • Part of subcall function 007C29C8: GetLastError.KERNEL32(00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000,00000000), ref: 007C29F0
                                                          • _free.LIBCMT ref: 007CDAB8
                                                          • _free.LIBCMT ref: 007CDACD
                                                          • _free.LIBCMT ref: 007CDAD8
                                                          • _free.LIBCMT ref: 007CDAFA
                                                          • _free.LIBCMT ref: 007CDB0D
                                                          • _free.LIBCMT ref: 007CDB1B
                                                          • _free.LIBCMT ref: 007CDB26
                                                          • _free.LIBCMT ref: 007CDB5E
                                                          • _free.LIBCMT ref: 007CDB65
                                                          • _free.LIBCMT ref: 007CDB82
                                                          • _free.LIBCMT ref: 007CDB9A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                          • String ID:
                                                          • API String ID: 161543041-0
                                                          • Opcode ID: ed16e98a3343bd41f2e1faaf89de1d676a594af2da8f4e9e841264b53afa2046
                                                          • Instruction ID: 58c84757230f259096f9c1d5ea32653a62fa4655864c432f7d64943a74928fb4
                                                          • Opcode Fuzzy Hash: ed16e98a3343bd41f2e1faaf89de1d676a594af2da8f4e9e841264b53afa2046
                                                          • Instruction Fuzzy Hash: 1D313771604705DFEB31AA79E849F5AB7E9FF00311F15842DE449E71A2DA39BC81CB20
                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 007F369C
                                                          • _wcslen.LIBCMT ref: 007F36A7
                                                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 007F3797
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 007F380C
                                                          • GetDlgCtrlID.USER32(?), ref: 007F385D
                                                          • GetWindowRect.USER32(?,?), ref: 007F3882
                                                          • GetParent.USER32(?), ref: 007F38A0
                                                          • ScreenToClient.USER32(00000000), ref: 007F38A7
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 007F3921
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 007F395D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                          • String ID: %s%u
                                                          • API String ID: 4010501982-679674701
                                                          • Opcode ID: 1eee2eee9bb3e1b92dbb4562761ccb3afd04a0a869b3cbda0b521afcab51ca1f
                                                          • Instruction ID: 10279f71db097cdafafe08ced29f4aca3fb29342dc931eb2f89b9abbbd199510
                                                          • Opcode Fuzzy Hash: 1eee2eee9bb3e1b92dbb4562761ccb3afd04a0a869b3cbda0b521afcab51ca1f
                                                          • Instruction Fuzzy Hash: 7491B57120460AEFD715DF24C885BFAF7A8FF44354F008619FA99D2250DB78EA45CBA1
                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 007F4994
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 007F49DA
                                                          • _wcslen.LIBCMT ref: 007F49EB
                                                          • CharUpperBuffW.USER32(?,00000000), ref: 007F49F7
                                                          • _wcsstr.LIBVCRUNTIME ref: 007F4A2C
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 007F4A64
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 007F4A9D
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 007F4AE6
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 007F4B20
                                                          • GetWindowRect.USER32(?,?), ref: 007F4B8B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                          • String ID: ThumbnailClass
                                                          • API String ID: 1311036022-1241985126
                                                          • Opcode ID: 5edcaa97f8b538c3fa8d3e40c5eae3c193d6b90c54e0cf62440b4c99ca33a81e
                                                          • Instruction ID: adfb6fcb2845df5fa02704e860ce794b7864579af8e5bb80d2b46187105553d4
                                                          • Opcode Fuzzy Hash: 5edcaa97f8b538c3fa8d3e40c5eae3c193d6b90c54e0cf62440b4c99ca33a81e
                                                          • Instruction Fuzzy Hash: 39918C711042099FDB14DF14C985BBB77E8FF84314F048469FE859A296EB38ED45CBA1
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(00861990,000000FF,00000000,00000030), ref: 007FBFAC
                                                          • SetMenuItemInfoW.USER32(00861990,00000004,00000000,00000030), ref: 007FBFE1
                                                          • Sleep.KERNEL32(000001F4), ref: 007FBFF3
                                                          • GetMenuItemCount.USER32(?), ref: 007FC039
                                                          • GetMenuItemID.USER32(?,00000000), ref: 007FC056
                                                          • GetMenuItemID.USER32(?,-00000001), ref: 007FC082
                                                          • GetMenuItemID.USER32(?,?), ref: 007FC0C9
                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 007FC10F
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007FC124
                                                          • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007FC145
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$CheckCountRadioSleep
                                                          • String ID: 0
                                                          • API String ID: 1460738036-4108050209
                                                          • Opcode ID: 3b6b2994ce70920a3738510a8acb314159707a999514d4588c987db6a9459b18
                                                          • Instruction ID: a5892fc5b7b00fc4b64efd56b91c63b33bcc342128703eceab208baca5d62647
                                                          • Opcode Fuzzy Hash: 3b6b2994ce70920a3738510a8acb314159707a999514d4588c987db6a9459b18
                                                          • Instruction Fuzzy Hash: 056182B090024DEFDF22CF64CE88ABE7BA8FB05354F144555EA11A7391D739AD15CB60
                                                          APIs
                                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0081CC64
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 0081CC8D
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0081CD48
                                                            • Part of subcall function 0081CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 0081CCAA
                                                            • Part of subcall function 0081CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 0081CCBD
                                                            • Part of subcall function 0081CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0081CCCF
                                                            • Part of subcall function 0081CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0081CD05
                                                            • Part of subcall function 0081CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0081CD28
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 0081CCF3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 2734957052-4033151799
                                                          • Opcode ID: 8ebcb6e245dbf5d4b73d0579d0403ae895eaa6c30c010a01030b6633563d9f42
                                                          • Instruction ID: d6388a366479813e1de374e0a6d620a47c2895ef81f932771f28ce3d12a0d4f1
                                                          • Opcode Fuzzy Hash: 8ebcb6e245dbf5d4b73d0579d0403ae895eaa6c30c010a01030b6633563d9f42
                                                          • Instruction Fuzzy Hash: CC316C71941129BBDB308B55EC88EFFBB7CFF55750F004165A906E2240DA749E86DAE0
                                                          APIs
                                                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00803D40
                                                          • _wcslen.LIBCMT ref: 00803D6D
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00803D9D
                                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00803DBE
                                                          • RemoveDirectoryW.KERNEL32(?), ref: 00803DCE
                                                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00803E55
                                                          • CloseHandle.KERNEL32(00000000), ref: 00803E60
                                                          • CloseHandle.KERNEL32(00000000), ref: 00803E6B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                          • String ID: :$\$\??\%s
                                                          • API String ID: 1149970189-3457252023
                                                          • Opcode ID: 88140d5037a744302ecee1a98181644c391bf612ba6c6e2cd85524041f69b167
                                                          • Instruction ID: 596c0f9f68e50f9ce3af321ccccbe38eebfdca983929f62f1cc03331426297dc
                                                          • Opcode Fuzzy Hash: 88140d5037a744302ecee1a98181644c391bf612ba6c6e2cd85524041f69b167
                                                          • Instruction Fuzzy Hash: 6E318171900209ABDB219BA0DC49FEF77BCFF89740F1041A6F915D61A0EB7497458B24
                                                          APIs
                                                          • timeGetTime.WINMM ref: 007FE6B4
                                                            • Part of subcall function 007AE551: timeGetTime.WINMM(?,?,007FE6D4), ref: 007AE555
                                                          • Sleep.KERNEL32(0000000A), ref: 007FE6E1
                                                          • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 007FE705
                                                          • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 007FE727
                                                          • SetActiveWindow.USER32 ref: 007FE746
                                                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 007FE754
                                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 007FE773
                                                          • Sleep.KERNEL32(000000FA), ref: 007FE77E
                                                          • IsWindow.USER32 ref: 007FE78A
                                                          • EndDialog.USER32(00000000), ref: 007FE79B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                          • String ID: BUTTON
                                                          • API String ID: 1194449130-3405671355
                                                          • Opcode ID: 125f5571201b93628f400f48c5e1167a2f9fa06cc8c3ef04ff57c986300cc855
                                                          • Instruction ID: a1d0c44a567786e306272527ba064686cd3bd01d76c9b405a361067d2099f0a2
                                                          • Opcode Fuzzy Hash: 125f5571201b93628f400f48c5e1167a2f9fa06cc8c3ef04ff57c986300cc855
                                                          • Instruction Fuzzy Hash: 7D21A8B0200608EFEB10AFA4ED8DA393B69F764749F115425F612C13B1DBB99C119B24
                                                          APIs
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 007FEA5D
                                                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 007FEA73
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007FEA84
                                                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 007FEA96
                                                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 007FEAA7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: SendString$_wcslen
                                                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                          • API String ID: 2420728520-1007645807
                                                          • Opcode ID: 546af0eec14588e5aa794bea84868d233c41d3246522fe3e88d64ab4ee879191
                                                          • Instruction ID: 2b5d675d2e38caf526063573cb4abb6f41d140578bca63fac57e00315dd97a4b
                                                          • Opcode Fuzzy Hash: 546af0eec14588e5aa794bea84868d233c41d3246522fe3e88d64ab4ee879191
                                                          • Instruction Fuzzy Hash: E8119131A90219B9EB20A7A5EC4ADFF6A7CFBD1F00F4044297911E31E0FE781919C5B0
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 007FA012
                                                          • SetKeyboardState.USER32(?), ref: 007FA07D
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 007FA09D
                                                          • GetKeyState.USER32(000000A0), ref: 007FA0B4
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 007FA0E3
                                                          • GetKeyState.USER32(000000A1), ref: 007FA0F4
                                                          • GetAsyncKeyState.USER32(00000011), ref: 007FA120
                                                          • GetKeyState.USER32(00000011), ref: 007FA12E
                                                          • GetAsyncKeyState.USER32(00000012), ref: 007FA157
                                                          • GetKeyState.USER32(00000012), ref: 007FA165
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 007FA18E
                                                          • GetKeyState.USER32(0000005B), ref: 007FA19C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: 5adf4abc0fe0bfc15772ee801bcbdaf6e1176955cecd067c4932c9b028711561
                                                          • Instruction ID: 658c0e65ea2b51045162d72eecac906b3a104506a8ce19a714be17ea8cb5453c
                                                          • Opcode Fuzzy Hash: 5adf4abc0fe0bfc15772ee801bcbdaf6e1176955cecd067c4932c9b028711561
                                                          • Instruction Fuzzy Hash: 3651986090478C79FB35DB608815BFAAFF59F12380F088599D7C6573C2EA58AA4CC762
                                                          APIs
                                                          • GetDlgItem.USER32(?,00000001), ref: 007F5CE2
                                                          • GetWindowRect.USER32(00000000,?), ref: 007F5CFB
                                                          • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 007F5D59
                                                          • GetDlgItem.USER32(?,00000002), ref: 007F5D69
                                                          • GetWindowRect.USER32(00000000,?), ref: 007F5D7B
                                                          • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 007F5DCF
                                                          • GetDlgItem.USER32(?,000003E9), ref: 007F5DDD
                                                          • GetWindowRect.USER32(00000000,?), ref: 007F5DEF
                                                          • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 007F5E31
                                                          • GetDlgItem.USER32(?,000003EA), ref: 007F5E44
                                                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 007F5E5A
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 007F5E67
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMoveRect$Invalidate
                                                          • String ID:
                                                          • API String ID: 3096461208-0
                                                          • Opcode ID: 2700a6749d6b2ec81c25c0883a0fcd9e52bde4bc46a57a3631ba9a5ff09a6582
                                                          • Instruction ID: df086a5b86fa7af2e91444132192f0b30a68963cbb4924b11cab7cd7a4ec1313
                                                          • Opcode Fuzzy Hash: 2700a6749d6b2ec81c25c0883a0fcd9e52bde4bc46a57a3631ba9a5ff09a6582
                                                          • Instruction Fuzzy Hash: 7D51FD71B00609AFDB18CF68DD89ABEBBB5FB58310F148229FA15E6290D7749E05CB50
                                                          APIs
                                                            • Part of subcall function 007A8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,007A8BE8,?,00000000,?,?,?,?,007A8BBA,00000000,?), ref: 007A8FC5
                                                          • DestroyWindow.USER32(?), ref: 007A8C81
                                                          • KillTimer.USER32(00000000,?,?,?,?,007A8BBA,00000000,?), ref: 007A8D1B
                                                          • DestroyAcceleratorTable.USER32(00000000), ref: 007E6973
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,007A8BBA,00000000,?), ref: 007E69A1
                                                          • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,007A8BBA,00000000,?), ref: 007E69B8
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,007A8BBA,00000000), ref: 007E69D4
                                                          • DeleteObject.GDI32(00000000), ref: 007E69E6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                          • String ID:
                                                          • API String ID: 641708696-0
                                                          • Opcode ID: f38b22da0be23c3bf483515e7d2479b86d1525d24a91c7760745d200095bf0d9
                                                          • Instruction ID: 5593044dc355e06bed2a3a1c0baa2acda0dc3567fe9ce8c07ac6217d61912cb6
                                                          • Opcode Fuzzy Hash: f38b22da0be23c3bf483515e7d2479b86d1525d24a91c7760745d200095bf0d9
                                                          • Instruction Fuzzy Hash: 5E61CF30502640DFCB759F15C948B39BBF1FB95322F14966CE04297661CB79AC91CF62
                                                          APIs
                                                            • Part of subcall function 007A9944: GetWindowLongW.USER32(?,000000EB), ref: 007A9952
                                                          • GetSysColor.USER32(0000000F), ref: 007A9862
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ColorLongWindow
                                                          • String ID:
                                                          • API String ID: 259745315-0
                                                          • Opcode ID: e2d7e473d23b226b1e29d22d2f801807a2d54e2a323ad903b838bf3d7374955b
                                                          • Instruction ID: 0a54125820bb350b53c13f0be5c1a7767eece7db74611fd66ed35570c21e2458
                                                          • Opcode Fuzzy Hash: e2d7e473d23b226b1e29d22d2f801807a2d54e2a323ad903b838bf3d7374955b
                                                          • Instruction Fuzzy Hash: FF418F31105640AFDB305F389C89BB93B65BB87321F148715FAA2871E1D77D9C62DB10
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: .{
                                                          • API String ID: 0-1852962426
                                                          • Opcode ID: ab936efb722ea5e9237c30e194172dd80fc5a260fb85205e446c0af0a29a7d09
                                                          • Instruction ID: 0f5b7d358a80d577511591812af26291292ecbb365acb0f1d209004dc265aaad
                                                          • Opcode Fuzzy Hash: ab936efb722ea5e9237c30e194172dd80fc5a260fb85205e446c0af0a29a7d09
                                                          • Instruction Fuzzy Hash: 96C1E47590424AEFDB51DFA8D849FEDBBB0BF09310F04409DE915AB392CB789981CB61
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,007DF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 007F9717
                                                          • LoadStringW.USER32(00000000,?,007DF7F8,00000001), ref: 007F9720
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                          • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,007DF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 007F9742
                                                          • LoadStringW.USER32(00000000,?,007DF7F8,00000001), ref: 007F9745
                                                          • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 007F9866
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message_wcslen
                                                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                          • API String ID: 747408836-2268648507
                                                          • Opcode ID: be912dba7186dd1a5c49d0251d3ce903adf70e5dbad626e70b1cf8fb509f2e5e
                                                          • Instruction ID: f6eb78a52f2fec9f9f380ec997ebacaf34fa59e09d6a7693c5145c06b94597f7
                                                          • Opcode Fuzzy Hash: be912dba7186dd1a5c49d0251d3ce903adf70e5dbad626e70b1cf8fb509f2e5e
                                                          • Instruction Fuzzy Hash: 97413D72800209EADF04EBE4ED4AEFEB778AF55340F504169F60572192EB696F48CA61
                                                          APIs
                                                            • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                          • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 007F07A2
                                                          • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 007F07BE
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 007F07DA
                                                          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 007F0804
                                                          • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 007F082C
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 007F0837
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 007F083C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                          • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                          • API String ID: 323675364-22481851
                                                          • Opcode ID: 55582e8bd808971a172f4ead96cb4219263966135e2ae5624b9bea2d644d8619
                                                          • Instruction ID: 531053bbef292b8ded272602192bf614a72580e5d910a45e3f9f25e51f20fcdd
                                                          • Opcode Fuzzy Hash: 55582e8bd808971a172f4ead96cb4219263966135e2ae5624b9bea2d644d8619
                                                          • Instruction Fuzzy Hash: 9F410872C10629EBDF21EBA4EC99CFDB778FF04350B044169E911A3261EB385E04CBA0
                                                          APIs
                                                          • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0082403B
                                                          • CreateCompatibleDC.GDI32(00000000), ref: 00824042
                                                          • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00824055
                                                          • SelectObject.GDI32(00000000,00000000), ref: 0082405D
                                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 00824068
                                                          • DeleteDC.GDI32(00000000), ref: 00824072
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 0082407C
                                                          • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00824092
                                                          • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 0082409E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                          • String ID: static
                                                          • API String ID: 2559357485-2160076837
                                                          • Opcode ID: 40239ae15c772f877c46190b25f2a96ba8dd164dfbf0d49035a540910d05fc45
                                                          • Instruction ID: 1e06d29f01ef5380c5da00d44c3b4ca19f1e17c0e6da89ccba577e951fc2e706
                                                          • Opcode Fuzzy Hash: 40239ae15c772f877c46190b25f2a96ba8dd164dfbf0d49035a540910d05fc45
                                                          • Instruction Fuzzy Hash: 7D316D31101225ABDF219FA8EC09FEE3BA8FF0D720F114211FA15E61A0C775D8A1DBA4
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00813C5C
                                                          • CoInitialize.OLE32(00000000), ref: 00813C8A
                                                          • CoUninitialize.OLE32 ref: 00813C94
                                                          • _wcslen.LIBCMT ref: 00813D2D
                                                          • GetRunningObjectTable.OLE32(00000000,?), ref: 00813DB1
                                                          • SetErrorMode.KERNEL32(00000001,00000029), ref: 00813ED5
                                                          • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00813F0E
                                                          • CoGetObject.OLE32(?,00000000,0082FB98,?), ref: 00813F2D
                                                          • SetErrorMode.KERNEL32(00000000), ref: 00813F40
                                                          • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00813FC4
                                                          • VariantClear.OLEAUT32(?), ref: 00813FD8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                          • String ID:
                                                          • API String ID: 429561992-0
                                                          • Opcode ID: 6ef835e32a2f964f7983b78631968f7156b07ab8f33a76d3ac3182c4fba8dcab
                                                          • Instruction ID: 541115aa48435784aa4853d0c681f16df4c966d0b95a910e028d850578efee17
                                                          • Opcode Fuzzy Hash: 6ef835e32a2f964f7983b78631968f7156b07ab8f33a76d3ac3182c4fba8dcab
                                                          • Instruction Fuzzy Hash: B3C12371608205AFD700DF68C88496AB7E9FF89748F00492DF98ADB251DB31EE46CB52
                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 00807AF3
                                                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00807B8F
                                                          • SHGetDesktopFolder.SHELL32(?), ref: 00807BA3
                                                          • CoCreateInstance.OLE32(0082FD08,00000000,00000001,00856E6C,?), ref: 00807BEF
                                                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00807C74
                                                          • CoTaskMemFree.OLE32(?,?), ref: 00807CCC
                                                          • SHBrowseForFolderW.SHELL32(?), ref: 00807D57
                                                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00807D7A
                                                          • CoTaskMemFree.OLE32(00000000), ref: 00807D81
                                                          • CoTaskMemFree.OLE32(00000000), ref: 00807DD6
                                                          • CoUninitialize.OLE32 ref: 00807DDC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                          • String ID:
                                                          • API String ID: 2762341140-0
                                                          • Opcode ID: 2cc8294391ddc63808e554eb7e39e8e883fb55c97916a70c9e3dbbc807dae1d9
                                                          • Instruction ID: fbb10deb4dfb5e4246c5a2144d5005d6e94ff6779856af4c5939ec012184fd21
                                                          • Opcode Fuzzy Hash: 2cc8294391ddc63808e554eb7e39e8e883fb55c97916a70c9e3dbbc807dae1d9
                                                          • Instruction Fuzzy Hash: 09C13975A04109EFDB54DFA4C888DAEBBF9FF48314B1484A8E919DB261D730EE41CB90
                                                          APIs
                                                          • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00825504
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00825515
                                                          • CharNextW.USER32(00000158), ref: 00825544
                                                          • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00825585
                                                          • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0082559B
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 008255AC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CharNext
                                                          • String ID:
                                                          • API String ID: 1350042424-0
                                                          • Opcode ID: c76ff527d8d52dbb2ad7bf51640ae0bf2e188265a03b10bd8bfa4d00bae525d1
                                                          • Instruction ID: 5e75e1a2c6de396cd158ffea071bc64cb6f0c8887c40947f6cfbbfb9226d3ed3
                                                          • Opcode Fuzzy Hash: c76ff527d8d52dbb2ad7bf51640ae0bf2e188265a03b10bd8bfa4d00bae525d1
                                                          • Instruction Fuzzy Hash: 3A617C70940628EBDF209F94EC84AFE7BB9FF09724F108149F925E6290D7748AC1DB61
                                                          APIs
                                                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 007EFAAF
                                                          • SafeArrayAllocData.OLEAUT32(?), ref: 007EFB08
                                                          • VariantInit.OLEAUT32(?), ref: 007EFB1A
                                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 007EFB3A
                                                          • VariantCopy.OLEAUT32(?,?), ref: 007EFB8D
                                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 007EFBA1
                                                          • VariantClear.OLEAUT32(?), ref: 007EFBB6
                                                          • SafeArrayDestroyData.OLEAUT32(?), ref: 007EFBC3
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 007EFBCC
                                                          • VariantClear.OLEAUT32(?), ref: 007EFBDE
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 007EFBE9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                          • String ID:
                                                          • API String ID: 2706829360-0
                                                          • Opcode ID: 21512aece9a5b3f2b966d163c3002e08e90b7cb1bf33bf66547c90aa1cfe3320
                                                          • Instruction ID: 2721d3d119432ea16e04cb341c575aed42fa8a17a7b5d72834efee4078f06508
                                                          • Opcode Fuzzy Hash: 21512aece9a5b3f2b966d163c3002e08e90b7cb1bf33bf66547c90aa1cfe3320
                                                          • Instruction Fuzzy Hash: 61415075A01219EFCF10EF69DC589AEBBB9FF48354F00C065E905E7261D734A946CBA0
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 007F9CA1
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 007F9D22
                                                          • GetKeyState.USER32(000000A0), ref: 007F9D3D
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 007F9D57
                                                          • GetKeyState.USER32(000000A1), ref: 007F9D6C
                                                          • GetAsyncKeyState.USER32(00000011), ref: 007F9D84
                                                          • GetKeyState.USER32(00000011), ref: 007F9D96
                                                          • GetAsyncKeyState.USER32(00000012), ref: 007F9DAE
                                                          • GetKeyState.USER32(00000012), ref: 007F9DC0
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 007F9DD8
                                                          • GetKeyState.USER32(0000005B), ref: 007F9DEA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: c834f1a0316d950828491d83ac282040aac3b32cae39caed9ae681dbd7734b39
                                                          • Instruction ID: 78922f8a3367252372c8cc54dea07330373eb24b006fa21392ae9a61194609aa
                                                          • Opcode Fuzzy Hash: c834f1a0316d950828491d83ac282040aac3b32cae39caed9ae681dbd7734b39
                                                          • Instruction Fuzzy Hash: BB41A634604BCD69FF71967488043B5BEA07F12344F14805ADBC6567C2EBAD99C8C7A2
                                                          APIs
                                                          • WSAStartup.WSOCK32(00000101,?), ref: 008105BC
                                                          • inet_addr.WSOCK32(?), ref: 0081061C
                                                          • gethostbyname.WSOCK32(?), ref: 00810628
                                                          • IcmpCreateFile.IPHLPAPI ref: 00810636
                                                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 008106C6
                                                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 008106E5
                                                          • IcmpCloseHandle.IPHLPAPI(?), ref: 008107B9
                                                          • WSACleanup.WSOCK32 ref: 008107BF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                          • String ID: Ping
                                                          • API String ID: 1028309954-2246546115
                                                          • Opcode ID: 6aea787f217f6647c49d00ad9f9c2afbd83064acb44583611821cb1be2e26ee3
                                                          • Instruction ID: 8abc471a38a3be8604506699b2237290abefd9527675d6d1393bc547f8cb0d48
                                                          • Opcode Fuzzy Hash: 6aea787f217f6647c49d00ad9f9c2afbd83064acb44583611821cb1be2e26ee3
                                                          • Instruction Fuzzy Hash: CF919A356042019FD720CF15D889F5ABBE4FF88318F0489A9E469DB6A2C7B5EC81CF81
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharLower
                                                          • String ID: cdecl$none$stdcall$winapi
                                                          • API String ID: 707087890-567219261
                                                          • Opcode ID: 711fd48231cc256dfce45499b00ab701545866ffdba484ddc118d29b2a6cf2a0
                                                          • Instruction ID: 6cd65a74900288445db4e0cb3772bd824107d20056aaf63a13504e54bc13bd4a
                                                          • Opcode Fuzzy Hash: 711fd48231cc256dfce45499b00ab701545866ffdba484ddc118d29b2a6cf2a0
                                                          • Instruction Fuzzy Hash: 28518F31A00116DBCF14DF68D9429FEB7AAFF65324B204229E926E72C4DB34DD84C790
                                                          APIs
                                                          • CoInitialize.OLE32 ref: 00813774
                                                          • CoUninitialize.OLE32 ref: 0081377F
                                                          • CoCreateInstance.OLE32(?,00000000,00000017,0082FB78,?), ref: 008137D9
                                                          • IIDFromString.OLE32(?,?), ref: 0081384C
                                                          • VariantInit.OLEAUT32(?), ref: 008138E4
                                                          • VariantClear.OLEAUT32(?), ref: 00813936
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                          • API String ID: 636576611-1287834457
                                                          • Opcode ID: ed2ca149a3740a4667a02e82923d70c2a6515334d3b8cbe241f74946c9c478fb
                                                          • Instruction ID: c119614c6a9bcc543041f41f2e555e9f1116a78a199376e76aff44b660973c7c
                                                          • Opcode Fuzzy Hash: ed2ca149a3740a4667a02e82923d70c2a6515334d3b8cbe241f74946c9c478fb
                                                          • Instruction Fuzzy Hash: 39618C70608301AFD710DF54D888BAABBE8FF49714F104829F985DB291C774EE88CB92
                                                          APIs
                                                          • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 008033CF
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                          • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 008033F0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: LoadString$_wcslen
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 4099089115-3080491070
                                                          • Opcode ID: 3620dc438e0ebddb39e87246340c4e0dc29d701d89b16bfb406fffdf14ce18d8
                                                          • Instruction ID: 9597cd344a7c57b94f554dc2a933413750e5efec0afe6fd1b48eb3e9f072476b
                                                          • Opcode Fuzzy Hash: 3620dc438e0ebddb39e87246340c4e0dc29d701d89b16bfb406fffdf14ce18d8
                                                          • Instruction Fuzzy Hash: 93519C72800209EADF15EBA0DD4AEEEB778FF14340F144165F515B22A2EB792F58DB60
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharUpper
                                                          • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                          • API String ID: 1256254125-769500911
                                                          • Opcode ID: dc2a8ee3aef82256c3f2e95fd7800583718f24f660b8506ac050ddb3b256d5c6
                                                          • Instruction ID: 2f48cf10c2362fca83cd80ada2b53440e388edeceb2fc0f45a10f05b8aaf9aae
                                                          • Opcode Fuzzy Hash: dc2a8ee3aef82256c3f2e95fd7800583718f24f660b8506ac050ddb3b256d5c6
                                                          • Instruction Fuzzy Hash: CA41B632A0112ADBCB206F7DCC905BE77A5BFA4764B244229E621DB384F739DD85C790
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 008053A0
                                                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00805416
                                                          • GetLastError.KERNEL32 ref: 00805420
                                                          • SetErrorMode.KERNEL32(00000000,READY), ref: 008054A7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Error$Mode$DiskFreeLastSpace
                                                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                          • API String ID: 4194297153-14809454
                                                          • Opcode ID: c64cf05edd44ec82f4932bff8163b3832565ee8681a573b621f258915ca6fdb8
                                                          • Instruction ID: abba89c24541d36d4777ce9cc080c0f835ab63f12069e83ea6a96eea733e053a
                                                          • Opcode Fuzzy Hash: c64cf05edd44ec82f4932bff8163b3832565ee8681a573b621f258915ca6fdb8
                                                          • Instruction Fuzzy Hash: 6531D3B5A00908DFCB50DF68C889AEABBB4FF05305F548059E901CB2A2D731DD86CFA1
                                                          APIs
                                                          • CreateMenu.USER32 ref: 00823C79
                                                          • SetMenu.USER32(?,00000000), ref: 00823C88
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00823D10
                                                          • IsMenu.USER32(?), ref: 00823D24
                                                          • CreatePopupMenu.USER32 ref: 00823D2E
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00823D5B
                                                          • DrawMenuBar.USER32 ref: 00823D63
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                          • String ID: 0$F
                                                          • API String ID: 161812096-3044882817
                                                          • Opcode ID: 5aa7310370f29755c13b6edc58abb37fa908a36320c4b4b32617ccfe9beca193
                                                          • Instruction ID: f46cce4179c02593c26075cc4e2c54491e81e37fc18c7aea29aa4522baf759ea
                                                          • Opcode Fuzzy Hash: 5aa7310370f29755c13b6edc58abb37fa908a36320c4b4b32617ccfe9beca193
                                                          • Instruction Fuzzy Hash: 61418874A01219EFDF24CF64E854AAABBB5FF49300F144028E946E7360D774EA11CF90
                                                          APIs
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                            • Part of subcall function 007F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007F3CCA
                                                          • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 007F1F64
                                                          • GetDlgCtrlID.USER32 ref: 007F1F6F
                                                          • GetParent.USER32 ref: 007F1F8B
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 007F1F8E
                                                          • GetDlgCtrlID.USER32(?), ref: 007F1F97
                                                          • GetParent.USER32(?), ref: 007F1FAB
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 007F1FAE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 711023334-1403004172
                                                          • Opcode ID: 438ff7a4d8f997bf717aee57ed2c71495ba71ce98090a5c42fe8a6737a387be4
                                                          • Instruction ID: 1d8a40a03b60881c24ba9daf0983e6c5c8c9226d985f98702ff35ae86ef8103d
                                                          • Opcode Fuzzy Hash: 438ff7a4d8f997bf717aee57ed2c71495ba71ce98090a5c42fe8a6737a387be4
                                                          • Instruction Fuzzy Hash: B221AF70900218EBDF14EFA5DC99DFEBBA8EB15310F404159BA61A72A1DB385909DB60
                                                          APIs
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                            • Part of subcall function 007F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007F3CCA
                                                          • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 007F2043
                                                          • GetDlgCtrlID.USER32 ref: 007F204E
                                                          • GetParent.USER32 ref: 007F206A
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 007F206D
                                                          • GetDlgCtrlID.USER32(?), ref: 007F2076
                                                          • GetParent.USER32(?), ref: 007F208A
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 007F208D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 711023334-1403004172
                                                          • Opcode ID: 3194740e7d9f03caa6e073e5432f0be61d5c9b6cdd25b83a541e0da04f4f2c50
                                                          • Instruction ID: 94c96f1ed98b16802cab59bc8cf6d8079df017a112fa709730c16345ba6d43be
                                                          • Opcode Fuzzy Hash: 3194740e7d9f03caa6e073e5432f0be61d5c9b6cdd25b83a541e0da04f4f2c50
                                                          • Instruction Fuzzy Hash: A221D471900218BBDF10AFA4DC49EFEBBB8FF15340F104409BA61A72A1DB794919DB70
                                                          APIs
                                                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00823A9D
                                                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00823AA0
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00823AC7
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00823AEA
                                                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00823B62
                                                          • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00823BAC
                                                          • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00823BC7
                                                          • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00823BE2
                                                          • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00823BF6
                                                          • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00823C13
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$LongWindow
                                                          • String ID:
                                                          • API String ID: 312131281-0
                                                          • Opcode ID: 729bd1cf4577f71f730b3fc3fdf9970d51f36b8be2aba0834ab5acf70eb197c7
                                                          • Instruction ID: 31d72e4892d9737bd7c13783d3a73ad11d6c49e45c2995278cbaa2abb2e4d40e
                                                          • Opcode Fuzzy Hash: 729bd1cf4577f71f730b3fc3fdf9970d51f36b8be2aba0834ab5acf70eb197c7
                                                          • Instruction Fuzzy Hash: 15618975900218AFDB10DFA8DC95EEE77B8FB09710F14009AFA15E72A2C774AE81DB50
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 007FB151
                                                          • GetForegroundWindow.USER32(00000000,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB165
                                                          • GetWindowThreadProcessId.USER32(00000000), ref: 007FB16C
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB17B
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 007FB18D
                                                          • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB1A6
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB1B8
                                                          • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB1FD
                                                          • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB212
                                                          • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB21D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                          • String ID:
                                                          • API String ID: 2156557900-0
                                                          • Opcode ID: 0ba5a31f9abe303752454fc651d4f1841ea3e983e20644f79a7cb81a382b6864
                                                          • Instruction ID: f34301f0a5ca896d6c7366f90e0286e6c3c0c729c6bff50163978e0c58490073
                                                          • Opcode Fuzzy Hash: 0ba5a31f9abe303752454fc651d4f1841ea3e983e20644f79a7cb81a382b6864
                                                          • Instruction Fuzzy Hash: 14318DB5500608BFEB209F64DC48BBD7BA9FBA1321F119019FB05D6290D7B89E458F61
                                                          APIs
                                                          • _free.LIBCMT ref: 007C2C94
                                                            • Part of subcall function 007C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000), ref: 007C29DE
                                                            • Part of subcall function 007C29C8: GetLastError.KERNEL32(00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000,00000000), ref: 007C29F0
                                                          • _free.LIBCMT ref: 007C2CA0
                                                          • _free.LIBCMT ref: 007C2CAB
                                                          • _free.LIBCMT ref: 007C2CB6
                                                          • _free.LIBCMT ref: 007C2CC1
                                                          • _free.LIBCMT ref: 007C2CCC
                                                          • _free.LIBCMT ref: 007C2CD7
                                                          • _free.LIBCMT ref: 007C2CE2
                                                          • _free.LIBCMT ref: 007C2CED
                                                          • _free.LIBCMT ref: 007C2CFB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: c8d4d671216b774df3d06d03098e9046d6387746a31d8e7b96f721898edbecb5
                                                          • Instruction ID: ae70cf53277b433889f567f6eccfe88be024aa02f433928240695eb3e2723d7d
                                                          • Opcode Fuzzy Hash: c8d4d671216b774df3d06d03098e9046d6387746a31d8e7b96f721898edbecb5
                                                          • Instruction Fuzzy Hash: D3118076100108EFCB02EF94D886E9D3BA5BF05350F5144A9FA48AB232DA35EA519F90
                                                          APIs
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00807FAD
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00807FC1
                                                          • GetFileAttributesW.KERNEL32(?), ref: 00807FEB
                                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 00808005
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00808017
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00808060
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 008080B0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory$AttributesFile
                                                          • String ID: *.*
                                                          • API String ID: 769691225-438819550
                                                          • Opcode ID: 09fe5a47267959c940d3cb2d5891066b4bd75dc262b4722877c13b19ab9848b2
                                                          • Instruction ID: 163faf5c8efbe01031da2b9d447e1ebd556a2d4a64ea088c7e68eaea6f11d3ac
                                                          • Opcode Fuzzy Hash: 09fe5a47267959c940d3cb2d5891066b4bd75dc262b4722877c13b19ab9848b2
                                                          • Instruction Fuzzy Hash: E9819072908245DBCB60EF14C8449AEB3E9FF89714F54886EF885C7290EB35ED45CB52
                                                          APIs
                                                          • SetWindowLongW.USER32(?,000000EB), ref: 00795C7A
                                                            • Part of subcall function 00795D0A: GetClientRect.USER32(?,?), ref: 00795D30
                                                            • Part of subcall function 00795D0A: GetWindowRect.USER32(?,?), ref: 00795D71
                                                            • Part of subcall function 00795D0A: ScreenToClient.USER32(?,?), ref: 00795D99
                                                          • GetDC.USER32 ref: 007D46F5
                                                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 007D4708
                                                          • SelectObject.GDI32(00000000,00000000), ref: 007D4716
                                                          • SelectObject.GDI32(00000000,00000000), ref: 007D472B
                                                          • ReleaseDC.USER32(?,00000000), ref: 007D4733
                                                          • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 007D47C4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                          • String ID: U
                                                          • API String ID: 4009187628-3372436214
                                                          • Opcode ID: a841ffcefa8c8851f360938bc361b3ae9c66af460e6d870c2eab5a76c14a0797
                                                          • Instruction ID: 9782fcd2aab76b3284bbec311cf1d32c9bb9e01680b950fd311b007a561a4e00
                                                          • Opcode Fuzzy Hash: a841ffcefa8c8851f360938bc361b3ae9c66af460e6d870c2eab5a76c14a0797
                                                          • Instruction Fuzzy Hash: 7771D131500205DFCF228F64D984ABA7BB6FF4A360F18426AED565A3A6C739DC41DF60
                                                          APIs
                                                          • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 008035E4
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                          • LoadStringW.USER32(00862390,?,00000FFF,?), ref: 0080360A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: LoadString$_wcslen
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 4099089115-2391861430
                                                          • Opcode ID: 02967f8cb2d06e7900f5a8bdb1fa293d3c6681ff0b532f788f5c1d41850422d5
                                                          • Instruction ID: 71efcacea93009122cded72c76f2d267a390dc6e88f1d3c0e6e9d8c81664da85
                                                          • Opcode Fuzzy Hash: 02967f8cb2d06e7900f5a8bdb1fa293d3c6681ff0b532f788f5c1d41850422d5
                                                          • Instruction Fuzzy Hash: FF515171800109FADF15EBA0DC4AEEDBB78FF14340F144129F615B22A1EB791B99DBA1
                                                          APIs
                                                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0080C272
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0080C29A
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0080C2CA
                                                          • GetLastError.KERNEL32 ref: 0080C322
                                                          • SetEvent.KERNEL32(?), ref: 0080C336
                                                          • InternetCloseHandle.WININET(00000000), ref: 0080C341
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                          • String ID:
                                                          • API String ID: 3113390036-3916222277
                                                          • Opcode ID: 50dce172bcb3b34689aaf34a1b92669320ff531969ddd5ba6cda0cadf3f35f93
                                                          • Instruction ID: 341a6e76168e87c015857d13addd3f22aa597ed73cc4611f53eee802d1665067
                                                          • Opcode Fuzzy Hash: 50dce172bcb3b34689aaf34a1b92669320ff531969ddd5ba6cda0cadf3f35f93
                                                          • Instruction Fuzzy Hash: 393149B1600608AFD7719FA98C89ABB7AFCFB49744F14861EF446D2280DB34DD059BA1
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,007D3AAF,?,?,Bad directive syntax error,0082CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 007F98BC
                                                          • LoadStringW.USER32(00000000,?,007D3AAF,?), ref: 007F98C3
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                          • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 007F9987
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadMessageModuleString_wcslen
                                                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                          • API String ID: 858772685-4153970271
                                                          • Opcode ID: 89381a5c8e28f74921f445f80b17bbcfeef8d872bc0cecd9be723088cc5c6967
                                                          • Instruction ID: 78299dc4df60209f2da1503fc1260ef3373f9d524708282da2661724d3c034e8
                                                          • Opcode Fuzzy Hash: 89381a5c8e28f74921f445f80b17bbcfeef8d872bc0cecd9be723088cc5c6967
                                                          • Instruction Fuzzy Hash: F8216F3184021DEBDF11AF90DC0AEFE7779FF14301F044459F615621A1EA79A628DB60
                                                          APIs
                                                          • GetParent.USER32 ref: 007F20AB
                                                          • GetClassNameW.USER32(00000000,?,00000100), ref: 007F20C0
                                                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 007F214D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameParentSend
                                                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                          • API String ID: 1290815626-3381328864
                                                          • Opcode ID: f80b7d1c9f8b57ddb88c79c676a3339505c3d5b436da6f9f3d278b37fb564084
                                                          • Instruction ID: 99ae6d631c0a8d8130bf7fc1e47456e69b79a7c63604d635b646f2edd95c55d2
                                                          • Opcode Fuzzy Hash: f80b7d1c9f8b57ddb88c79c676a3339505c3d5b436da6f9f3d278b37fb564084
                                                          • Instruction Fuzzy Hash: 3511277628870EF9FA1122209C1BDFA739CEB15325B204116FB04E42D3FB6DA80B5619
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                          • String ID:
                                                          • API String ID: 1282221369-0
                                                          • Opcode ID: cd79d9fd22bd7c709edceef0bab013fc1184eaa8439f352b2a5d79df559a74e7
                                                          • Instruction ID: 266c582803aee034355baa6673a9c45b1070f8b47a03223ab81298e88d6b3f4d
                                                          • Opcode Fuzzy Hash: cd79d9fd22bd7c709edceef0bab013fc1184eaa8439f352b2a5d79df559a74e7
                                                          • Instruction Fuzzy Hash: A2613772904300AFDB32AFB49889F6E7BA5AF05320F05426DF948EB282D77D9D419B50
                                                          APIs
                                                          • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00825186
                                                          • ShowWindow.USER32(?,00000000), ref: 008251C7
                                                          • ShowWindow.USER32(?,00000005,?,00000000), ref: 008251CD
                                                          • SetFocus.USER32(?,?,00000005,?,00000000), ref: 008251D1
                                                            • Part of subcall function 00826FBA: DeleteObject.GDI32(00000000), ref: 00826FE6
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 0082520D
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0082521A
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0082524D
                                                          • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00825287
                                                          • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00825296
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                          • String ID:
                                                          • API String ID: 3210457359-0
                                                          • Opcode ID: 1d8a445f3bcff81d62c7a963d48c8511267afe32a0f34d800f3d1926434ba885
                                                          • Instruction ID: 1db447e0024506dc08a3e4c6d4f48196a29fb52ae5f13eb33e4142e007a1ffaa
                                                          • Opcode Fuzzy Hash: 1d8a445f3bcff81d62c7a963d48c8511267afe32a0f34d800f3d1926434ba885
                                                          • Instruction Fuzzy Hash: 8A519130AD0A28FEEF309F24EC4ABA83B65FB05325F148112F615D62E1C775A9E4DB41
                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 007E6890
                                                          • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 007E68A9
                                                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 007E68B9
                                                          • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 007E68D1
                                                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 007E68F2
                                                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,007A8874,00000000,00000000,00000000,000000FF,00000000), ref: 007E6901
                                                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 007E691E
                                                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,007A8874,00000000,00000000,00000000,000000FF,00000000), ref: 007E692D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                          • String ID:
                                                          • API String ID: 1268354404-0
                                                          • Opcode ID: feb1cca37e6e1c8e07c6d99f66a039d95ae5278364bab052d041d65730c28368
                                                          • Instruction ID: 16b69450878d25d38401803ad697587a28fc53753c62a18df9a2ee40c218bc7e
                                                          • Opcode Fuzzy Hash: feb1cca37e6e1c8e07c6d99f66a039d95ae5278364bab052d041d65730c28368
                                                          • Instruction Fuzzy Hash: 39519BB0600209EFDB20DF25CC55FAA7BB5FF99350F144628F912972A0DB78E991DB60
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0080C182
                                                          • GetLastError.KERNEL32 ref: 0080C195
                                                          • SetEvent.KERNEL32(?), ref: 0080C1A9
                                                            • Part of subcall function 0080C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0080C272
                                                            • Part of subcall function 0080C253: GetLastError.KERNEL32 ref: 0080C322
                                                            • Part of subcall function 0080C253: SetEvent.KERNEL32(?), ref: 0080C336
                                                            • Part of subcall function 0080C253: InternetCloseHandle.WININET(00000000), ref: 0080C341
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                          • String ID:
                                                          • API String ID: 337547030-0
                                                          • Opcode ID: d0cb87f71462cc190df42e5e463a20b9db291e258d2dbf0beb995b526b78bf7f
                                                          • Instruction ID: ebfd3c5318661e6732b9dafc32c1dc5594ca3e62f75a853880169b401c746b2f
                                                          • Opcode Fuzzy Hash: d0cb87f71462cc190df42e5e463a20b9db291e258d2dbf0beb995b526b78bf7f
                                                          • Instruction Fuzzy Hash: 36318C71600605EFDB619FA9DD44A7ABBF8FF18300B00862DF956C2A50DB30E815ABA0
                                                          APIs
                                                            • Part of subcall function 007F3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 007F3A57
                                                            • Part of subcall function 007F3A3D: GetCurrentThreadId.KERNEL32 ref: 007F3A5E
                                                            • Part of subcall function 007F3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,007F25B3), ref: 007F3A65
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 007F25BD
                                                          • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 007F25DB
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 007F25DF
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 007F25E9
                                                          • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 007F2601
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 007F2605
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 007F260F
                                                          • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 007F2623
                                                          • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 007F2627
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                          • String ID:
                                                          • API String ID: 2014098862-0
                                                          • Opcode ID: 2bf97a32e73006a19948ea23071913f27b3390e42c489c87d4c24fcbee5e70c5
                                                          • Instruction ID: f7151d5acb5518bbdcce7d7355b956f3f5734868186b24684cea78f87c12d92d
                                                          • Opcode Fuzzy Hash: 2bf97a32e73006a19948ea23071913f27b3390e42c489c87d4c24fcbee5e70c5
                                                          • Instruction Fuzzy Hash: 3D01D430390614BBFB2067699C8EF693F59EF5EB12F104005F328AF1D1C9E624569A69
                                                          APIs
                                                          • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,007F1449,?,?,00000000), ref: 007F180C
                                                          • HeapAlloc.KERNEL32(00000000,?,007F1449,?,?,00000000), ref: 007F1813
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,007F1449,?,?,00000000), ref: 007F1828
                                                          • GetCurrentProcess.KERNEL32(?,00000000,?,007F1449,?,?,00000000), ref: 007F1830
                                                          • DuplicateHandle.KERNEL32(00000000,?,007F1449,?,?,00000000), ref: 007F1833
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,007F1449,?,?,00000000), ref: 007F1843
                                                          • GetCurrentProcess.KERNEL32(007F1449,00000000,?,007F1449,?,?,00000000), ref: 007F184B
                                                          • DuplicateHandle.KERNEL32(00000000,?,007F1449,?,?,00000000), ref: 007F184E
                                                          • CreateThread.KERNEL32(00000000,00000000,007F1874,00000000,00000000,00000000), ref: 007F1868
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                          • String ID:
                                                          • API String ID: 1957940570-0
                                                          • Opcode ID: 68858aea46da432531036967a1b54308dcf8e07730e78119cd97fe4ff8522fc6
                                                          • Instruction ID: d4ab47c54f488b40fab98aca3d919ea45f5035fe5ecd010d15a8f49f791ca61c
                                                          • Opcode Fuzzy Hash: 68858aea46da432531036967a1b54308dcf8e07730e78119cd97fe4ff8522fc6
                                                          • Instruction Fuzzy Hash: 3D01BFB5640308BFE720AB65DC4EF6B7B6CFB89B11F508411FA05DB291C6749815CB60
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: __alldvrm$_strrchr
                                                          • String ID: }}{$}}{$}}{
                                                          • API String ID: 1036877536-3362948059
                                                          • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                          • Instruction ID: 382d1c7672091965978773cb88a9e076100139ac1b8e1d6416fcc4954cc8279b
                                                          • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                          • Instruction Fuzzy Hash: CFA14772E003869FDB21CF18C8A1FAEBBF5EF65350F1845ADE5859B282C23C8981C750
                                                          APIs
                                                            • Part of subcall function 007FD4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 007FD501
                                                            • Part of subcall function 007FD4DC: Process32FirstW.KERNEL32(00000000,?), ref: 007FD50F
                                                            • Part of subcall function 007FD4DC: CloseHandle.KERNELBASE(00000000), ref: 007FD5DC
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0081A16D
                                                          • GetLastError.KERNEL32 ref: 0081A180
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0081A1B3
                                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 0081A268
                                                          • GetLastError.KERNEL32(00000000), ref: 0081A273
                                                          • CloseHandle.KERNEL32(00000000), ref: 0081A2C4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                          • String ID: SeDebugPrivilege
                                                          • API String ID: 2533919879-2896544425
                                                          • Opcode ID: ca0c099a9d90d0607e216d7dc3ee1667ef7fc71d9188cee548362cf6268cc430
                                                          • Instruction ID: fdcdf18c1bf07b151a143ab81d14be52c000c8b18f43745de059449e82d138d3
                                                          • Opcode Fuzzy Hash: ca0c099a9d90d0607e216d7dc3ee1667ef7fc71d9188cee548362cf6268cc430
                                                          • Instruction Fuzzy Hash: AD619C31205242AFD724DF14C498F69BBA5FF44318F58848CE46A8B7A2C776EC85CB82
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00823925
                                                          • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 0082393A
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00823954
                                                          • _wcslen.LIBCMT ref: 00823999
                                                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 008239C6
                                                          • SendMessageW.USER32(?,00001061,?,0000000F), ref: 008239F4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window_wcslen
                                                          • String ID: SysListView32
                                                          • API String ID: 2147712094-78025650
                                                          • Opcode ID: 41edcac9abafdef83806e3ac9465ecf20239d464cf69ee7df7fc5559aaeb8d22
                                                          • Instruction ID: 23bb535010783b24bc0a04d1c81f8dbc7abbe18cb3ae4f21722c9fc431446de9
                                                          • Opcode Fuzzy Hash: 41edcac9abafdef83806e3ac9465ecf20239d464cf69ee7df7fc5559aaeb8d22
                                                          • Instruction Fuzzy Hash: 4B41A371A00229ABEF219F64DC49FEE7BA9FF08350F100526F958E7281D7759AC4CB90
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007FBCFD
                                                          • IsMenu.USER32(00000000), ref: 007FBD1D
                                                          • CreatePopupMenu.USER32 ref: 007FBD53
                                                          • GetMenuItemCount.USER32(018962D8), ref: 007FBDA4
                                                          • InsertMenuItemW.USER32(018962D8,?,00000001,00000030), ref: 007FBDCC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                          • String ID: 0$2
                                                          • API String ID: 93392585-3793063076
                                                          • Opcode ID: c440b3d8fefcb792e356208f6e35ca44c860d886a482e122566092f6fa0a76a4
                                                          • Instruction ID: 4048bd5710bc4f97e7db7ce92cc6fae5edfcfcfc1d61ea13159e03c686775cb1
                                                          • Opcode Fuzzy Hash: c440b3d8fefcb792e356208f6e35ca44c860d886a482e122566092f6fa0a76a4
                                                          • Instruction Fuzzy Hash: 50519E70B0020DDBDB24DFA8D988BBEBBF4BF45314F148159E61197391D778A941CB62
                                                          APIs
                                                          • _ValidateLocalCookies.LIBCMT ref: 007B2D4B
                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 007B2D53
                                                          • _ValidateLocalCookies.LIBCMT ref: 007B2DE1
                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 007B2E0C
                                                          • _ValidateLocalCookies.LIBCMT ref: 007B2E61
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                          • String ID: &H{$csm
                                                          • API String ID: 1170836740-2200307801
                                                          • Opcode ID: 226c42a77186194b240b98f728613f119761b2e68c0326a0ce68f8b77bbc7a77
                                                          • Instruction ID: 10ee86cc80fe3a6c91d5c4c75b8784c8484793eb6b2baed0c005912a8164e85c
                                                          • Opcode Fuzzy Hash: 226c42a77186194b240b98f728613f119761b2e68c0326a0ce68f8b77bbc7a77
                                                          • Instruction Fuzzy Hash: 83418034A01209EBCF10DF68C849BDEBBB5FF44364F148155E814AB393D739AA46CBA1
                                                          APIs
                                                          • LoadIconW.USER32(00000000,00007F03), ref: 007FC913
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: IconLoad
                                                          • String ID: blank$info$question$stop$warning
                                                          • API String ID: 2457776203-404129466
                                                          • Opcode ID: 887714a83c0330c24591b2f86ebeab0ca94bac068d637cd341325b6c50962d7a
                                                          • Instruction ID: 0808bdb201ecc9c2968723ccf2a05b8cf653d43e08f15178d07b20ac7dc1f569
                                                          • Opcode Fuzzy Hash: 887714a83c0330c24591b2f86ebeab0ca94bac068d637cd341325b6c50962d7a
                                                          • Instruction Fuzzy Hash: B5112B3168930EBEEB02DB54DD82DFE679CDF15365B50402AFA00E7382E7ADAE045264
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                          • String ID: 0.0.0.0
                                                          • API String ID: 642191829-3771769585
                                                          • Opcode ID: 58124d16432221e73aed56366168cfd9652148f7d24038854eae396e6fed6efb
                                                          • Instruction ID: 7909ba87be17401f673832e7e25d287a91fa14149006453f36c95f47ea416e6a
                                                          • Opcode Fuzzy Hash: 58124d16432221e73aed56366168cfd9652148f7d24038854eae396e6fed6efb
                                                          • Instruction Fuzzy Hash: B6110371904118EFCB30BB649C0EEFE77ADEF11711F0101B9F645AA291EF799E818A61
                                                          APIs
                                                            • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                          • GetSystemMetrics.USER32(0000000F), ref: 00829FC7
                                                          • GetSystemMetrics.USER32(0000000F), ref: 00829FE7
                                                          • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0082A224
                                                          • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0082A242
                                                          • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0082A263
                                                          • ShowWindow.USER32(00000003,00000000), ref: 0082A282
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 0082A2A7
                                                          • DefDlgProcW.USER32(?,00000005,?,?), ref: 0082A2CA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                          • String ID:
                                                          • API String ID: 1211466189-0
                                                          • Opcode ID: 5fae32357a2893c4f5bd73461a4d1c644e6e9b5f9ed300478f380ca1be4fba73
                                                          • Instruction ID: 6ccff2a151c6a42b3cbb6b79b3c1156d3d37e2603539f304167d10db8d2a50bd
                                                          • Opcode Fuzzy Hash: 5fae32357a2893c4f5bd73461a4d1c644e6e9b5f9ed300478f380ca1be4fba73
                                                          • Instruction Fuzzy Hash: 02B18931600229DFDF18CF68D9857AE7BB2FF44711F098069EC49DB295D731A990CB61
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$LocalTime
                                                          • String ID:
                                                          • API String ID: 952045576-0
                                                          • Opcode ID: a220e3450d141373a7d4a9668078fcb6540863b26c8c4f8b50b21b6db6d55ddd
                                                          • Instruction ID: f7890f16ccd1d9ccb1d71fd94305063ef367c7cb508c6a143653569089bb1668
                                                          • Opcode Fuzzy Hash: a220e3450d141373a7d4a9668078fcb6540863b26c8c4f8b50b21b6db6d55ddd
                                                          • Instruction Fuzzy Hash: 3A419666C10118B6DB11EBF48C8EADF77A8BF45710F508462E614E3222FB3CE655C3A6
                                                          APIs
                                                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,007E682C,00000004,00000000,00000000), ref: 007AF953
                                                          • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,007E682C,00000004,00000000,00000000), ref: 007EF3D1
                                                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,007E682C,00000004,00000000,00000000), ref: 007EF454
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ShowWindow
                                                          • String ID:
                                                          • API String ID: 1268545403-0
                                                          • Opcode ID: b5a02ca66d403662c43017161f16ba5fcf9498f3793ad8e75c4cf63b996917dd
                                                          • Instruction ID: 79fabeb420d3ab25be2e172200e209e9d1d5923addbccca41299d934c428077e
                                                          • Opcode Fuzzy Hash: b5a02ca66d403662c43017161f16ba5fcf9498f3793ad8e75c4cf63b996917dd
                                                          • Instruction Fuzzy Hash: 0A4118302056C0BEC7759B6D888877B7B91BBDB310F14863DE047D2961C63DB880CB52
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 00822D1B
                                                          • GetDC.USER32(00000000), ref: 00822D23
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00822D2E
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 00822D3A
                                                          • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00822D76
                                                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00822D87
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00825A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00822DC2
                                                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00822DE1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                          • String ID:
                                                          • API String ID: 3864802216-0
                                                          • Opcode ID: 62b9972dd610a14a0bce79d0d3d9fe1558a66f9f8ca3a88b6366d74124b3f6a0
                                                          • Instruction ID: e5fd1b6ad4c927401ddb825d7c2f80c6674c2833901521195b80af444e0c420c
                                                          • Opcode Fuzzy Hash: 62b9972dd610a14a0bce79d0d3d9fe1558a66f9f8ca3a88b6366d74124b3f6a0
                                                          • Instruction Fuzzy Hash: 94318972201624BFEB218F549C8AFFB3BA9FF09711F048055FE08DA291C6759C91CBA4
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: 7fe6feba54d9d25956e7c247d66ab44b9d8b5cd5f1507338d8ccb2c4b15a8967
                                                          • Instruction ID: 51e36369dc2713af9fb3685b3a065b9f307f28a7522798059d1b095b2d5a1340
                                                          • Opcode Fuzzy Hash: 7fe6feba54d9d25956e7c247d66ab44b9d8b5cd5f1507338d8ccb2c4b15a8967
                                                          • Instruction Fuzzy Hash: 0E218361644A2DB7D6146620DD96FFA23ACAF20794B840030FF25DB782F72CED10C6A5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: NULL Pointer assignment$Not an Object type
                                                          • API String ID: 0-572801152
                                                          • Opcode ID: aa9dac0222d06ce49a04be723acc9501c3c56f3489463c39043a9e32555d99a3
                                                          • Instruction ID: 7d70ecfbfb8ff03bc739c056bbcadbb10e58ae468660f78b73dbf1d8b0d7b4d3
                                                          • Opcode Fuzzy Hash: aa9dac0222d06ce49a04be723acc9501c3c56f3489463c39043a9e32555d99a3
                                                          • Instruction Fuzzy Hash: C2D17D71A0060AEFDB10CF98D881BEEB7B9FF88344F148569E915EB281D7709985CB90
                                                          APIs
                                                          • GetCPInfo.KERNEL32(?,?), ref: 007D15CE
                                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 007D1651
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 007D16E4
                                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 007D16FB
                                                            • Part of subcall function 007C3820: RtlAllocateHeap.NTDLL(00000000,?,00861444,?,007AFDF5,?,?,0079A976,00000010,00861440,007913FC,?,007913C6,?,00791129), ref: 007C3852
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 007D1777
                                                          • __freea.LIBCMT ref: 007D17A2
                                                          • __freea.LIBCMT ref: 007D17AE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                          • String ID:
                                                          • API String ID: 2829977744-0
                                                          • Opcode ID: 4f11efc3a6210d5c9e0974393d4507f77bc912e4bf5c2a7335906ec9be9a15f2
                                                          • Instruction ID: 2dccec73f3ce1f8873bcbd4af898703067f4846658a0f852493238a4b69bbe76
                                                          • Opcode Fuzzy Hash: 4f11efc3a6210d5c9e0974393d4507f77bc912e4bf5c2a7335906ec9be9a15f2
                                                          • Instruction Fuzzy Hash: 2B91C471E00216BADB208E74DD85EEE7BB5AF49310F98466AE806E7351DB3DDD40CB60
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit
                                                          • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                          • API String ID: 2610073882-625585964
                                                          • Opcode ID: 60b051132e3b3822c593ea0ffa93c750e8827d71031f9ef8bd9ba1b9eed40d72
                                                          • Instruction ID: 56beea37f6ae5cc035f9330a7d19d8d0b45a6e5f4e6412a1703bbfebc4ff6430
                                                          • Opcode Fuzzy Hash: 60b051132e3b3822c593ea0ffa93c750e8827d71031f9ef8bd9ba1b9eed40d72
                                                          • Instruction Fuzzy Hash: 6C916B71A00219ABDF20CFA4D888FEEBBB8FF46715F108559F515EB281D7709985CBA0
                                                          APIs
                                                          • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 0080125C
                                                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00801284
                                                          • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 008012A8
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 008012D8
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 0080135F
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 008013C4
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00801430
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                          • String ID:
                                                          • API String ID: 2550207440-0
                                                          • Opcode ID: 08207785d5e61cc113752d454ea36b4400b03ae45bf442a34431ae499ae106f3
                                                          • Instruction ID: db8606b86ef554a769281e293c475b582d351fba0cb9a843b06e18396a55793f
                                                          • Opcode Fuzzy Hash: 08207785d5e61cc113752d454ea36b4400b03ae45bf442a34431ae499ae106f3
                                                          • Instruction Fuzzy Hash: CD91BE71A002099FEF50DFA8C889BBEB7B5FF45325F114029E901EB2A1D778A941CB95
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ObjectSelect$BeginCreatePath
                                                          • String ID:
                                                          • API String ID: 3225163088-0
                                                          • Opcode ID: 69d4b2e7ab9bc225a00ab4a3cff495542c46a46829741c44af502276886ce520
                                                          • Instruction ID: 2d7cfe500ab3b1cf07ba2ef0be7d2629edc294f9ec5cc73aa90d8b7d2a46ff33
                                                          • Opcode Fuzzy Hash: 69d4b2e7ab9bc225a00ab4a3cff495542c46a46829741c44af502276886ce520
                                                          • Instruction Fuzzy Hash: 63915C71D00219EFCB14CFA9CC89AEEBBB9FF89320F148155E515B7291D378A952CB60
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 0081396B
                                                          • CharUpperBuffW.USER32(?,?), ref: 00813A7A
                                                          • _wcslen.LIBCMT ref: 00813A8A
                                                          • VariantClear.OLEAUT32(?), ref: 00813C1F
                                                            • Part of subcall function 00800CDF: VariantInit.OLEAUT32(00000000), ref: 00800D1F
                                                            • Part of subcall function 00800CDF: VariantCopy.OLEAUT32(?,?), ref: 00800D28
                                                            • Part of subcall function 00800CDF: VariantClear.OLEAUT32(?), ref: 00800D34
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                          • API String ID: 4137639002-1221869570
                                                          • Opcode ID: 432b9f8b9334b4f4f4763fe923f87e91aeed3afa00942c59c4165482c97a0e4a
                                                          • Instruction ID: 401a5adb51fdd2c4a1149b1ed8ea353244a065a172040d69715a4dccf6d70a46
                                                          • Opcode Fuzzy Hash: 432b9f8b9334b4f4f4763fe923f87e91aeed3afa00942c59c4165482c97a0e4a
                                                          • Instruction Fuzzy Hash: 359125746083059FCB14DF28C4849AAB7E8FF89314F14892DF98A97351DB35EE45CB92
                                                          APIs
                                                            • Part of subcall function 007F000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?,?,007F035E), ref: 007F002B
                                                            • Part of subcall function 007F000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?), ref: 007F0046
                                                            • Part of subcall function 007F000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?), ref: 007F0054
                                                            • Part of subcall function 007F000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?), ref: 007F0064
                                                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00814C51
                                                          • _wcslen.LIBCMT ref: 00814D59
                                                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00814DCF
                                                          • CoTaskMemFree.OLE32(?), ref: 00814DDA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                          • String ID: NULL Pointer assignment
                                                          • API String ID: 614568839-2785691316
                                                          • Opcode ID: bf13abf699e8d5f7aa8a147327053cc0a8887750b69baf08cdba86453b22206e
                                                          • Instruction ID: de94dbc14a94ef1d39909dad09c0addc42f84f0a11bbd990458313b58157ce1b
                                                          • Opcode Fuzzy Hash: bf13abf699e8d5f7aa8a147327053cc0a8887750b69baf08cdba86453b22206e
                                                          • Instruction Fuzzy Hash: AD910371D0021DEBDF10DFA4D895AEEB7B9FF08314F10816AE915A7251EB349A85CFA0
                                                          APIs
                                                          • GetMenu.USER32(?), ref: 00822183
                                                          • GetMenuItemCount.USER32(00000000), ref: 008221B5
                                                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 008221DD
                                                          • _wcslen.LIBCMT ref: 00822213
                                                          • GetMenuItemID.USER32(?,?), ref: 0082224D
                                                          • GetSubMenu.USER32(?,?), ref: 0082225B
                                                            • Part of subcall function 007F3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 007F3A57
                                                            • Part of subcall function 007F3A3D: GetCurrentThreadId.KERNEL32 ref: 007F3A5E
                                                            • Part of subcall function 007F3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,007F25B3), ref: 007F3A65
                                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 008222E3
                                                            • Part of subcall function 007FE97B: Sleep.KERNEL32 ref: 007FE9F3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                          • String ID:
                                                          • API String ID: 4196846111-0
                                                          • Opcode ID: 1404b9c2acf000fa608cb7fdcff22b270aaac20fa60a2529d6ffecc5aa7cb112
                                                          • Instruction ID: d356f280fb81a098947be9491bf37d915e09b258b4bcda82b717fe4f0ec7fef9
                                                          • Opcode Fuzzy Hash: 1404b9c2acf000fa608cb7fdcff22b270aaac20fa60a2529d6ffecc5aa7cb112
                                                          • Instruction Fuzzy Hash: 13719075A00225EFCB14EFA4D845AAEB7F1FF48310F148459E916EB351DB39ED818B90
                                                          APIs
                                                          • IsWindow.USER32(01896378), ref: 00827F37
                                                          • IsWindowEnabled.USER32(01896378), ref: 00827F43
                                                          • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 0082801E
                                                          • SendMessageW.USER32(01896378,000000B0,?,?), ref: 00828051
                                                          • IsDlgButtonChecked.USER32(?,?), ref: 00828089
                                                          • GetWindowLongW.USER32(01896378,000000EC), ref: 008280AB
                                                          • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 008280C3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                          • String ID:
                                                          • API String ID: 4072528602-0
                                                          • Opcode ID: 9eea29d52d0f250a5841a8b78f1b3b6d0158186d5266be1bac44ff0101d3fba7
                                                          • Instruction ID: 42f664d22777b6721c71c8edd20c8d8596e6792a833570a9187f2b873b257c0c
                                                          • Opcode Fuzzy Hash: 9eea29d52d0f250a5841a8b78f1b3b6d0158186d5266be1bac44ff0101d3fba7
                                                          • Instruction Fuzzy Hash: B771BC7460D224EFEF219F65E984FBABBB9FF19300F144059E945D72A1CB31A885CB21
                                                          APIs
                                                          • GetParent.USER32(?), ref: 007FAEF9
                                                          • GetKeyboardState.USER32(?), ref: 007FAF0E
                                                          • SetKeyboardState.USER32(?), ref: 007FAF6F
                                                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 007FAF9D
                                                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 007FAFBC
                                                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 007FAFFD
                                                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 007FB020
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: fb4fe666cb74b69cc9258be15657cc70c8cb86fc910df6583fe8eb5ef369b4af
                                                          • Instruction ID: a2b10dd5fd5f0a415b313de8a362f2f983dac8ee6b909827b7a05adab7fbcb51
                                                          • Opcode Fuzzy Hash: fb4fe666cb74b69cc9258be15657cc70c8cb86fc910df6583fe8eb5ef369b4af
                                                          • Instruction Fuzzy Hash: 6A51B3E06047D93DFB364234CC49BBA7EE96B06304F088589E2D9599C2D79CECC8D762
                                                          APIs
                                                          • GetParent.USER32(00000000), ref: 007FAD19
                                                          • GetKeyboardState.USER32(?), ref: 007FAD2E
                                                          • SetKeyboardState.USER32(?), ref: 007FAD8F
                                                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 007FADBB
                                                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 007FADD8
                                                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 007FAE17
                                                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 007FAE38
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: 2eb4106086e7145ed7c51f8cdc46238dee8cc9f31d573d439ad1980f3726093a
                                                          • Instruction ID: 22896e2e06a5dae8e08dd6ca832b2710f53663930ce614f450da24a1edf1005b
                                                          • Opcode Fuzzy Hash: 2eb4106086e7145ed7c51f8cdc46238dee8cc9f31d573d439ad1980f3726093a
                                                          • Instruction Fuzzy Hash: 4D51C6E16447D93DFB368334CC56B7A7EA96B45300F088589E2DD46AC2D29CEC88D752
                                                          APIs
                                                          • GetConsoleCP.KERNEL32(007D3CD6,?,?,?,?,?,?,?,?,007C5BA3,?,?,007D3CD6,?,?), ref: 007C5470
                                                          • __fassign.LIBCMT ref: 007C54EB
                                                          • __fassign.LIBCMT ref: 007C5506
                                                          • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,007D3CD6,00000005,00000000,00000000), ref: 007C552C
                                                          • WriteFile.KERNEL32(?,007D3CD6,00000000,007C5BA3,00000000,?,?,?,?,?,?,?,?,?,007C5BA3,?), ref: 007C554B
                                                          • WriteFile.KERNEL32(?,?,00000001,007C5BA3,00000000,?,?,?,?,?,?,?,?,?,007C5BA3,?), ref: 007C5584
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                          • String ID:
                                                          • API String ID: 1324828854-0
                                                          • Opcode ID: d8eb01ef839cd82abf24ef2fb93394cdc15c5272b7dd2c4389ba952d732a1d24
                                                          • Instruction ID: ce7abcf679380bb1ff7c4e7beb2ea50ba0f699977127a0bd926a9c9f71553c88
                                                          • Opcode Fuzzy Hash: d8eb01ef839cd82abf24ef2fb93394cdc15c5272b7dd2c4389ba952d732a1d24
                                                          • Instruction Fuzzy Hash: 7751B570A006499FDB10CFA8E845FEEBBF5FF08300F14451EE555E7291E675AA91CB60
                                                          APIs
                                                            • Part of subcall function 0081304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0081307A
                                                            • Part of subcall function 0081304E: _wcslen.LIBCMT ref: 0081309B
                                                          • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00811112
                                                          • WSAGetLastError.WSOCK32 ref: 00811121
                                                          • WSAGetLastError.WSOCK32 ref: 008111C9
                                                          • closesocket.WSOCK32(00000000), ref: 008111F9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 2675159561-0
                                                          • Opcode ID: 370815cf12d1eb227a428922b2c5482768638c3d7cce703354b20f964a1a0118
                                                          • Instruction ID: 0d4c5c413c992dcdd211c954c4d8c661951a047ea8d36d8c011ba90dbfc04c96
                                                          • Opcode Fuzzy Hash: 370815cf12d1eb227a428922b2c5482768638c3d7cce703354b20f964a1a0118
                                                          • Instruction Fuzzy Hash: 8141C232600604AFDF209F14D888BE9B7EAFF45324F148059FA19DB291D774AD81CBA1
                                                          APIs
                                                            • Part of subcall function 007FDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007FCF22,?), ref: 007FDDFD
                                                            • Part of subcall function 007FDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,007FCF22,?), ref: 007FDE16
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 007FCF45
                                                          • MoveFileW.KERNEL32(?,?), ref: 007FCF7F
                                                          • _wcslen.LIBCMT ref: 007FD005
                                                          • _wcslen.LIBCMT ref: 007FD01B
                                                          • SHFileOperationW.SHELL32(?), ref: 007FD061
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                          • String ID: \*.*
                                                          • API String ID: 3164238972-1173974218
                                                          • Opcode ID: 18ff5a959e97dc946dc3066137453ed9b831f9e90ec10f625c3f6c65b5477d1a
                                                          • Instruction ID: cbcb0eea186e80ee8bd963fcb5bc5fc14f27bc56d4cc9f9690cf816a44f72bf1
                                                          • Opcode Fuzzy Hash: 18ff5a959e97dc946dc3066137453ed9b831f9e90ec10f625c3f6c65b5477d1a
                                                          • Instruction Fuzzy Hash: BB41587290511D9FDF22EBA4DA85AEDB7F9AF08340F0000E6E605E7251EB38AB44CB50
                                                          APIs
                                                          • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00822E1C
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00822E4F
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00822E84
                                                          • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00822EB6
                                                          • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00822EE0
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00822EF1
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00822F0B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$MessageSend
                                                          • String ID:
                                                          • API String ID: 2178440468-0
                                                          • Opcode ID: b1b1c8c956ff1eeaa3217e59e3248625b9375fe855ef35966f23af40b81c7472
                                                          • Instruction ID: 11ff562016e52dde70bf6d1b60ba1203b6df3f2d57be1641bd4b4364726e8fd1
                                                          • Opcode Fuzzy Hash: b1b1c8c956ff1eeaa3217e59e3248625b9375fe855ef35966f23af40b81c7472
                                                          • Instruction Fuzzy Hash: A131F438604164AFDB21CF58EC89F6937E1FB5A710F5A5164F911CB2B2CBB1A881AB41
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007F7769
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007F778F
                                                          • SysAllocString.OLEAUT32(00000000), ref: 007F7792
                                                          • SysAllocString.OLEAUT32(?), ref: 007F77B0
                                                          • SysFreeString.OLEAUT32(?), ref: 007F77B9
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 007F77DE
                                                          • SysAllocString.OLEAUT32(?), ref: 007F77EC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: 6726c10dba7adc7a0bc3d044c60476c1aec140fa4e1a567cfd302bd9f76da26e
                                                          • Instruction ID: 717aa6b4758dc47816e0bde3a5014d967cbd5b21ad849fc440dc92bac19d6467
                                                          • Opcode Fuzzy Hash: 6726c10dba7adc7a0bc3d044c60476c1aec140fa4e1a567cfd302bd9f76da26e
                                                          • Instruction Fuzzy Hash: 0C219F76608219AFDB14AFA8CC88CBB73ACEB093647108125FA14DB250D6749C42CBB4
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007F7842
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007F7868
                                                          • SysAllocString.OLEAUT32(00000000), ref: 007F786B
                                                          • SysAllocString.OLEAUT32 ref: 007F788C
                                                          • SysFreeString.OLEAUT32 ref: 007F7895
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 007F78AF
                                                          • SysAllocString.OLEAUT32(?), ref: 007F78BD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: 66e46b0f72abc25bbe3a872606adb051785f83d24e64e372865af93ed6eeb17f
                                                          • Instruction ID: f4ef0beedc89d0381ac28df7526c0f2ea4c72f03180dfc70cb26f7eef92e0a8c
                                                          • Opcode Fuzzy Hash: 66e46b0f72abc25bbe3a872606adb051785f83d24e64e372865af93ed6eeb17f
                                                          • Instruction Fuzzy Hash: 64214435608208AFDB24AFA8DC8DDBB77ECFB097A07108125FA15CB2A5D674DC41CB64
                                                          APIs
                                                          • GetStdHandle.KERNEL32(0000000C), ref: 008004F2
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0080052E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateHandlePipe
                                                          • String ID: nul
                                                          • API String ID: 1424370930-2873401336
                                                          • Opcode ID: 59d59c6a2de66e8deadec30f32e06baa85d42f2867ff3e3010e53988ba9b9d32
                                                          • Instruction ID: 822da73937458c85b1a993f184173eaa727ad39ed4b29553c4ca976d01b0e553
                                                          • Opcode Fuzzy Hash: 59d59c6a2de66e8deadec30f32e06baa85d42f2867ff3e3010e53988ba9b9d32
                                                          • Instruction Fuzzy Hash: 88215A75600305ABDB609F69DC45BAA7BB4FF45724F204A29E8A1E62E0E7709951CF20
                                                          APIs
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 008005C6
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00800601
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateHandlePipe
                                                          • String ID: nul
                                                          • API String ID: 1424370930-2873401336
                                                          • Opcode ID: addfef7413aee4de2c72deb58ffa638803f469ee44e85b5a885b13c8aed46201
                                                          • Instruction ID: 609f71f3d9ca4815badfc1e51034c45aa62a51e1eaa7bfd31731744afa6a7794
                                                          • Opcode Fuzzy Hash: addfef7413aee4de2c72deb58ffa638803f469ee44e85b5a885b13c8aed46201
                                                          • Instruction Fuzzy Hash: E921A1756003059BDB608F68DC04BAA77E5FFA5724F204A19F8B1E72E0DB719961CF10
                                                          APIs
                                                            • Part of subcall function 0079600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0079604C
                                                            • Part of subcall function 0079600E: GetStockObject.GDI32(00000011), ref: 00796060
                                                            • Part of subcall function 0079600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0079606A
                                                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00824112
                                                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0082411F
                                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0082412A
                                                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00824139
                                                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00824145
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CreateObjectStockWindow
                                                          • String ID: Msctls_Progress32
                                                          • API String ID: 1025951953-3636473452
                                                          • Opcode ID: 47e84f63eea42eebe3be96050314ba8291df1719a340de235d7433338dd28f80
                                                          • Instruction ID: 4abee027fd11f3781687de7256c1a8bc2cd809db517b11a7d03992e9491aa70f
                                                          • Opcode Fuzzy Hash: 47e84f63eea42eebe3be96050314ba8291df1719a340de235d7433338dd28f80
                                                          • Instruction Fuzzy Hash: 041181B1140229BEEF119F64DC85EE77F5DFF08798F015111BA18E2190C6769C619BA4
                                                          APIs
                                                            • Part of subcall function 007CD7A3: _free.LIBCMT ref: 007CD7CC
                                                          • _free.LIBCMT ref: 007CD82D
                                                            • Part of subcall function 007C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000), ref: 007C29DE
                                                            • Part of subcall function 007C29C8: GetLastError.KERNEL32(00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000,00000000), ref: 007C29F0
                                                          • _free.LIBCMT ref: 007CD838
                                                          • _free.LIBCMT ref: 007CD843
                                                          • _free.LIBCMT ref: 007CD897
                                                          • _free.LIBCMT ref: 007CD8A2
                                                          • _free.LIBCMT ref: 007CD8AD
                                                          • _free.LIBCMT ref: 007CD8B8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                          • Instruction ID: 27ade6682f56a3dd946bb67917d9acd128a599c5e94e803a55c9147544ec4270
                                                          • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                          • Instruction Fuzzy Hash: B911EF71541B04EAD531BFB0CC4BFCB7BDCAF05700F40582DB29DA69A3DA79B9064A50
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 007FDA74
                                                          • LoadStringW.USER32(00000000), ref: 007FDA7B
                                                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 007FDA91
                                                          • LoadStringW.USER32(00000000), ref: 007FDA98
                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 007FDADC
                                                          Strings
                                                          • %s (%d) : ==> %s: %s %s, xrefs: 007FDAB9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message
                                                          • String ID: %s (%d) : ==> %s: %s %s
                                                          • API String ID: 4072794657-3128320259
                                                          • Opcode ID: c8a1a875cd8e4344852048215a487d21e81484e8bf70402be1061810a1129270
                                                          • Instruction ID: 09145f1666e4ff52fabc4d5f787d1c9c41a17af18675665631494d8b41eafa5b
                                                          • Opcode Fuzzy Hash: c8a1a875cd8e4344852048215a487d21e81484e8bf70402be1061810a1129270
                                                          • Instruction Fuzzy Hash: 8B0186F25002087FE7209BE49D89EFB376CFB08301F408496B706E2141E6749E854F74
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(0188EFC0,0188EFC0), ref: 0080097B
                                                          • EnterCriticalSection.KERNEL32(0188EFA0,00000000), ref: 0080098D
                                                          • TerminateThread.KERNEL32(?,000001F6), ref: 0080099B
                                                          • WaitForSingleObject.KERNEL32(?,000003E8), ref: 008009A9
                                                          • CloseHandle.KERNEL32(?), ref: 008009B8
                                                          • InterlockedExchange.KERNEL32(0188EFC0,000001F6), ref: 008009C8
                                                          • LeaveCriticalSection.KERNEL32(0188EFA0), ref: 008009CF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                          • String ID:
                                                          • API String ID: 3495660284-0
                                                          • Opcode ID: e91cfd06ee4293593d91d5707d25552810adc50584793d7e02b60552e7653f87
                                                          • Instruction ID: 948e5d440d442a21f8ec465ba67b54c7473afdbcfa36dc50159296c50eb9ac91
                                                          • Opcode Fuzzy Hash: e91cfd06ee4293593d91d5707d25552810adc50584793d7e02b60552e7653f87
                                                          • Instruction Fuzzy Hash: 58F0F431442912FBD7615F94EE8DBEABB35FF05702F505015F101908A5CB759476CF90
                                                          APIs
                                                          • GetClientRect.USER32(?,?), ref: 00795D30
                                                          • GetWindowRect.USER32(?,?), ref: 00795D71
                                                          • ScreenToClient.USER32(?,?), ref: 00795D99
                                                          • GetClientRect.USER32(?,?), ref: 00795ED7
                                                          • GetWindowRect.USER32(?,?), ref: 00795EF8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Rect$Client$Window$Screen
                                                          • String ID:
                                                          • API String ID: 1296646539-0
                                                          • Opcode ID: e892cb29b7b4d285fdfd1fda8813fec93bf914bcbaa156f24cd5e77c5387f757
                                                          • Instruction ID: 6bca5b95474fbc1ff7e2b3f0d328da4fd5e090b43607974ec2882f59e2d838c6
                                                          • Opcode Fuzzy Hash: e892cb29b7b4d285fdfd1fda8813fec93bf914bcbaa156f24cd5e77c5387f757
                                                          • Instruction Fuzzy Hash: 73B16734A00A4ADBDF10CFA9D4807EEB7F1FF58310F14851AE8AAD7250DB38AA51DB50
                                                          APIs
                                                          • __allrem.LIBCMT ref: 007C00BA
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007C00D6
                                                          • __allrem.LIBCMT ref: 007C00ED
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007C010B
                                                          • __allrem.LIBCMT ref: 007C0122
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007C0140
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                          • String ID:
                                                          • API String ID: 1992179935-0
                                                          • Opcode ID: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                          • Instruction ID: f7c80e27aa41f24a0e7fb6099b29083bb8eeb1f2f7780539d4561e17fa67407c
                                                          • Opcode Fuzzy Hash: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                          • Instruction Fuzzy Hash: 3E81D376A00B06EFE7209E68CC46FAEB3A9EF41724F24453EF551D6681E778D94087D0
                                                          APIs
                                                            • Part of subcall function 00813149: select.WSOCK32(00000000,?,00000000,00000000,?,?,?,00000000,?,?,?,0081101C,00000000,?,?,00000000), ref: 00813195
                                                          • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00811DC0
                                                          • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00811DE1
                                                          • WSAGetLastError.WSOCK32 ref: 00811DF2
                                                          • inet_ntoa.WSOCK32(?), ref: 00811E8C
                                                          • htons.WSOCK32(?,?,?,?,?), ref: 00811EDB
                                                          • _strlen.LIBCMT ref: 00811F35
                                                            • Part of subcall function 007F39E8: _strlen.LIBCMT ref: 007F39F2
                                                            • Part of subcall function 00796D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000002,?,?,?,?,007ACF58,?,?,?), ref: 00796DBA
                                                            • Part of subcall function 00796D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,?,?,?,007ACF58,?,?,?), ref: 00796DED
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide_strlen$ErrorLasthtonsinet_ntoaselect
                                                          • String ID:
                                                          • API String ID: 1923757996-0
                                                          • Opcode ID: 5ef1d5f7e18e922b8daa0f253033c1fbdfc683f079f892b4ec7b400fe2dc592c
                                                          • Instruction ID: f70193b693949d9fea9c33a758c9ef2cfb768e5f34c8ea1bcb1fb50e03c844cb
                                                          • Opcode Fuzzy Hash: 5ef1d5f7e18e922b8daa0f253033c1fbdfc683f079f892b4ec7b400fe2dc592c
                                                          • Instruction Fuzzy Hash: 84A1C231104340EFCB24DF24D889E6A77A9FF85318F54894CF5569B2A2CB35ED82CB91
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,007B82D9,007B82D9,?,?,?,007C644F,00000001,00000001,8BE85006), ref: 007C6258
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,007C644F,00000001,00000001,8BE85006,?,?,?), ref: 007C62DE
                                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 007C63D8
                                                          • __freea.LIBCMT ref: 007C63E5
                                                            • Part of subcall function 007C3820: RtlAllocateHeap.NTDLL(00000000,?,00861444,?,007AFDF5,?,?,0079A976,00000010,00861440,007913FC,?,007913C6,?,00791129), ref: 007C3852
                                                          • __freea.LIBCMT ref: 007C63EE
                                                          • __freea.LIBCMT ref: 007C6413
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1414292761-0
                                                          • Opcode ID: 905ec66407580246d075325a7309d948461504a597cba5a7d8ec9093e93eb461
                                                          • Instruction ID: 36c582b1397ec5e416a60e28841bd34e05ca23488ae42d4d386c1930daae47bb
                                                          • Opcode Fuzzy Hash: 905ec66407580246d075325a7309d948461504a597cba5a7d8ec9093e93eb461
                                                          • Instruction Fuzzy Hash: 1751CC72A00256ABEB258F64CCC5FBF7BAAEB44750B14862DF805D6181EB38DC40C6A0
                                                          APIs
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                            • Part of subcall function 0081C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0081B6AE,?,?), ref: 0081C9B5
                                                            • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081C9F1
                                                            • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA68
                                                            • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0081BCCA
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0081BD25
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 0081BD6A
                                                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0081BD99
                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0081BDF3
                                                          • RegCloseKey.ADVAPI32(?), ref: 0081BDFF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                          • String ID:
                                                          • API String ID: 1120388591-0
                                                          • Opcode ID: 09f3aaca4a236157d0d8decd0bef9f664b5e411178edd18d1f69c1333a8da03c
                                                          • Instruction ID: f22d1c24d7a5998597cad8f7ab93027052da75e86a446705ba7a347843805144
                                                          • Opcode Fuzzy Hash: 09f3aaca4a236157d0d8decd0bef9f664b5e411178edd18d1f69c1333a8da03c
                                                          • Instruction Fuzzy Hash: 8F819E30208241EFD714DF24D895E6ABBE9FF84308F14895CF5598B2A2DB31ED85CB92
                                                          APIs
                                                          • VariantInit.OLEAUT32(00000035), ref: 007EF7B9
                                                          • SysAllocString.OLEAUT32(00000001), ref: 007EF860
                                                          • VariantCopy.OLEAUT32(007EFA64,00000000), ref: 007EF889
                                                          • VariantClear.OLEAUT32(007EFA64), ref: 007EF8AD
                                                          • VariantCopy.OLEAUT32(007EFA64,00000000), ref: 007EF8B1
                                                          • VariantClear.OLEAUT32(?), ref: 007EF8BB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCopy$AllocInitString
                                                          • String ID:
                                                          • API String ID: 3859894641-0
                                                          • Opcode ID: b1d5a2c31381473776085cdf9b01466cda45c91f6f3b73dda3a47ca6ef518d2b
                                                          • Instruction ID: 9f0722f24a6f0537b3afe591ab64159996445ba0914a31f9a249e79ad18e123b
                                                          • Opcode Fuzzy Hash: b1d5a2c31381473776085cdf9b01466cda45c91f6f3b73dda3a47ca6ef518d2b
                                                          • Instruction Fuzzy Hash: 7B51E831602350FADF20AF66D899B39B3A8EF49310F209467F945DF692DB789C40C796
                                                          APIs
                                                            • Part of subcall function 00797620: _wcslen.LIBCMT ref: 00797625
                                                            • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                          • GetOpenFileNameW.COMDLG32(00000058), ref: 008094E5
                                                          • _wcslen.LIBCMT ref: 00809506
                                                          • _wcslen.LIBCMT ref: 0080952D
                                                          • GetSaveFileNameW.COMDLG32(00000058), ref: 00809585
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$FileName$OpenSave
                                                          • String ID: X
                                                          • API String ID: 83654149-3081909835
                                                          • Opcode ID: d9c99a2f5f9628afa320b3c6374f04e61d9b67ca79dde450e0f6b08660dc49d9
                                                          • Instruction ID: 62416353552688f865836c3bf7184dc6559d7ad5f0a27e4c6ded16da92cb4381
                                                          • Opcode Fuzzy Hash: d9c99a2f5f9628afa320b3c6374f04e61d9b67ca79dde450e0f6b08660dc49d9
                                                          • Instruction Fuzzy Hash: 0FE1BD71608300DFDB64DF24D885A6AB7E0FF85314F05896DF8999B2A2DB34ED05CB92
                                                          APIs
                                                            • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                          • BeginPaint.USER32(?,?,?), ref: 007A9241
                                                          • GetWindowRect.USER32(?,?), ref: 007A92A5
                                                          • ScreenToClient.USER32(?,?), ref: 007A92C2
                                                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 007A92D3
                                                          • EndPaint.USER32(?,?,?,?,?), ref: 007A9321
                                                          • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 007E71EA
                                                            • Part of subcall function 007A9339: BeginPath.GDI32(00000000), ref: 007A9357
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                          • String ID:
                                                          • API String ID: 3050599898-0
                                                          • Opcode ID: 2dea78ca97738b30aac254ac7eaf8faa17360b9a05b55b1499fcac4f35f7fb10
                                                          • Instruction ID: 9206f036e184a040ea729af9ad1efd2c666e13c1d79ccd2b66a20cc053485299
                                                          • Opcode Fuzzy Hash: 2dea78ca97738b30aac254ac7eaf8faa17360b9a05b55b1499fcac4f35f7fb10
                                                          • Instruction Fuzzy Hash: DD418C70105300AFDB21DF25C889FBA7BB8FB9A720F140229FA54872A2C7759855DB62
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 0080080C
                                                          • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00800847
                                                          • EnterCriticalSection.KERNEL32(?), ref: 00800863
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 008008DC
                                                          • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 008008F3
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00800921
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                          • String ID:
                                                          • API String ID: 3368777196-0
                                                          • Opcode ID: 9baacaec149b5c07f26252ea697ad2287e77dd7c38c88f700baaca59462bdabd
                                                          • Instruction ID: d6e62b334b9d976c001c08afea0602495b606c8d6fa55969442e5b4a8e2c9cb8
                                                          • Opcode Fuzzy Hash: 9baacaec149b5c07f26252ea697ad2287e77dd7c38c88f700baaca59462bdabd
                                                          • Instruction Fuzzy Hash: F0414A71900205EFDF14AF94DC85AAA77B9FF44310F1480A9ED00DA29BDB34EE65DBA4
                                                          APIs
                                                          • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,007EF3AB,00000000,?,?,00000000,?,007E682C,00000004,00000000,00000000), ref: 0082824C
                                                          • EnableWindow.USER32(?,00000000), ref: 00828272
                                                          • ShowWindow.USER32(FFFFFFFF,00000000), ref: 008282D1
                                                          • ShowWindow.USER32(?,00000004), ref: 008282E5
                                                          • EnableWindow.USER32(?,00000001), ref: 0082830B
                                                          • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0082832F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Show$Enable$MessageSend
                                                          • String ID:
                                                          • API String ID: 642888154-0
                                                          • Opcode ID: d2202f2b58919ea7a6db4c943c7e74bd0551a7dc32883469a3e094e80e6eb17f
                                                          • Instruction ID: 5e87c4c5b7a2f2d3e3f927d16af45bc2dd0d1ba523eccbf44561ca9840c2387f
                                                          • Opcode Fuzzy Hash: d2202f2b58919ea7a6db4c943c7e74bd0551a7dc32883469a3e094e80e6eb17f
                                                          • Instruction Fuzzy Hash: 8141A534602654EFDF21CF25E899BE47BE1FB0A714F195169E5088B263CB71A881CF51
                                                          APIs
                                                          • IsWindowVisible.USER32(?), ref: 007F4C95
                                                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 007F4CB2
                                                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 007F4CEA
                                                          • _wcslen.LIBCMT ref: 007F4D08
                                                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 007F4D10
                                                          • _wcsstr.LIBVCRUNTIME ref: 007F4D1A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                          • String ID:
                                                          • API String ID: 72514467-0
                                                          • Opcode ID: f00688e051928254425baeea9457130dc45c85df1e930c980c5fd35751e3dd63
                                                          • Instruction ID: 3b5e4344d26cb50c8de2b5c41bf2be4e7d795d6705db9e2ef8c8695b0dc6aaa0
                                                          • Opcode Fuzzy Hash: f00688e051928254425baeea9457130dc45c85df1e930c980c5fd35751e3dd63
                                                          • Instruction Fuzzy Hash: E3210832304204BBEB255B79EC49E7F7BACEF55750F10807DFA05CA292EA69DC01D6A0
                                                          APIs
                                                            • Part of subcall function 00793AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00793A97,?,?,00792E7F,?,?,?,00000000), ref: 00793AC2
                                                          • _wcslen.LIBCMT ref: 0080587B
                                                          • CoInitialize.OLE32(00000000), ref: 00805995
                                                          • CoCreateInstance.OLE32(0082FCF8,00000000,00000001,0082FB68,?), ref: 008059AE
                                                          • CoUninitialize.OLE32 ref: 008059CC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                          • String ID: .lnk
                                                          • API String ID: 3172280962-24824748
                                                          • Opcode ID: 97591e9f5071419ae46bcef7bbfb2ce424b233d972ca2ce27357c57287333472
                                                          • Instruction ID: d8c94a308d0f577ea62069f41d923ab38c10b441aa4613d1ebe5261e5fb4e69d
                                                          • Opcode Fuzzy Hash: 97591e9f5071419ae46bcef7bbfb2ce424b233d972ca2ce27357c57287333472
                                                          • Instruction Fuzzy Hash: 5FD14271608601DFCB54DF24D89492BBBE1FF89720F148859F8899B2A1D731EC45CFA2
                                                          APIs
                                                            • Part of subcall function 007F0FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 007F0FCA
                                                            • Part of subcall function 007F0FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 007F0FD6
                                                            • Part of subcall function 007F0FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 007F0FE5
                                                            • Part of subcall function 007F0FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 007F0FEC
                                                            • Part of subcall function 007F0FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 007F1002
                                                          • GetLengthSid.ADVAPI32(?,00000000,007F1335), ref: 007F17AE
                                                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 007F17BA
                                                          • HeapAlloc.KERNEL32(00000000), ref: 007F17C1
                                                          • CopySid.ADVAPI32(00000000,00000000,?), ref: 007F17DA
                                                          • GetProcessHeap.KERNEL32(00000000,00000000,007F1335), ref: 007F17EE
                                                          • HeapFree.KERNEL32(00000000), ref: 007F17F5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                          • String ID:
                                                          • API String ID: 3008561057-0
                                                          • Opcode ID: 5c9a53f668dafbc3a51f2447fb0dc94aad0b52b002cd0db157406034a85a1519
                                                          • Instruction ID: 8aad5e6931d8de8cb6622977d174dd639fbf8b8e122263b36a03146e21c0a4d0
                                                          • Opcode Fuzzy Hash: 5c9a53f668dafbc3a51f2447fb0dc94aad0b52b002cd0db157406034a85a1519
                                                          • Instruction Fuzzy Hash: 37117C71900609FFDB20AFA4CC4ABBF7BA9FB45355F508018F54597211D739A945CB60
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 007F14FF
                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 007F1506
                                                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 007F1515
                                                          • CloseHandle.KERNEL32(00000004), ref: 007F1520
                                                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 007F154F
                                                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 007F1563
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                          • String ID:
                                                          • API String ID: 1413079979-0
                                                          • Opcode ID: 4f2172d7abfdca4526766cf408cdbd87176f5c2ee484e92b866d4ad9040a5fad
                                                          • Instruction ID: dcf09848c863467e847a9db1c5f9c496aa09c70c1832674632c39cc52e33175a
                                                          • Opcode Fuzzy Hash: 4f2172d7abfdca4526766cf408cdbd87176f5c2ee484e92b866d4ad9040a5fad
                                                          • Instruction Fuzzy Hash: 4E11177250024DEBDB218F98DD49BEE7BA9FF48744F148015FA05A2160C3758E619B61
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,007B3379,007B2FE5), ref: 007B3390
                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 007B339E
                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 007B33B7
                                                          • SetLastError.KERNEL32(00000000,?,007B3379,007B2FE5), ref: 007B3409
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastValue___vcrt_
                                                          • String ID:
                                                          • API String ID: 3852720340-0
                                                          • Opcode ID: 139d3e49704821a1f83d7fc6bde7c89ac903fedee859d8f6eaf52efdab83ee8f
                                                          • Instruction ID: ebbe57718831fa59c83506738c37a5dba9b41ba6360102f8671de15cac94a954
                                                          • Opcode Fuzzy Hash: 139d3e49704821a1f83d7fc6bde7c89ac903fedee859d8f6eaf52efdab83ee8f
                                                          • Instruction Fuzzy Hash: 2201F733609711FEAA252774BC8ABEB2B94FB1537A720022DF411862F1EF1D5D829954
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,007C5686,007D3CD6,?,00000000,?,007C5B6A,?,?,?,?,?,007BE6D1,?,00858A48), ref: 007C2D78
                                                          • _free.LIBCMT ref: 007C2DAB
                                                          • _free.LIBCMT ref: 007C2DD3
                                                          • SetLastError.KERNEL32(00000000,?,?,?,?,007BE6D1,?,00858A48,00000010,00794F4A,?,?,00000000,007D3CD6), ref: 007C2DE0
                                                          • SetLastError.KERNEL32(00000000,?,?,?,?,007BE6D1,?,00858A48,00000010,00794F4A,?,?,00000000,007D3CD6), ref: 007C2DEC
                                                          • _abort.LIBCMT ref: 007C2DF2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_free$_abort
                                                          • String ID:
                                                          • API String ID: 3160817290-0
                                                          • Opcode ID: a1dcaf2c9422d01eb3780ba69a948f3d574b99c9199162d99782a2723591e002
                                                          • Instruction ID: 854555a5092e44083351888d56c691b0aa3e0f5c2020e938a2801eabe64e854e
                                                          • Opcode Fuzzy Hash: a1dcaf2c9422d01eb3780ba69a948f3d574b99c9199162d99782a2723591e002
                                                          • Instruction Fuzzy Hash: D9F0A431644B00BBC6226734AC0EF2E2759BBD17A1F25451CF825922E3EE2C98034561
                                                          APIs
                                                            • Part of subcall function 007A9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 007A9693
                                                            • Part of subcall function 007A9639: SelectObject.GDI32(?,00000000), ref: 007A96A2
                                                            • Part of subcall function 007A9639: BeginPath.GDI32(?), ref: 007A96B9
                                                            • Part of subcall function 007A9639: SelectObject.GDI32(?,00000000), ref: 007A96E2
                                                          • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00828A4E
                                                          • LineTo.GDI32(?,00000003,00000000), ref: 00828A62
                                                          • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00828A70
                                                          • LineTo.GDI32(?,00000000,00000003), ref: 00828A80
                                                          • EndPath.GDI32(?), ref: 00828A90
                                                          • StrokePath.GDI32(?), ref: 00828AA0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                          • String ID:
                                                          • API String ID: 43455801-0
                                                          • Opcode ID: b260ee719bba2864d8f0fc55fbf70cf1171daa70907fcc9a9f4957ce496796ca
                                                          • Instruction ID: d41d2083640043d4d9aa5d0cc4e95e995a38ae5b969e817e71e9ebab432e4439
                                                          • Opcode Fuzzy Hash: b260ee719bba2864d8f0fc55fbf70cf1171daa70907fcc9a9f4957ce496796ca
                                                          • Instruction Fuzzy Hash: AE11C976000519FFEF129F94DC88EAA7F6DFB08354F44C012FA199A1A1C771AD55DBA0
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 007F5218
                                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 007F5229
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007F5230
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 007F5238
                                                          • MulDiv.KERNEL32(000009EC,?,00000000), ref: 007F524F
                                                          • MulDiv.KERNEL32(000009EC,00000001,?), ref: 007F5261
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CapsDevice$Release
                                                          • String ID:
                                                          • API String ID: 1035833867-0
                                                          • Opcode ID: 12b892369e2ace48aaa3596710a4d4e70217165c06e0a7790ad65571adc575c4
                                                          • Instruction ID: f086e889e3d86e37d1d6a52006c0ef72f4e2d239d347e1ee8298b047764a00ab
                                                          • Opcode Fuzzy Hash: 12b892369e2ace48aaa3596710a4d4e70217165c06e0a7790ad65571adc575c4
                                                          • Instruction Fuzzy Hash: 26014FB5E01718BBEB109BA69C49A6EBFB8FF48751F048165FB04A7281D6709801CBA0
                                                          APIs
                                                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00791BF4
                                                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 00791BFC
                                                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00791C07
                                                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00791C12
                                                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 00791C1A
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00791C22
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Virtual
                                                          • String ID:
                                                          • API String ID: 4278518827-0
                                                          • Opcode ID: 9149e8f847eff52908dc3358b520443df1455187f8a46ef7ca0191a37907dcaf
                                                          • Instruction ID: 1be778de117508baab5263b2d71e0f1d45c75d83651f19cba12828fa171b14a2
                                                          • Opcode Fuzzy Hash: 9149e8f847eff52908dc3358b520443df1455187f8a46ef7ca0191a37907dcaf
                                                          • Instruction Fuzzy Hash: 740167B0902B5ABDE3008F6A8C85B56FFA8FF19354F00411BA15C4BA42C7F5A864CBE5
                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 007FEB30
                                                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 007FEB46
                                                          • GetWindowThreadProcessId.USER32(?,?), ref: 007FEB55
                                                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007FEB64
                                                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007FEB6E
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007FEB75
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 839392675-0
                                                          • Opcode ID: 2cad64ac1fdecc2c2ca4158ee8764fe14eb49147896a0d0ef56d37ecdbd6b3f7
                                                          • Instruction ID: 2b84a6624a29fd2e369ced00f521b322dcd558f5c16a44f6c0b0f12fb16de68c
                                                          • Opcode Fuzzy Hash: 2cad64ac1fdecc2c2ca4158ee8764fe14eb49147896a0d0ef56d37ecdbd6b3f7
                                                          • Instruction Fuzzy Hash: 11F03AB2240558BBE7315B629C0EEFF7A7CFFCAB11F008159FA01D1191D7A45A02C6B5
                                                          APIs
                                                          • GetClientRect.USER32(?), ref: 007E7452
                                                          • SendMessageW.USER32(?,00001328,00000000,?), ref: 007E7469
                                                          • GetWindowDC.USER32(?), ref: 007E7475
                                                          • GetPixel.GDI32(00000000,?,?), ref: 007E7484
                                                          • ReleaseDC.USER32(?,00000000), ref: 007E7496
                                                          • GetSysColor.USER32(00000005), ref: 007E74B0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                          • String ID:
                                                          • API String ID: 272304278-0
                                                          • Opcode ID: 34200a1043311d8cade3e5693a9fa187e9838313518a2782d554e64f46b91ab8
                                                          • Instruction ID: 64c526c1ffa642007d3a2df90df70fc590a1c1114771be94e34c57855bd2c398
                                                          • Opcode Fuzzy Hash: 34200a1043311d8cade3e5693a9fa187e9838313518a2782d554e64f46b91ab8
                                                          • Instruction Fuzzy Hash: 0C018631400245EFEB615FA4DC08BBE7BB5FF08321F218164FA16A21A1CB351E52EB50
                                                          APIs
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 007F187F
                                                          • UnloadUserProfile.USERENV(?,?), ref: 007F188B
                                                          • CloseHandle.KERNEL32(?), ref: 007F1894
                                                          • CloseHandle.KERNEL32(?), ref: 007F189C
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 007F18A5
                                                          • HeapFree.KERNEL32(00000000), ref: 007F18AC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                          • String ID:
                                                          • API String ID: 146765662-0
                                                          • Opcode ID: 96e23529206330947737aeebec012f3576c425a59a9c947b8eafa12ba8c03d4b
                                                          • Instruction ID: e405e0b0166289b14c9f1667ccca5de223b1688c86fb83042dfa426111eb5d58
                                                          • Opcode Fuzzy Hash: 96e23529206330947737aeebec012f3576c425a59a9c947b8eafa12ba8c03d4b
                                                          • Instruction Fuzzy Hash: 0CE0C236004501BBDA115BA5ED0D92ABB29FF49B22B20C620F22581174CB329432DB50
                                                          APIs
                                                            • Part of subcall function 007B0242: EnterCriticalSection.KERNEL32(0086070C,00861884,?,?,007A198B,00862518,?,?,?,007912F9,00000000), ref: 007B024D
                                                            • Part of subcall function 007B0242: LeaveCriticalSection.KERNEL32(0086070C,?,007A198B,00862518,?,?,?,007912F9,00000000), ref: 007B028A
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                            • Part of subcall function 007B00A3: __onexit.LIBCMT ref: 007B00A9
                                                          • __Init_thread_footer.LIBCMT ref: 00817BFB
                                                            • Part of subcall function 007B01F8: EnterCriticalSection.KERNEL32(0086070C,?,?,007A8747,00862514), ref: 007B0202
                                                            • Part of subcall function 007B01F8: LeaveCriticalSection.KERNEL32(0086070C,?,007A8747,00862514), ref: 007B0235
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                          • String ID: +T~$5$G$Variable must be of type 'Object'.
                                                          • API String ID: 535116098-1127575951
                                                          • Opcode ID: 51134b620e4231d2e699be088baf6ce02c3a9f7fbf183abd33a527aa4befcf51
                                                          • Instruction ID: 34349c538a3417a56446477b92af55ba1d29f83ef580f5cec416a090746d2335
                                                          • Opcode Fuzzy Hash: 51134b620e4231d2e699be088baf6ce02c3a9f7fbf183abd33a527aa4befcf51
                                                          • Instruction Fuzzy Hash: F3916B74A04209EFCB14EF98E8959EDB7B9FF49304F10805DF8069B291DB71AE85CB51
                                                          APIs
                                                            • Part of subcall function 00797620: _wcslen.LIBCMT ref: 00797625
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 007FC6EE
                                                          • _wcslen.LIBCMT ref: 007FC735
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 007FC79C
                                                          • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 007FC7CA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info_wcslen$Default
                                                          • String ID: 0
                                                          • API String ID: 1227352736-4108050209
                                                          • Opcode ID: a48cc9fbd8876297ad4c4b38df9f7884f454dd7286887c5aca185adf7ec96e63
                                                          • Instruction ID: 50506a40b95b7df4cb851818b8b67cf1cbacf5c1f22a33f76dde02e9e4c0d7da
                                                          • Opcode Fuzzy Hash: a48cc9fbd8876297ad4c4b38df9f7884f454dd7286887c5aca185adf7ec96e63
                                                          • Instruction Fuzzy Hash: D351D47160830C9BD716AF28CA49B7B77E8AF85314F040A29F695D3391DB78D904DB62
                                                          APIs
                                                          • ShellExecuteExW.SHELL32(0000003C), ref: 0081AEA3
                                                            • Part of subcall function 00797620: _wcslen.LIBCMT ref: 00797625
                                                          • GetProcessId.KERNEL32(00000000), ref: 0081AF38
                                                          • CloseHandle.KERNEL32(00000000), ref: 0081AF67
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseExecuteHandleProcessShell_wcslen
                                                          • String ID: <$@
                                                          • API String ID: 146682121-1426351568
                                                          • Opcode ID: 981b2c414273e5bb40d453a68157a1373ea1335c47b3d8a8b4c3e4bdbe5826c4
                                                          • Instruction ID: 87364d25fad7cf3c8f3cf86fc592ab668cc412bbbcef7b2d76ebb2aa4f46a9f6
                                                          • Opcode Fuzzy Hash: 981b2c414273e5bb40d453a68157a1373ea1335c47b3d8a8b4c3e4bdbe5826c4
                                                          • Instruction Fuzzy Hash: 5A714775A00619DFCF18DF54D488A9EBBF4FF08314F048499E816AB292CB78ED85CB91
                                                          APIs
                                                          • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 007F7206
                                                          • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 007F723C
                                                          • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 007F724D
                                                          • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 007F72CF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$AddressCreateInstanceProc
                                                          • String ID: DllGetClassObject
                                                          • API String ID: 753597075-1075368562
                                                          • Opcode ID: fa08f0f5d8f254e9f2d9cd9da1ade4154178f6b7019b7609928e6a60af06e335
                                                          • Instruction ID: 93593074482d87de4027c23ec90c9bdeb315638e7ac8e0975639b04c3e6ea642
                                                          • Opcode Fuzzy Hash: fa08f0f5d8f254e9f2d9cd9da1ade4154178f6b7019b7609928e6a60af06e335
                                                          • Instruction Fuzzy Hash: 7C415071604208EFDB19CF54C885AAA7BB9FF48310F1480ADBE059F30AD7B9D945DBA0
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00823E35
                                                          • IsMenu.USER32(?), ref: 00823E4A
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00823E92
                                                          • DrawMenuBar.USER32 ref: 00823EA5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$DrawInfoInsert
                                                          • String ID: 0
                                                          • API String ID: 3076010158-4108050209
                                                          • Opcode ID: 3750fb7753cbf24dc8b47739bd43ff2b6c31981672f12b0bdf8e4fc2e055a437
                                                          • Instruction ID: d55c8d1a47b00fd2991afd5e3b6711c16ad500ba22725e49c2c386ca9c3943bb
                                                          • Opcode Fuzzy Hash: 3750fb7753cbf24dc8b47739bd43ff2b6c31981672f12b0bdf8e4fc2e055a437
                                                          • Instruction Fuzzy Hash: 50416A79A01219EFDB10DF50E894AAABBB5FF48354F054029E905E7250D734EE89CF91
                                                          APIs
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                            • Part of subcall function 007F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007F3CCA
                                                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 007F1E66
                                                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 007F1E79
                                                          • SendMessageW.USER32(?,00000189,?,00000000), ref: 007F1EA9
                                                            • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$_wcslen$ClassName
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 2081771294-1403004172
                                                          • Opcode ID: 85e663f56525f9d33406043cff41a538ea89bccf3de622ac76325ac14edee6b9
                                                          • Instruction ID: 559f1ec90550be6446529e8a99a002d8a736057f2985fa7820d1b4fb68c02fe9
                                                          • Opcode Fuzzy Hash: 85e663f56525f9d33406043cff41a538ea89bccf3de622ac76325ac14edee6b9
                                                          • Instruction Fuzzy Hash: 1821D371A00108EADB14ABA5DC59CFFB7B8EF56360F54451DFA25A72E1DB3C490AC620
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: HKEY_LOCAL_MACHINE$HKLM
                                                          • API String ID: 176396367-4004644295
                                                          • Opcode ID: 5338f367daf95b9a27d658c4a426fabc4eec23f5c249ba202edf828681759edb
                                                          • Instruction ID: 59194715dabf25912c944ca7ff443ffcce93b0d7eadebfe4a010118afeff0968
                                                          • Opcode Fuzzy Hash: 5338f367daf95b9a27d658c4a426fabc4eec23f5c249ba202edf828681759edb
                                                          • Instruction Fuzzy Hash: 9E31F5B2A801798BCB22DE6C99405FE3399FFA1750B154029EC55EB345EA75CDC4D3A0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00822F8D
                                                          • LoadLibraryW.KERNEL32(?), ref: 00822F94
                                                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00822FA9
                                                          • DestroyWindow.USER32(?), ref: 00822FB1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$DestroyLibraryLoadWindow
                                                          • String ID: SysAnimate32
                                                          • API String ID: 3529120543-1011021900
                                                          • Opcode ID: bf7adc087c6c3f0be5ce940531a7f7750252810655494f776100fdf2e9a45021
                                                          • Instruction ID: 18073cb6d3dd3e43675465eb5d39bbbce3c6a63d1cb4615b7d63754fb3981594
                                                          • Opcode Fuzzy Hash: bf7adc087c6c3f0be5ce940531a7f7750252810655494f776100fdf2e9a45021
                                                          • Instruction Fuzzy Hash: E621ACB2200229BBEF309F64ED84EBB37B9FB59364F104229FA50D2190DB71DC919760
                                                          APIs
                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,007B4D1E,007C28E9,?,007B4CBE,007C28E9,008588B8,0000000C,007B4E15,007C28E9,00000002), ref: 007B4D8D
                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 007B4DA0
                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,007B4D1E,007C28E9,?,007B4CBE,007C28E9,008588B8,0000000C,007B4E15,007C28E9,00000002,00000000), ref: 007B4DC3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                          • String ID: CorExitProcess$mscoree.dll
                                                          • API String ID: 4061214504-1276376045
                                                          • Opcode ID: 0d80d24c5a35c8818c527497b9a4f7b1b2613176958b157793cdcd87a8bfd88b
                                                          • Instruction ID: 9d4cb54ed74e6fc307e5edcf64e97458b29f77252d161bcf3ad24038c5dffffd
                                                          • Opcode Fuzzy Hash: 0d80d24c5a35c8818c527497b9a4f7b1b2613176958b157793cdcd87a8bfd88b
                                                          • Instruction Fuzzy Hash: 8EF04F34A40208BBDB619F90DC49BEEBBB5FF44752F0040A4F905A22A1CB795951CED0
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00794EDD,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794E9C
                                                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00794EAE
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00794EDD,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794EC0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$AddressFreeLoadProc
                                                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                          • API String ID: 145871493-3689287502
                                                          • Opcode ID: a7fccc074f241322507586879371c02f9b065c35875e09e033597baf7afdf170
                                                          • Instruction ID: ee1acf3151fa4006b4d5e0e06500080882bb26d853075f66335b0f86881fef63
                                                          • Opcode Fuzzy Hash: a7fccc074f241322507586879371c02f9b065c35875e09e033597baf7afdf170
                                                          • Instruction Fuzzy Hash: 26E08C36A02A22AB96321B25BC1AE7F7658BF81BA3B054125FC01E2200DB68CD0380E0
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,007D3CDE,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794E62
                                                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00794E74
                                                          • FreeLibrary.KERNEL32(00000000,?,?,007D3CDE,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794E87
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$AddressFreeLoadProc
                                                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                          • API String ID: 145871493-1355242751
                                                          • Opcode ID: 24dc1eaec7a7144f35f57272116b6d55987e75c1f51ad3209a9651b16b738ae9
                                                          • Instruction ID: 6acdf6ab29245bd8aa0d82a64eed505104305f8e839b5cc0a183f8f228cf4478
                                                          • Opcode Fuzzy Hash: 24dc1eaec7a7144f35f57272116b6d55987e75c1f51ad3209a9651b16b738ae9
                                                          • Instruction Fuzzy Hash: E0D0C232902A31574A321B247C09DAF3A18FF85B613054110BC00E2310CF28CD13C1D0
                                                          APIs
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00802C05
                                                          • DeleteFileW.KERNEL32(?), ref: 00802C87
                                                          • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00802C9D
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00802CAE
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00802CC0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: File$Delete$Copy
                                                          • String ID:
                                                          • API String ID: 3226157194-0
                                                          • Opcode ID: ad0b34bcea5afcb72f1892fc1ee1a74bc249b39502dcb3c238813346f0348536
                                                          • Instruction ID: eb4f17b09afc4d5350cf74a1c9c61dff4f77ad6c54530ffce62ae28616c55fc5
                                                          • Opcode Fuzzy Hash: ad0b34bcea5afcb72f1892fc1ee1a74bc249b39502dcb3c238813346f0348536
                                                          • Instruction Fuzzy Hash: 32B16071D00129EBDF61DBA4CC89EDEB77DFF48350F1040A6FA09E6191EA749A448F61
                                                          APIs
                                                          • GetCurrentProcessId.KERNEL32 ref: 0081A427
                                                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0081A435
                                                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0081A468
                                                          • CloseHandle.KERNEL32(?), ref: 0081A63D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseCountersCurrentHandleOpen
                                                          • String ID:
                                                          • API String ID: 3488606520-0
                                                          • Opcode ID: a44294991d50a581645082260ad569cee07036f6cb7b27908279658a5e44286b
                                                          • Instruction ID: fd8f3eef3f8b01634878083ae97a8859cda97d34094f9e8ac505443b9be90157
                                                          • Opcode Fuzzy Hash: a44294991d50a581645082260ad569cee07036f6cb7b27908279658a5e44286b
                                                          • Instruction Fuzzy Hash: 23A1AF726043009FDB24DF24D88AB6AB7E5FF88714F14881DF55ADB292D7B4EC418B92
                                                          APIs
                                                            • Part of subcall function 007FDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007FCF22,?), ref: 007FDDFD
                                                            • Part of subcall function 007FDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,007FCF22,?), ref: 007FDE16
                                                            • Part of subcall function 007FE199: GetFileAttributesW.KERNEL32(?,007FCF95), ref: 007FE19A
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 007FE473
                                                          • MoveFileW.KERNEL32(?,?), ref: 007FE4AC
                                                          • _wcslen.LIBCMT ref: 007FE5EB
                                                          • _wcslen.LIBCMT ref: 007FE603
                                                          • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 007FE650
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                          • String ID:
                                                          • API String ID: 3183298772-0
                                                          • Opcode ID: 6041e571ad4fdd0338f67522ebec08bd8f03731f6d6d6469619ce6537a0e9971
                                                          • Instruction ID: d6b704732540cc3a0d89cb3f2006f6ce2559af6a7e73ea30863d66092f642fa2
                                                          • Opcode Fuzzy Hash: 6041e571ad4fdd0338f67522ebec08bd8f03731f6d6d6469619ce6537a0e9971
                                                          • Instruction Fuzzy Hash: FC5154B24083899BD724EB94DC859EFB3DCAF85340F00491EF789D3251EF78A5888766
                                                          APIs
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                            • Part of subcall function 0081C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0081B6AE,?,?), ref: 0081C9B5
                                                            • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081C9F1
                                                            • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA68
                                                            • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0081BAA5
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0081BB00
                                                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0081BB63
                                                          • RegCloseKey.ADVAPI32(?,?), ref: 0081BBA6
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 0081BBB3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                          • String ID:
                                                          • API String ID: 826366716-0
                                                          • Opcode ID: ae04a94f7d8f5bbb1468541db2dcbbf382474407c9fb1a9c1f138320b0db6291
                                                          • Instruction ID: 8236acd5c0f446657fd403e85cda59146bf696b18340349892a685deb6e42306
                                                          • Opcode Fuzzy Hash: ae04a94f7d8f5bbb1468541db2dcbbf382474407c9fb1a9c1f138320b0db6291
                                                          • Instruction Fuzzy Hash: 6961D371208241EFD714DF24C894E6ABBE9FF84318F14855CF4998B2A2DB31ED85CB92
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 007F8BCD
                                                          • VariantClear.OLEAUT32 ref: 007F8C3E
                                                          • VariantClear.OLEAUT32 ref: 007F8C9D
                                                          • VariantClear.OLEAUT32(?), ref: 007F8D10
                                                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 007F8D3B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$Clear$ChangeInitType
                                                          • String ID:
                                                          • API String ID: 4136290138-0
                                                          • Opcode ID: d3485548eb5c828f3a61d94e67bbc790e3143f42e289ee00db9dfca2e9d76315
                                                          • Instruction ID: 68d8ef60a2c602ea55840534dc9844bd2d10e30c964f0411f75ac9c99ea7e672
                                                          • Opcode Fuzzy Hash: d3485548eb5c828f3a61d94e67bbc790e3143f42e289ee00db9dfca2e9d76315
                                                          • Instruction Fuzzy Hash: 165169B5A00619EFCB10CF68C884AAAB7F8FF8D310B158559EA15DB354E734E911CFA0
                                                          APIs
                                                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00808BAE
                                                          • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00808BDA
                                                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00808C32
                                                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00808C57
                                                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00808C5F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfile$SectionWrite$String
                                                          • String ID:
                                                          • API String ID: 2832842796-0
                                                          • Opcode ID: 4d09e96db6423c907dc677bd049a234d69bc423add0494b4cedddfc748364a02
                                                          • Instruction ID: 9693068e23556ded42deb05fe26731d2be5693ce659d8b0bd00e6de84b7a279e
                                                          • Opcode Fuzzy Hash: 4d09e96db6423c907dc677bd049a234d69bc423add0494b4cedddfc748364a02
                                                          • Instruction Fuzzy Hash: AB513735A00214DFDF55DF64C885A69BBF5FF49314F088058E849AB3A2DB35ED51CB90
                                                          APIs
                                                          • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00818F40
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00818FD0
                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00818FEC
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00819032
                                                          • FreeLibrary.KERNEL32(00000000), ref: 00819052
                                                            • Part of subcall function 007AF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00801043,?,753CE610), ref: 007AF6E6
                                                            • Part of subcall function 007AF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,007EFA64,00000000,00000000,?,?,00801043,?,753CE610,?,007EFA64), ref: 007AF70D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                          • String ID:
                                                          • API String ID: 666041331-0
                                                          • Opcode ID: 87eae1263eb5552c36db9b3a499c12e96a0d769752af81df796f57d6662b2fc4
                                                          • Instruction ID: 50c67ea88bc73ac51b1f0e23c8e1a8414c8b4ce85f843cdffdb2a59aa8a7526b
                                                          • Opcode Fuzzy Hash: 87eae1263eb5552c36db9b3a499c12e96a0d769752af81df796f57d6662b2fc4
                                                          • Instruction Fuzzy Hash: F3515934A04605DFCB14DF58D499CADBBF5FF49314B0580A8E84A9B362DB31ED86CB90
                                                          APIs
                                                          • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00826C33
                                                          • SetWindowLongW.USER32(?,000000EC,?), ref: 00826C4A
                                                          • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00826C73
                                                          • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0080AB79,00000000,00000000), ref: 00826C98
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00826CC7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$MessageSendShow
                                                          • String ID:
                                                          • API String ID: 3688381893-0
                                                          • Opcode ID: 7ccbfa097336b8152a9c2ecee0ceb979121e77d98bf3d5220596e71f8aadb72e
                                                          • Instruction ID: 2cf9ad673e5114b4f9ac8947e378deb605d71bb8fd8ae1b0804950d002100811
                                                          • Opcode Fuzzy Hash: 7ccbfa097336b8152a9c2ecee0ceb979121e77d98bf3d5220596e71f8aadb72e
                                                          • Instruction Fuzzy Hash: 5941E735604124AFDB24EF28DC59FB97BA5FB09360F150268F895E72E0E371EDA1CA40
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: d3d64efe4f7699ae8381035221b87cfaba04fdef363549442306e16ce46043c0
                                                          • Instruction ID: f72d02d356192d33150cee8e2916de621427d8145a17f52c3ac96bac89144724
                                                          • Opcode Fuzzy Hash: d3d64efe4f7699ae8381035221b87cfaba04fdef363549442306e16ce46043c0
                                                          • Instruction Fuzzy Hash: 1D41BE32A00204DFCB24DF78C885F5AB7A5EF89314B1545ADE615EB392DA35AD02CB80
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 007A9141
                                                          • ScreenToClient.USER32(00000000,?), ref: 007A915E
                                                          • GetAsyncKeyState.USER32(00000001), ref: 007A9183
                                                          • GetAsyncKeyState.USER32(00000002), ref: 007A919D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: AsyncState$ClientCursorScreen
                                                          • String ID:
                                                          • API String ID: 4210589936-0
                                                          • Opcode ID: 27f9a65564f69947416c27b629270a8797cf669a10bd085250a3fa7b10cb158c
                                                          • Instruction ID: b03986f67c07b328cd0d2e7f27110c31a282a2f7f7ce54e02fe6fc50b9f18b6d
                                                          • Opcode Fuzzy Hash: 27f9a65564f69947416c27b629270a8797cf669a10bd085250a3fa7b10cb158c
                                                          • Instruction Fuzzy Hash: 5C415E3190865AFBDF199F69C848BEEB775FF4A320F208315E525A7290C7385950CB51
                                                          APIs
                                                          • GetInputState.USER32 ref: 008038CB
                                                          • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00803922
                                                          • TranslateMessage.USER32(?), ref: 0080394B
                                                          • DispatchMessageW.USER32(?), ref: 00803955
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00803966
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                          • String ID:
                                                          • API String ID: 2256411358-0
                                                          • Opcode ID: 36052af2587f9b8f51d252f112141d2fd34735dd0dec32780f74275b1e7a0105
                                                          • Instruction ID: 85d3973068ac30a546bef2461c2eb647f4121ee5b269fd9392a8d8133c261292
                                                          • Opcode Fuzzy Hash: 36052af2587f9b8f51d252f112141d2fd34735dd0dec32780f74275b1e7a0105
                                                          • Instruction Fuzzy Hash: 4E31CE709043469EEF758B349D09BB67BACFB02304F094569E462C22E1E3E49A85CB21
                                                          APIs
                                                          • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,0080C21E,00000000), ref: 0080CF38
                                                          • InternetReadFile.WININET(?,00000000,?,?), ref: 0080CF6F
                                                          • GetLastError.KERNEL32(?,00000000,?,?,?,0080C21E,00000000), ref: 0080CFB4
                                                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,0080C21E,00000000), ref: 0080CFC8
                                                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,0080C21E,00000000), ref: 0080CFF2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                          • String ID:
                                                          • API String ID: 3191363074-0
                                                          • Opcode ID: ce32eada3779143967ea155230b6b8b7eb1d06ecf1f72191dc060797cf09cfaa
                                                          • Instruction ID: e59d625afeff1c7448b04bf7b60fe3b49bca9c32317ecac5600df0db6cfe5e3b
                                                          • Opcode Fuzzy Hash: ce32eada3779143967ea155230b6b8b7eb1d06ecf1f72191dc060797cf09cfaa
                                                          • Instruction Fuzzy Hash: 1E317C71600206EFDB60DFA5CC849AFBBF9FF04354B10852EF506D2180DB70AE419BA1
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 007F1915
                                                          • PostMessageW.USER32(00000001,00000201,00000001), ref: 007F19C1
                                                          • Sleep.KERNEL32(00000000,?,?,?), ref: 007F19C9
                                                          • PostMessageW.USER32(00000001,00000202,00000000), ref: 007F19DA
                                                          • Sleep.KERNEL32(00000000,?,?,?,?), ref: 007F19E2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleep$RectWindow
                                                          • String ID:
                                                          • API String ID: 3382505437-0
                                                          • Opcode ID: 05726b97f0b4dd57cbdb00cef2f193a99e6ecc5eb2a63b12b28128c4ca2a4331
                                                          • Instruction ID: 67303d20ee03eac4c68fdb44a30a179acaa6986cd76e965952f60e1cfdea8341
                                                          • Opcode Fuzzy Hash: 05726b97f0b4dd57cbdb00cef2f193a99e6ecc5eb2a63b12b28128c4ca2a4331
                                                          • Instruction Fuzzy Hash: 0231E27190025DEFCB14CFA8CD99AEE3BB5FB04314F408229FA21A72D0C3B4A954DB90
                                                          APIs
                                                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00825745
                                                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 0082579D
                                                          • _wcslen.LIBCMT ref: 008257AF
                                                          • _wcslen.LIBCMT ref: 008257BA
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00825816
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$_wcslen
                                                          • String ID:
                                                          • API String ID: 763830540-0
                                                          • Opcode ID: 2b7ec1c8682f90b2b5548bc132cb8283087fe7ff748e5ae5f7dee8b4ba6d4750
                                                          • Instruction ID: 2c9fb4cafe48b8b750e9ad79a6becf905c19bef0239417ed5f4bb014ac6c705a
                                                          • Opcode Fuzzy Hash: 2b7ec1c8682f90b2b5548bc132cb8283087fe7ff748e5ae5f7dee8b4ba6d4750
                                                          • Instruction Fuzzy Hash: B821B671944628DADB209F64EC84AEEBBB8FF14324F108216F929EB181D770D9C5CF50
                                                          APIs
                                                          • IsWindow.USER32(00000000), ref: 00810951
                                                          • GetForegroundWindow.USER32 ref: 00810968
                                                          • GetDC.USER32(00000000), ref: 008109A4
                                                          • GetPixel.GDI32(00000000,?,00000003), ref: 008109B0
                                                          • ReleaseDC.USER32(00000000,00000003), ref: 008109E8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ForegroundPixelRelease
                                                          • String ID:
                                                          • API String ID: 4156661090-0
                                                          • Opcode ID: 735977ddd6f40616cddae769de703497b57c5fddfd8843a2977c1e7d3b40c059
                                                          • Instruction ID: 62b1ffc71d99cc402b4192dfd07628f5839947fe8e94332bd0d4c7c331be9ecd
                                                          • Opcode Fuzzy Hash: 735977ddd6f40616cddae769de703497b57c5fddfd8843a2977c1e7d3b40c059
                                                          • Instruction Fuzzy Hash: B5218335A00104AFDB14EF68DC88AAEBBE9FF44700F048028E846D7751CA70AC44CB50
                                                          APIs
                                                          • GetEnvironmentStringsW.KERNEL32 ref: 007CCDC6
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 007CCDE9
                                                            • Part of subcall function 007C3820: RtlAllocateHeap.NTDLL(00000000,?,00861444,?,007AFDF5,?,?,0079A976,00000010,00861440,007913FC,?,007913C6,?,00791129), ref: 007C3852
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 007CCE0F
                                                          • _free.LIBCMT ref: 007CCE22
                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 007CCE31
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                          • String ID:
                                                          • API String ID: 336800556-0
                                                          • Opcode ID: b98becbbfeebc5e5f44dbaaf7b06f096d883cc379f6e196f7c9bb6bc71290ea1
                                                          • Instruction ID: 2cc812852d1a3dfd2522334151d62c93b5f6d290f7fdc0138effde8837074abc
                                                          • Opcode Fuzzy Hash: b98becbbfeebc5e5f44dbaaf7b06f096d883cc379f6e196f7c9bb6bc71290ea1
                                                          • Instruction Fuzzy Hash: 5201A7726016157F23325AB66C8DE7F7B6DEEC7BA1315412DFD09D7201EA698D0281F0
                                                          APIs
                                                          • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 007A9693
                                                          • SelectObject.GDI32(?,00000000), ref: 007A96A2
                                                          • BeginPath.GDI32(?), ref: 007A96B9
                                                          • SelectObject.GDI32(?,00000000), ref: 007A96E2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ObjectSelect$BeginCreatePath
                                                          • String ID:
                                                          • API String ID: 3225163088-0
                                                          • Opcode ID: f17444bba2bdb0754e6a3131fd4b83fffc438f1101e199d4d45a98d0d2a5330a
                                                          • Instruction ID: 4b92ee2fc058a9caa119e4128dddc23048fa2587ad454f947103b362d2154c0d
                                                          • Opcode Fuzzy Hash: f17444bba2bdb0754e6a3131fd4b83fffc438f1101e199d4d45a98d0d2a5330a
                                                          • Instruction Fuzzy Hash: 99217F30802305EBEF119F64DC19BA93FA8BF81315F594316FA10A61A2D3B958A2CF94
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: 1661d0ac43b459ebedf49679cca0c7ba2c0f0d40e6fc18691c372dd43f714afa
                                                          • Instruction ID: 7a3f9b5a0537414ffd953ea22e38172ff7d6ec28caa7ef21c44c9d84db6f006e
                                                          • Opcode Fuzzy Hash: 1661d0ac43b459ebedf49679cca0c7ba2c0f0d40e6fc18691c372dd43f714afa
                                                          • Instruction Fuzzy Hash: 8C019262645A1DFAD6086511ED92FFB639CEB213A4B804030FF15DB342F66CED50D2B0
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,?,007BF2DE,007C3863,00861444,?,007AFDF5,?,?,0079A976,00000010,00861440,007913FC,?,007913C6), ref: 007C2DFD
                                                          • _free.LIBCMT ref: 007C2E32
                                                          • _free.LIBCMT ref: 007C2E59
                                                          • SetLastError.KERNEL32(00000000,00791129), ref: 007C2E66
                                                          • SetLastError.KERNEL32(00000000,00791129), ref: 007C2E6F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_free
                                                          • String ID:
                                                          • API String ID: 3170660625-0
                                                          • Opcode ID: 4730a53811bba9081a0334de8434f323c0bb68528e26417d324a6b6681ec6264
                                                          • Instruction ID: b24450939e7497a007849b57a2301b3c51027cff1d81f9372c60ed55cf2c22f4
                                                          • Opcode Fuzzy Hash: 4730a53811bba9081a0334de8434f323c0bb68528e26417d324a6b6681ec6264
                                                          • Instruction Fuzzy Hash: 0D01A436245A00BBDA2267756C4DF2F276DBBD17B5B25852CF425B22A3EB7C8C074520
                                                          APIs
                                                          • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?,?,007F035E), ref: 007F002B
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?), ref: 007F0046
                                                          • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?), ref: 007F0054
                                                          • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?), ref: 007F0064
                                                          • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?), ref: 007F0070
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: From$Prog$FreeStringTasklstrcmpi
                                                          • String ID:
                                                          • API String ID: 3897988419-0
                                                          • Opcode ID: 46deaa3cc3df0469bb4467c5c8212f8d0f28ffd5fb7e09edb39e1c955c485f34
                                                          • Instruction ID: a2125aeb44c5a73a12cd19613db96e2d1be9e979f033a37e0da623719bead479
                                                          • Opcode Fuzzy Hash: 46deaa3cc3df0469bb4467c5c8212f8d0f28ffd5fb7e09edb39e1c955c485f34
                                                          • Instruction Fuzzy Hash: 98017C76600208BBDB204F68DC08BBE7AADEB44751F148124FA05D2311DB79DD419BA0
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 007FE997
                                                          • QueryPerformanceFrequency.KERNEL32(?), ref: 007FE9A5
                                                          • Sleep.KERNEL32(00000000), ref: 007FE9AD
                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 007FE9B7
                                                          • Sleep.KERNEL32 ref: 007FE9F3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: PerformanceQuery$CounterSleep$Frequency
                                                          • String ID:
                                                          • API String ID: 2833360925-0
                                                          • Opcode ID: 785eb37603eee3df54ab57515492fdec13da4091bb317600c0d665eb27d367f8
                                                          • Instruction ID: d84977f14dec37f889ecf8f2f1f1a60b4e23ae4dbb112653ab5355aab647627f
                                                          • Opcode Fuzzy Hash: 785eb37603eee3df54ab57515492fdec13da4091bb317600c0d665eb27d367f8
                                                          • Instruction Fuzzy Hash: E3013931C01A2DDBCF10DBE4D8496EDBB78BB09700F004546E612B2261DB78A556C7A2
                                                          APIs
                                                          • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 007F1114
                                                          • GetLastError.KERNEL32(?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F1120
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F112F
                                                          • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F1136
                                                          • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 007F114D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 842720411-0
                                                          • Opcode ID: f7ed2c4ef79d0f1e9ce299aa7fd58b91059d93cca6758d72211be63cc343e204
                                                          • Instruction ID: 0be5c77d4da5a67cdadf061c86483f7c9ee0a92a20ec14aa5c9ac1eeb412f6b7
                                                          • Opcode Fuzzy Hash: f7ed2c4ef79d0f1e9ce299aa7fd58b91059d93cca6758d72211be63cc343e204
                                                          • Instruction Fuzzy Hash: FC011D79500209BFDB214F69DC59A7A3B6EFF85360B504419FA45D7350DB31DC119A60
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 007F0FCA
                                                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 007F0FD6
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 007F0FE5
                                                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 007F0FEC
                                                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 007F1002
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: 88569ed107ca7f632d8ea862c8ba92bae19e5760b129ce3e7e28f7d65d62526c
                                                          • Instruction ID: 69b44ef0a7a571a7fc72ada32ea40bbec05366971963ae4d8445d356cff19a5e
                                                          • Opcode Fuzzy Hash: 88569ed107ca7f632d8ea862c8ba92bae19e5760b129ce3e7e28f7d65d62526c
                                                          • Instruction Fuzzy Hash: 39F04936200305FBDB214FA49C4EF6A3BADFF89762F608424FA45C7251CA74DC518A60
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 007F102A
                                                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 007F1036
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007F1045
                                                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 007F104C
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007F1062
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: 5bdd5e8bd943815a6fc7b828805fe51f2cbaf96bd2e9418f5700a3a707b05b41
                                                          • Instruction ID: 0fc5f04ed6cf184179832a18ab3e460f8ad1034529d685f4d2114bfe70f531ef
                                                          • Opcode Fuzzy Hash: 5bdd5e8bd943815a6fc7b828805fe51f2cbaf96bd2e9418f5700a3a707b05b41
                                                          • Instruction Fuzzy Hash: 01F06D35200305FBDB215FA4EC49F6A3BADFF89761F604424FA45C7350CE74D8518A60
                                                          APIs
                                                          • CloseHandle.KERNEL32(?,?,?,?,0080017D,?,008032FC,?,00000001,007D2592,?), ref: 00800324
                                                          • CloseHandle.KERNEL32(?,?,?,?,0080017D,?,008032FC,?,00000001,007D2592,?), ref: 00800331
                                                          • CloseHandle.KERNEL32(?,?,?,?,0080017D,?,008032FC,?,00000001,007D2592,?), ref: 0080033E
                                                          • CloseHandle.KERNEL32(?,?,?,?,0080017D,?,008032FC,?,00000001,007D2592,?), ref: 0080034B
                                                          • CloseHandle.KERNEL32(?,?,?,?,0080017D,?,008032FC,?,00000001,007D2592,?), ref: 00800358
                                                          • CloseHandle.KERNEL32(?,?,?,?,0080017D,?,008032FC,?,00000001,007D2592,?), ref: 00800365
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle
                                                          • String ID:
                                                          • API String ID: 2962429428-0
                                                          • Opcode ID: 6ddeb4abe3a7f510ec182948386d72c76a4c5942bd6580ae759f35ccdbd35b44
                                                          • Instruction ID: a61701e7636aa8e519d3846c5d9b84deba097dc8f129879f94aec0c56ce1e71b
                                                          • Opcode Fuzzy Hash: 6ddeb4abe3a7f510ec182948386d72c76a4c5942bd6580ae759f35ccdbd35b44
                                                          • Instruction Fuzzy Hash: 4F019C72800B159FCB31AF66DC80916FBF9FE603157168A3ED19692A71C3B1A959CE80
                                                          APIs
                                                          • _free.LIBCMT ref: 007CD752
                                                            • Part of subcall function 007C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000), ref: 007C29DE
                                                            • Part of subcall function 007C29C8: GetLastError.KERNEL32(00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000,00000000), ref: 007C29F0
                                                          • _free.LIBCMT ref: 007CD764
                                                          • _free.LIBCMT ref: 007CD776
                                                          • _free.LIBCMT ref: 007CD788
                                                          • _free.LIBCMT ref: 007CD79A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 72cf81d91b0058771a90c69f1d9e3dd0c6307af2be4e458501e50a4a14c28a98
                                                          • Instruction ID: ea7f4c04a37592d4226da17255a5915d059589eccacc158cae59a5babb6eb6d3
                                                          • Opcode Fuzzy Hash: 72cf81d91b0058771a90c69f1d9e3dd0c6307af2be4e458501e50a4a14c28a98
                                                          • Instruction Fuzzy Hash: DEF01D72544304AF8631EB68F9CAE1A7BDDBB44711BA5082DF049E7512CB3CFC818E64
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003E9), ref: 007F5C58
                                                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 007F5C6F
                                                          • MessageBeep.USER32(00000000), ref: 007F5C87
                                                          • KillTimer.USER32(?,0000040A), ref: 007F5CA3
                                                          • EndDialog.USER32(?,00000001), ref: 007F5CBD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                          • String ID:
                                                          • API String ID: 3741023627-0
                                                          • Opcode ID: fde09eebbfa4d5e5ba9167c6e2d5ee3679806079e3c2b4966fe6e36d1cf5cda6
                                                          • Instruction ID: f723b69c290a4284f45c7ecb2836ba5cfb8aca0b7466e9ea9d702540ab6a6e24
                                                          • Opcode Fuzzy Hash: fde09eebbfa4d5e5ba9167c6e2d5ee3679806079e3c2b4966fe6e36d1cf5cda6
                                                          • Instruction Fuzzy Hash: D8018670500B09ABEB305B50DD4EFBA77B8BF10B05F00555DA783A15E1DBF4A985CAA0
                                                          APIs
                                                          • _free.LIBCMT ref: 007C22BE
                                                            • Part of subcall function 007C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000), ref: 007C29DE
                                                            • Part of subcall function 007C29C8: GetLastError.KERNEL32(00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000,00000000), ref: 007C29F0
                                                          • _free.LIBCMT ref: 007C22D0
                                                          • _free.LIBCMT ref: 007C22E3
                                                          • _free.LIBCMT ref: 007C22F4
                                                          • _free.LIBCMT ref: 007C2305
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 8fb8695df2cdb82e55b22c91d0c68cef932115d2a04c8aa4ad5a02e464972b85
                                                          • Instruction ID: cccf5b1b0fa6628047e221acafad41eea2aebd12de54f9c0f0ecbb7f14d0538d
                                                          • Opcode Fuzzy Hash: 8fb8695df2cdb82e55b22c91d0c68cef932115d2a04c8aa4ad5a02e464972b85
                                                          • Instruction Fuzzy Hash: 30F03A708402209F8A12AF54BC09E093FA4F718761706251EF414E23B7CBB81912EFA8
                                                          APIs
                                                          • EndPath.GDI32(?), ref: 007A95D4
                                                          • StrokeAndFillPath.GDI32(?,?,007E71F7,00000000,?,?,?), ref: 007A95F0
                                                          • SelectObject.GDI32(?,00000000), ref: 007A9603
                                                          • DeleteObject.GDI32 ref: 007A9616
                                                          • StrokePath.GDI32(?), ref: 007A9631
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectStroke$DeleteFillSelect
                                                          • String ID:
                                                          • API String ID: 2625713937-0
                                                          • Opcode ID: c9bdfc99aeb837660bba4d23f1c151308243ebefad88b7691e80d985d2eb0f0b
                                                          • Instruction ID: e1d987cc094bc0c056b66cd8d03ad7f3f0b339c8d9227ac3e6db3af753f9160c
                                                          • Opcode Fuzzy Hash: c9bdfc99aeb837660bba4d23f1c151308243ebefad88b7691e80d985d2eb0f0b
                                                          • Instruction Fuzzy Hash: ACF08C31405604EBEF264F24EC1CBB83F64BB42322F488314F525550F2C7B489A2DFA0
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: __freea$_free
                                                          • String ID: a/p$am/pm
                                                          • API String ID: 3432400110-3206640213
                                                          • Opcode ID: 3c45930e3ed7bdb636858c06d944d3b26b047fc8bc6db50f61335ffb0592f0fb
                                                          • Instruction ID: 1809bfa23de52f882b40e9b08f9f5ac67f05e28728775a4a2bbdcff6c0b88da9
                                                          • Opcode Fuzzy Hash: 3c45930e3ed7bdb636858c06d944d3b26b047fc8bc6db50f61335ffb0592f0fb
                                                          • Instruction Fuzzy Hash: 8CD1CF35A00286CADB249F68C855FBAB7B1FF07704FA8417DE901AB652D37D9D80CB91
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: JOy
                                                          • API String ID: 0-3698608982
                                                          • Opcode ID: 0972b9cafb84f2ad0ddb761f7eaba0a4751c35cf2d8699f6cdaf8e02d1a5578a
                                                          • Instruction ID: 2ab4f409f9433661c07d3e64e2b649d512ba2028e6a8a0258fab52e664a56e56
                                                          • Opcode Fuzzy Hash: 0972b9cafb84f2ad0ddb761f7eaba0a4751c35cf2d8699f6cdaf8e02d1a5578a
                                                          • Instruction Fuzzy Hash: 785190B590060AEFCB219FA4CD49FEE7FB4EF05310F14015EF405A7292D67AA9818B61
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 007C8B6E
                                                          • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 007C8B7A
                                                          • __dosmaperr.LIBCMT ref: 007C8B81
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharErrorLastMultiWide__dosmaperr
                                                          • String ID: .{
                                                          • API String ID: 2434981716-1852962426
                                                          • Opcode ID: c6505a41c7eb48f080900e3ff6e93ed416fd2d8f3d939479bce011d3b48b98aa
                                                          • Instruction ID: f331ee36d80cf53ca6fdbd9faa851b22a7e23bfae06fe63449520c64917b4dcc
                                                          • Opcode Fuzzy Hash: c6505a41c7eb48f080900e3ff6e93ed416fd2d8f3d939479bce011d3b48b98aa
                                                          • Instruction Fuzzy Hash: 32419DF0604145AFDB649F24CC85FBD7FA5EB85300F2881AEF89587242DE39CC028B95
                                                          APIs
                                                            • Part of subcall function 007FB403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,007F21D0,?,?,00000034,00000800,?,00000034), ref: 007FB42D
                                                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 007F2760
                                                            • Part of subcall function 007FB3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,007F21FF,?,?,00000800,?,00001073,00000000,?,?), ref: 007FB3F8
                                                            • Part of subcall function 007FB32A: GetWindowThreadProcessId.USER32(?,?), ref: 007FB355
                                                            • Part of subcall function 007FB32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,007F2194,00000034,?,?,00001004,00000000,00000000), ref: 007FB365
                                                            • Part of subcall function 007FB32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,007F2194,00000034,?,?,00001004,00000000,00000000), ref: 007FB37B
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 007F27CD
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 007F281A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                          • String ID: @
                                                          • API String ID: 4150878124-2766056989
                                                          • Opcode ID: 83876530c14217259200c6356314229801266c6eaebeeb8207d2c0ee7999f5e4
                                                          • Instruction ID: da626f5285d071faa05103576e1db59013f59330e4f83930e1b19990f3c9f7df
                                                          • Opcode Fuzzy Hash: 83876530c14217259200c6356314229801266c6eaebeeb8207d2c0ee7999f5e4
                                                          • Instruction Fuzzy Hash: 81412E7290021CAFDB10DFA4CD46AEEBBB8EF09740F104059FA55B7281DB746E45CBA1
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 007C1769
                                                          • _free.LIBCMT ref: 007C1834
                                                          • _free.LIBCMT ref: 007C183E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$FileModuleName
                                                          • String ID: C:\Users\user\Desktop\file.exe
                                                          • API String ID: 2506810119-1957095476
                                                          • Opcode ID: d4130ea71228e495bbe4b506abaa3646b594467d540498015dc22afedc9916ca
                                                          • Instruction ID: 0e3a1dc7ed5f80b08c94ef5ad30b9528731a34359b87e552975426576fd8fe94
                                                          • Opcode Fuzzy Hash: d4130ea71228e495bbe4b506abaa3646b594467d540498015dc22afedc9916ca
                                                          • Instruction Fuzzy Hash: 5E318475A44218EFDB21DF999C89E9EBBFCEB86310B54417EF404D7212D6B48E40CB90
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 007FC306
                                                          • DeleteMenu.USER32(?,00000007,00000000), ref: 007FC34C
                                                          • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00861990,018962D8), ref: 007FC395
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Delete$InfoItem
                                                          • String ID: 0
                                                          • API String ID: 135850232-4108050209
                                                          • Opcode ID: b399d9a14f4d4f95238d3e42f8a747209db5bd2befb580ccd54542ce310fa2f7
                                                          • Instruction ID: 6dc4d9f0f2bfba50dc6ba8fa89b21e0c941a270a988c067b9272b8554039072c
                                                          • Opcode Fuzzy Hash: b399d9a14f4d4f95238d3e42f8a747209db5bd2befb580ccd54542ce310fa2f7
                                                          • Instruction Fuzzy Hash: 4D418C312043099FD721DF29D985B6ABBE4BF85360F108A1DFAA5973D1D738E904CB52
                                                          APIs
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0082CC08,00000000,?,?,?,?), ref: 008244AA
                                                          • GetWindowLongW.USER32 ref: 008244C7
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 008244D7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long
                                                          • String ID: SysTreeView32
                                                          • API String ID: 847901565-1698111956
                                                          • Opcode ID: 7c1505699b794451a3ec026a9bc7ee3c6cff2cd2a59cc93454e2f77cfc191718
                                                          • Instruction ID: 28b2117036ceb1d3c1b52b10cca20da895430fa480b57b39056ff406b64efd92
                                                          • Opcode Fuzzy Hash: 7c1505699b794451a3ec026a9bc7ee3c6cff2cd2a59cc93454e2f77cfc191718
                                                          • Instruction Fuzzy Hash: 3A319C71201215ABDF209E38EC45BEA7BA9FB08324F205315F975E21D0D774EC919B60
                                                          APIs
                                                            • Part of subcall function 0081335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00813077,?,?), ref: 00813378
                                                          • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0081307A
                                                          • _wcslen.LIBCMT ref: 0081309B
                                                          • htons.WSOCK32(00000000,?,?,00000000), ref: 00813106
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                          • String ID: 255.255.255.255
                                                          • API String ID: 946324512-2422070025
                                                          • Opcode ID: 6c500273897354b689946db32a85f020d1bcaba9aa95a287f11f8526255de2db
                                                          • Instruction ID: df30ddab7b2fb1622f722f5d30d3fa3e52f0596b13bde341db7922644507000e
                                                          • Opcode Fuzzy Hash: 6c500273897354b689946db32a85f020d1bcaba9aa95a287f11f8526255de2db
                                                          • Instruction Fuzzy Hash: D631A1356002059FDB20CF68C485EA977E8FF18318F248099E915DB392DB71EE85C760
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00823F40
                                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00823F54
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00823F78
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window
                                                          • String ID: SysMonthCal32
                                                          • API String ID: 2326795674-1439706946
                                                          • Opcode ID: 7beb1e4188354348551c1268b3c79cb2c83a8751ce720f2388f12ecb12914219
                                                          • Instruction ID: eed551f5131fc66b1a91a063a7e807f437a2708b6ff4fdc0c3e264c2b1269b47
                                                          • Opcode Fuzzy Hash: 7beb1e4188354348551c1268b3c79cb2c83a8751ce720f2388f12ecb12914219
                                                          • Instruction Fuzzy Hash: 5521BF32600229BBDF218F54EC46FEA3B75FF48724F110214FA15AB1D0DAB9AC95CB90
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00824705
                                                          • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00824713
                                                          • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0082471A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$DestroyWindow
                                                          • String ID: msctls_updown32
                                                          • API String ID: 4014797782-2298589950
                                                          • Opcode ID: 24da2b54aec8d86986d12bda77129c6e2a199aa1ce7656294be2287c66e863df
                                                          • Instruction ID: 99923f0b74b92273343e68074b1eac92e89b9e6e19255b7e75186c8cb9db2c05
                                                          • Opcode Fuzzy Hash: 24da2b54aec8d86986d12bda77129c6e2a199aa1ce7656294be2287c66e863df
                                                          • Instruction Fuzzy Hash: A5217CB5600218AFEB10DF68EC85DBA37ADFB5A394B041059FA11DB251CB70EC51CA60
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                          • API String ID: 176396367-2734436370
                                                          • Opcode ID: 4a0ba059b0978cefd4cbb373a6146f36c23a603f768fa07a7ad02a27f3566666
                                                          • Instruction ID: b25e52b650acf198db8d2f7aaede2804ef34910d6299646cbf198d5cea58d20b
                                                          • Opcode Fuzzy Hash: 4a0ba059b0978cefd4cbb373a6146f36c23a603f768fa07a7ad02a27f3566666
                                                          • Instruction Fuzzy Hash: 50215B72104525A6C731AB24EC06FB773ECEF91310F104026FB59D7282EB5DED51C295
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00823840
                                                          • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00823850
                                                          • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00823876
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MoveWindow
                                                          • String ID: Listbox
                                                          • API String ID: 3315199576-2633736733
                                                          • Opcode ID: b1e77fa73ebe4af1c0523debc07ccc5e46f98107ff29c3a2307843fa9c236c07
                                                          • Instruction ID: 872e194d92a2c779bb3adcb4c9c401ae704b5e88e1bfcb3564b24e1d0787bdf0
                                                          • Opcode Fuzzy Hash: b1e77fa73ebe4af1c0523debc07ccc5e46f98107ff29c3a2307843fa9c236c07
                                                          • Instruction Fuzzy Hash: 4C218E72610228BFEF219F54EC85EBB376AFF89754F118124F9149B190C675DC928BA0
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00804A08
                                                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00804A5C
                                                          • SetErrorMode.KERNEL32(00000000,?,?,0082CC08), ref: 00804AD0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$InformationVolume
                                                          • String ID: %lu
                                                          • API String ID: 2507767853-685833217
                                                          • Opcode ID: 1dfd41ef653311c4a318eeecf9681afa6fc430e2919278a6f4ce8eb2c91f6c51
                                                          • Instruction ID: 71eeeea773c4d6cb3d9d3a0776ad93406c9961d05cfc2f2a237fbe42fe325330
                                                          • Opcode Fuzzy Hash: 1dfd41ef653311c4a318eeecf9681afa6fc430e2919278a6f4ce8eb2c91f6c51
                                                          • Instruction Fuzzy Hash: 36314C71A00119EFDB10DF64C885EAA7BF8FF09308F1480A9E909DB252D775EE46CB61
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0082424F
                                                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00824264
                                                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00824271
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: msctls_trackbar32
                                                          • API String ID: 3850602802-1010561917
                                                          • Opcode ID: 8e6abfe2f04356aebb56e5c356f1178b80861f7d2da04529bef89751c7a34ff9
                                                          • Instruction ID: 7f9b059427b039ba6c580b4902e66c176a70e4d61e5cad8bb3d55578c0878d6f
                                                          • Opcode Fuzzy Hash: 8e6abfe2f04356aebb56e5c356f1178b80861f7d2da04529bef89751c7a34ff9
                                                          • Instruction Fuzzy Hash: CA110231240218BEEF205F29DC06FAB3BACFF95B64F110124FA55E20E0D2B1DCA19B20
                                                          APIs
                                                            • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                            • Part of subcall function 007F2DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 007F2DC5
                                                            • Part of subcall function 007F2DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 007F2DD6
                                                            • Part of subcall function 007F2DA7: GetCurrentThreadId.KERNEL32 ref: 007F2DDD
                                                            • Part of subcall function 007F2DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 007F2DE4
                                                          • GetFocus.USER32 ref: 007F2F78
                                                            • Part of subcall function 007F2DEE: GetParent.USER32(00000000), ref: 007F2DF9
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 007F2FC3
                                                          • EnumChildWindows.USER32(?,007F303B), ref: 007F2FEB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                          • String ID: %s%d
                                                          • API String ID: 1272988791-1110647743
                                                          • Opcode ID: 37da5d1dc45387eb4efbcb0e8dae95cb787ac64ad0db7a7601a065bfb21c2ed0
                                                          • Instruction ID: f22ab5bfad28fa38f56a2aad36bdcf81f412d27387f7deb4faefede5dee0c738
                                                          • Opcode Fuzzy Hash: 37da5d1dc45387eb4efbcb0e8dae95cb787ac64ad0db7a7601a065bfb21c2ed0
                                                          • Instruction Fuzzy Hash: 5311A5B1700209ABCF547F709C89EFD376AAF94304F048075FA099B353DE78994A8B60
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 008258C1
                                                          • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 008258EE
                                                          • DrawMenuBar.USER32(?), ref: 008258FD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$InfoItem$Draw
                                                          • String ID: 0
                                                          • API String ID: 3227129158-4108050209
                                                          • Opcode ID: ef149e4b616c9dd841ba647cbfcddfde021fbf5dd8ebf173c3f6c1b4bba7972d
                                                          • Instruction ID: 090c677cb0ad9d8b08fe6c84af568d453e89b1d36e28aa3cd236768e15ff5957
                                                          • Opcode Fuzzy Hash: ef149e4b616c9dd841ba647cbfcddfde021fbf5dd8ebf173c3f6c1b4bba7972d
                                                          • Instruction Fuzzy Hash: 61018C31500228EFDB219F51EC48BAEBFB4FF85360F1080A9E849D6151DB308AC4EF21
                                                          APIs
                                                          • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 007ED3BF
                                                          • FreeLibrary.KERNEL32 ref: 007ED3E5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: AddressFreeLibraryProc
                                                          • String ID: GetSystemWow64DirectoryW$X64
                                                          • API String ID: 3013587201-2590602151
                                                          • Opcode ID: 638e484d46b4f59863a2c5406fc7921a452d492780807522d13acdd9275ad18c
                                                          • Instruction ID: 6783ed2285d3e07a9710962bbff66dc38842691a3cd55530665e77e82b42d006
                                                          • Opcode Fuzzy Hash: 638e484d46b4f59863a2c5406fc7921a452d492780807522d13acdd9275ad18c
                                                          • Instruction Fuzzy Hash: E9F0AB72807AA1DBC77112664C5893E3318FF1AB11B698355F612E6291DB2CCC8482E2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d8cafc303357f78443be7bd06fad0b130f3592d80df08f99a380858b738e3cd3
                                                          • Instruction ID: 2bdac5f637c3a7cb700077af051cb6e132dc135858e9cb56f18bfbb190dfd6aa
                                                          • Opcode Fuzzy Hash: d8cafc303357f78443be7bd06fad0b130f3592d80df08f99a380858b738e3cd3
                                                          • Instruction Fuzzy Hash: C8C13875A0020AEFDB14CFA4C898ABEB7B5FF48714F208598E605AB352D735ED41DB90
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInitInitializeUninitialize
                                                          • String ID:
                                                          • API String ID: 1998397398-0
                                                          • Opcode ID: 72dbac0aaaa40420781bebe812a5c9c7f3c19e066bc9be97e9fb9bc783d3f151
                                                          • Instruction ID: becb205b14d91e64db8b49917d2313193dc44cb1a479c3d607c4e7c9c362af44
                                                          • Opcode Fuzzy Hash: 72dbac0aaaa40420781bebe812a5c9c7f3c19e066bc9be97e9fb9bc783d3f151
                                                          • Instruction Fuzzy Hash: 75A15C75208200DFCB14DF28D485A6AB7E9FF88714F058859F98ADB362DB34EE45CB91
                                                          APIs
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,0082FC08,?), ref: 007F05F0
                                                          • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,0082FC08,?), ref: 007F0608
                                                          • CLSIDFromProgID.OLE32(?,?,00000000,0082CC40,000000FF,?,00000000,00000800,00000000,?,0082FC08,?), ref: 007F062D
                                                          • _memcmp.LIBVCRUNTIME ref: 007F064E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: FromProg$FreeTask_memcmp
                                                          • String ID:
                                                          • API String ID: 314563124-0
                                                          • Opcode ID: 7188b0e6ac23ecb9f59ac57abdc56a5e41879b99b1e22d722397747187edd8f1
                                                          • Instruction ID: 1c93727aaa82403371f639cdf317c963a4afa0bcbf6dc3fba052054baa16f9ae
                                                          • Opcode Fuzzy Hash: 7188b0e6ac23ecb9f59ac57abdc56a5e41879b99b1e22d722397747187edd8f1
                                                          • Instruction Fuzzy Hash: 0A811971A00109EFCB04DF94C988DEEB7B9FF89315B204558E616EB251DB75AE06CBA0
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 0081A6AC
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 0081A6BA
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 0081A79C
                                                          • CloseHandle.KERNEL32(00000000), ref: 0081A7AB
                                                            • Part of subcall function 007ACE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,007D3303,?), ref: 007ACE8A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                          • String ID:
                                                          • API String ID: 1991900642-0
                                                          • Opcode ID: 8c84fefba26041c505dae3f479f9b7989951b4a7feacc41a1dc30c803bd4f76c
                                                          • Instruction ID: 66db602c2fdbe8bc149b84d02d23b0c22b4f552c3895cc73c5ab1fc4c0d7aaef
                                                          • Opcode Fuzzy Hash: 8c84fefba26041c505dae3f479f9b7989951b4a7feacc41a1dc30c803bd4f76c
                                                          • Instruction Fuzzy Hash: BF513B71508300AFD714EF24D88AA6BBBE8FF89754F40892DF585D7291EB34D904CB92
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: f4f54258ac0ed1c39b77429964f2e91120071a74c51f355a89b568581957361a
                                                          • Instruction ID: 74cef0a22e21d37764e880a7797e4aecfc8770902acb2b6bc33ea99cbfb58e8b
                                                          • Opcode Fuzzy Hash: f4f54258ac0ed1c39b77429964f2e91120071a74c51f355a89b568581957361a
                                                          • Instruction Fuzzy Hash: 64412536A00540FBDB25AAB89C4ABEE3BB4EF41730F54422BF41992392E67C88419261
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 008262E2
                                                          • ScreenToClient.USER32(?,?), ref: 00826315
                                                          • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00826382
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientMoveRectScreen
                                                          • String ID:
                                                          • API String ID: 3880355969-0
                                                          • Opcode ID: ad34e3255ddc34fe49c85f0848e491ec4b84c344937d0149067e05f8c78a6cce
                                                          • Instruction ID: dec6a5c39f23260e25cf14d7b6c086c5f8e7a0ae2b556fe6b10c28f89ed24342
                                                          • Opcode Fuzzy Hash: ad34e3255ddc34fe49c85f0848e491ec4b84c344937d0149067e05f8c78a6cce
                                                          • Instruction Fuzzy Hash: A8512A74A00219EFCF20DF68E885AAE7BB5FF45360F108159F815DB290E771AD91CB90
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 00811AFD
                                                          • WSAGetLastError.WSOCK32 ref: 00811B0B
                                                          • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00811B8A
                                                          • WSAGetLastError.WSOCK32 ref: 00811B94
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$socket
                                                          • String ID:
                                                          • API String ID: 1881357543-0
                                                          • Opcode ID: 8981d9a9d26266a60024e5dd18844fe08b78e595516320fb70c2acc0f14ee968
                                                          • Instruction ID: 43ea4a203e4e290b0eaba66784a8a18dcb8f620fae8c37e9e31b3116af9f9333
                                                          • Opcode Fuzzy Hash: 8981d9a9d26266a60024e5dd18844fe08b78e595516320fb70c2acc0f14ee968
                                                          • Instruction Fuzzy Hash: AD41D235600200AFDB20AF24D88AF6977E5EF49718F54C548F61A8F2D2D776ED818B90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d38806baa81ccccccf371fcb86e0e97442e0a6310a9e8ec58eb3ff18289edfd7
                                                          • Instruction ID: ae0544c8c7324c5d1948c058ea41047b5507a8cf52001c23db766e6c52dae8a9
                                                          • Opcode Fuzzy Hash: d38806baa81ccccccf371fcb86e0e97442e0a6310a9e8ec58eb3ff18289edfd7
                                                          • Instruction Fuzzy Hash: CB410876A04344FFD7289F78CC46FAABBB9EB88710F10452EF541DB282D7799A018780
                                                          APIs
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00805783
                                                          • GetLastError.KERNEL32(?,00000000), ref: 008057A9
                                                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 008057CE
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 008057FA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateHardLink$DeleteErrorFileLast
                                                          • String ID:
                                                          • API String ID: 3321077145-0
                                                          • Opcode ID: 7b9317d7ec6c646f36891e06bba9c603426aa6156255f4d787f8a78e22cbbdc4
                                                          • Instruction ID: 56a1cb4b625ec48848e65fc286534cc65d5a6fd48d375079bfbcff26cade7aaf
                                                          • Opcode Fuzzy Hash: 7b9317d7ec6c646f36891e06bba9c603426aa6156255f4d787f8a78e22cbbdc4
                                                          • Instruction Fuzzy Hash: F9410735614610DFCF15DF15D548A1EBBE2EF89320B19C498E84AAB362CB34FD01CB91
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(?,00000000,?,007B6D71,00000000,00000000,007B82D9,?,007B82D9,?,00000001,007B6D71,?,00000001,007B82D9,007B82D9), ref: 007CD910
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 007CD999
                                                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 007CD9AB
                                                          • __freea.LIBCMT ref: 007CD9B4
                                                            • Part of subcall function 007C3820: RtlAllocateHeap.NTDLL(00000000,?,00861444,?,007AFDF5,?,?,0079A976,00000010,00861440,007913FC,?,007913C6,?,00791129), ref: 007C3852
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                          • String ID:
                                                          • API String ID: 2652629310-0
                                                          • Opcode ID: 39bea2d22807ee29739ba97aa967af0e89f6bfd3e894641ab22552928882788c
                                                          • Instruction ID: bdac8942d33a6d615343ad074f0efd54c83ce0ae769463bd6efa2dddb080c078
                                                          • Opcode Fuzzy Hash: 39bea2d22807ee29739ba97aa967af0e89f6bfd3e894641ab22552928882788c
                                                          • Instruction Fuzzy Hash: 3231A972A0020AABDB34DF65DC85EAE7BA5EB41310B05426CFC04D7291EB39ED51CBA0
                                                          APIs
                                                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 00825352
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00825375
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00825382
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 008253A8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$InvalidateMessageRectSend
                                                          • String ID:
                                                          • API String ID: 3340791633-0
                                                          • Opcode ID: 9aba4272718277fc552ef7306decd5a26b1471bc504f8a396072571d463595ce
                                                          • Instruction ID: 19b1a1bacbf31a7601752b8a42a450190e996cc74a096a5a7282761a169c9dd9
                                                          • Opcode Fuzzy Hash: 9aba4272718277fc552ef7306decd5a26b1471bc504f8a396072571d463595ce
                                                          • Instruction Fuzzy Hash: D1318E34A95A28AEEB30DA14EC1EBE97765FB06390F586102FA11D63E1C7B49DC09B41
                                                          APIs
                                                          • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 007FABF1
                                                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 007FAC0D
                                                          • PostMessageW.USER32(00000000,00000101,00000000), ref: 007FAC74
                                                          • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 007FACC6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: d6a128844897bc370d683c5bb3a9995a6988a3f89cc88022aa9e38cfaef8a35e
                                                          • Instruction ID: df4777d6467e607ad501833310352ada1548b7d18afcbce412462cfabe4a2e1c
                                                          • Opcode Fuzzy Hash: d6a128844897bc370d683c5bb3a9995a6988a3f89cc88022aa9e38cfaef8a35e
                                                          • Instruction Fuzzy Hash: 9E3116B0A0465CBFEB348B658C087FE7BA6BB49310F04421AE689523D0C37D8985C772
                                                          APIs
                                                          • ClientToScreen.USER32(?,?), ref: 0082769A
                                                          • GetWindowRect.USER32(?,?), ref: 00827710
                                                          • PtInRect.USER32(?,?,00828B89), ref: 00827720
                                                          • MessageBeep.USER32(00000000), ref: 0082778C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Rect$BeepClientMessageScreenWindow
                                                          • String ID:
                                                          • API String ID: 1352109105-0
                                                          • Opcode ID: 5f08ea585a67d2cd35cfd3fc9a92f82b6aea71b986ca9c88958954baa4cfd97f
                                                          • Instruction ID: 63dc7b9b374a7e618ef140a2bf4304401deb5d122b55c937cd061e79f82d510a
                                                          • Opcode Fuzzy Hash: 5f08ea585a67d2cd35cfd3fc9a92f82b6aea71b986ca9c88958954baa4cfd97f
                                                          • Instruction Fuzzy Hash: BB41BF34605265DFDB11CF5AE898EA9BBF4FF48304F1980A8E814DB261C370E982CF90
                                                          APIs
                                                          • GetForegroundWindow.USER32 ref: 008216EB
                                                            • Part of subcall function 007F3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 007F3A57
                                                            • Part of subcall function 007F3A3D: GetCurrentThreadId.KERNEL32 ref: 007F3A5E
                                                            • Part of subcall function 007F3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,007F25B3), ref: 007F3A65
                                                          • GetCaretPos.USER32(?), ref: 008216FF
                                                          • ClientToScreen.USER32(00000000,?), ref: 0082174C
                                                          • GetForegroundWindow.USER32 ref: 00821752
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                          • String ID:
                                                          • API String ID: 2759813231-0
                                                          • Opcode ID: d0be3d68864b26dd24c1f6c21a9a0f1d050ded4b44cb83ecce158d0c0dbfb09c
                                                          • Instruction ID: e2c1cdd0b22015534ac2db8a3f9c1477a37f179ef19d37bb310800070b0adccb
                                                          • Opcode Fuzzy Hash: d0be3d68864b26dd24c1f6c21a9a0f1d050ded4b44cb83ecce158d0c0dbfb09c
                                                          • Instruction Fuzzy Hash: 26316172D00109AFCB00EFAAD885CAEB7F9FF88304B548069E415E7211EB359E45CBA0
                                                          APIs
                                                            • Part of subcall function 00797620: _wcslen.LIBCMT ref: 00797625
                                                          • _wcslen.LIBCMT ref: 007FDFCB
                                                          • _wcslen.LIBCMT ref: 007FDFE2
                                                          • _wcslen.LIBCMT ref: 007FE00D
                                                          • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 007FE018
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$ExtentPoint32Text
                                                          • String ID:
                                                          • API String ID: 3763101759-0
                                                          • Opcode ID: 3d0ef4e6ddee22c290d664af05cb8bc8db381b9b22a7b8c15f431240ca27952d
                                                          • Instruction ID: 18f617b0a256d5efc7d52c281d157c89c2cff8578e53cc6b967a313241741760
                                                          • Opcode Fuzzy Hash: 3d0ef4e6ddee22c290d664af05cb8bc8db381b9b22a7b8c15f431240ca27952d
                                                          • Instruction Fuzzy Hash: 48219F71900218EFCB219FA8D985BBEB7F8EF85750F244065E905FB342D6789E41CBA1
                                                          APIs
                                                            • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                          • GetCursorPos.USER32(?), ref: 00829001
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,007E7711,?,?,?,?,?), ref: 00829016
                                                          • GetCursorPos.USER32(?), ref: 0082905E
                                                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,007E7711,?,?,?), ref: 00829094
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                          • String ID:
                                                          • API String ID: 2864067406-0
                                                          • Opcode ID: 06e134cf7c1f31cd6e74d92321d95725d2d1ce3d05d6c53af11bfb0310a557aa
                                                          • Instruction ID: dcbf51fa8d186fedacea90e1784b200574220a761e9051b898554290e36dca5f
                                                          • Opcode Fuzzy Hash: 06e134cf7c1f31cd6e74d92321d95725d2d1ce3d05d6c53af11bfb0310a557aa
                                                          • Instruction Fuzzy Hash: 7021BC31600428EFCB268F94D858EFA7BF9FF8A350F054169F9458B261C335A990DB60
                                                          APIs
                                                          • GetFileAttributesW.KERNEL32(?,0082CB68), ref: 007FD2FB
                                                          • GetLastError.KERNEL32 ref: 007FD30A
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 007FD319
                                                          • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0082CB68), ref: 007FD376
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectory$AttributesErrorFileLast
                                                          • String ID:
                                                          • API String ID: 2267087916-0
                                                          • Opcode ID: ccfa93a0f8f9bb38d8fc864d2fc5a2088190b29ad607a895f331fda06b82576b
                                                          • Instruction ID: bbac94718232e9e6193ce0b20a50c3365e0d16d0214ba955af25d44a6d8fddea
                                                          • Opcode Fuzzy Hash: ccfa93a0f8f9bb38d8fc864d2fc5a2088190b29ad607a895f331fda06b82576b
                                                          • Instruction Fuzzy Hash: 6B214871508205DF8720DF28D88587AB7E5BE5A324F104A1DF6A9C32A1EB359D46CB93
                                                          APIs
                                                            • Part of subcall function 007F1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 007F102A
                                                            • Part of subcall function 007F1014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 007F1036
                                                            • Part of subcall function 007F1014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007F1045
                                                            • Part of subcall function 007F1014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 007F104C
                                                            • Part of subcall function 007F1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007F1062
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 007F15BE
                                                          • _memcmp.LIBVCRUNTIME ref: 007F15E1
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F1617
                                                          • HeapFree.KERNEL32(00000000), ref: 007F161E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                          • String ID:
                                                          • API String ID: 1592001646-0
                                                          • Opcode ID: 54b28301d112335057e3401facc1dac506cecbd1f53757bd13961c0768c1018a
                                                          • Instruction ID: bb1ff01d01db9411ebc7a86bd4e5bbde39d71b4f47cb0e2d75d53baebc4a250d
                                                          • Opcode Fuzzy Hash: 54b28301d112335057e3401facc1dac506cecbd1f53757bd13961c0768c1018a
                                                          • Instruction Fuzzy Hash: D3218931E00108EFDF10DFA4C949BFEB7B8EF44354F498459E541AB241EB39AA05CBA0
                                                          APIs
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 0082280A
                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00822824
                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00822832
                                                          • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00822840
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$AttributesLayered
                                                          • String ID:
                                                          • API String ID: 2169480361-0
                                                          • Opcode ID: a70af6b4e358c8e380a25c68b843d484a412324e78840b52fed0b87c60576d86
                                                          • Instruction ID: 2f6a5e980ed60f651754094ae9555e79638e87b69eb55b66331ac30aa2bb7bf5
                                                          • Opcode Fuzzy Hash: a70af6b4e358c8e380a25c68b843d484a412324e78840b52fed0b87c60576d86
                                                          • Instruction Fuzzy Hash: 0F219031208525BFD7149B24E845FAA7B95FF49324F148258F426CB6E2CB75EC82CB90
                                                          APIs
                                                            • Part of subcall function 007F8D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,007F790A,?,000000FF,?,007F8754,00000000,?,0000001C,?,?), ref: 007F8D8C
                                                            • Part of subcall function 007F8D7D: lstrcpyW.KERNEL32(00000000,?,?,007F790A,?,000000FF,?,007F8754,00000000,?,0000001C,?,?,00000000), ref: 007F8DB2
                                                            • Part of subcall function 007F8D7D: lstrcmpiW.KERNEL32(00000000,?,007F790A,?,000000FF,?,007F8754,00000000,?,0000001C,?,?), ref: 007F8DE3
                                                          • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,007F8754,00000000,?,0000001C,?,?,00000000), ref: 007F7923
                                                          • lstrcpyW.KERNEL32(00000000,?,?,007F8754,00000000,?,0000001C,?,?,00000000), ref: 007F7949
                                                          • lstrcmpiW.KERNEL32(00000002,cdecl,?,007F8754,00000000,?,0000001C,?,?,00000000), ref: 007F7984
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: lstrcmpilstrcpylstrlen
                                                          • String ID: cdecl
                                                          • API String ID: 4031866154-3896280584
                                                          • Opcode ID: c0da6cd2f7bdea5e24d57001aafb1c4be9481c0f36ec94104cc8f7707938f6ff
                                                          • Instruction ID: 2efd1c7f64b1d5f9edb73bedca28d971195a0c8421e74bb15e000294466c8c1c
                                                          • Opcode Fuzzy Hash: c0da6cd2f7bdea5e24d57001aafb1c4be9481c0f36ec94104cc8f7707938f6ff
                                                          • Instruction Fuzzy Hash: 9411293A200305ABDB259F34CC49D7A77A9FF85350B40812AFA42C73A4EB759811C791
                                                          APIs
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00827D0B
                                                          • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00827D2A
                                                          • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00827D42
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0080B7AD,00000000), ref: 00827D6B
                                                            • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long
                                                          • String ID:
                                                          • API String ID: 847901565-0
                                                          • Opcode ID: e0834365711ab521d5500d94fb941935415df3bb8f8f2f3020689817a9d6bbb1
                                                          • Instruction ID: e61e94a71934280f34621f31d5c2415608424896657cf8685f04033ec0db43d4
                                                          • Opcode Fuzzy Hash: e0834365711ab521d5500d94fb941935415df3bb8f8f2f3020689817a9d6bbb1
                                                          • Instruction Fuzzy Hash: 9E11AF31605625AFCB109F29EC08ABA3BA5FF45360B158728F939D72F0D7309991CB50
                                                          APIs
                                                          • SendMessageW.USER32(?,00001060,?,00000004), ref: 008256BB
                                                          • _wcslen.LIBCMT ref: 008256CD
                                                          • _wcslen.LIBCMT ref: 008256D8
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00825816
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend_wcslen
                                                          • String ID:
                                                          • API String ID: 455545452-0
                                                          • Opcode ID: 671d9fa24d79c10024f105deff1f538ced6a0147148ae24133d256b61a8e6ab5
                                                          • Instruction ID: 9580ba114db35a460aa99e384bd952381e1fec8b97963af23a42f51afb01273b
                                                          • Opcode Fuzzy Hash: 671d9fa24d79c10024f105deff1f538ced6a0147148ae24133d256b61a8e6ab5
                                                          • Instruction Fuzzy Hash: FC11D671640628E6DF209F65EC85AFE77ACFF10764B508026F915D6081E774D9C0CB64
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 60e19676ccd7547b2af36959781b11025b0eff358639c870d7cc5f94798e7c1b
                                                          • Instruction ID: 8ff448bee66c02902c46854629027e3bd73dc1b30be42a9eeeecbaa1023661bd
                                                          • Opcode Fuzzy Hash: 60e19676ccd7547b2af36959781b11025b0eff358639c870d7cc5f94798e7c1b
                                                          • Instruction Fuzzy Hash: 99018FB2305A167EF62116786CC5F27671CEF423B8B75033DF522611E7DB689C0156A0
                                                          APIs
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 007F1A47
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 007F1A59
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 007F1A6F
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 007F1A8A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: 1cdc524048f3ac55799e3bfad62192923aaa1a3870017be290c062c386b039cd
                                                          • Instruction ID: 5a47171de14f4719f2f1bf5b11cebf853f023f0c7d15a2fdefdf77ccbdbd4e41
                                                          • Opcode Fuzzy Hash: 1cdc524048f3ac55799e3bfad62192923aaa1a3870017be290c062c386b039cd
                                                          • Instruction Fuzzy Hash: C611393AD01219FFEB10DBA5CD85FADBB78FB08750F604091EA00B7290D6716E50DB94
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 007FE1FD
                                                          • MessageBoxW.USER32(?,?,?,?), ref: 007FE230
                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 007FE246
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 007FE24D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                          • String ID:
                                                          • API String ID: 2880819207-0
                                                          • Opcode ID: 3b8aa8cdd94e4d26ae2f935be9229c3ed2bb977d48edb6eb73da119b6ba301e4
                                                          • Instruction ID: 9be8e62d510130bb3115779cbd67d94ef22820cf0ee953cf8ac70a1b9617dcd6
                                                          • Opcode Fuzzy Hash: 3b8aa8cdd94e4d26ae2f935be9229c3ed2bb977d48edb6eb73da119b6ba301e4
                                                          • Instruction Fuzzy Hash: E8112B72904258BFDB119FA89C09ABE7FACBB45320F148615F915D3391E3B8CD0087A0
                                                          APIs
                                                          • CreateThread.KERNEL32(00000000,?,007BCFF9,00000000,00000004,00000000), ref: 007BD218
                                                          • GetLastError.KERNEL32 ref: 007BD224
                                                          • __dosmaperr.LIBCMT ref: 007BD22B
                                                          • ResumeThread.KERNEL32(00000000), ref: 007BD249
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                          • String ID:
                                                          • API String ID: 173952441-0
                                                          • Opcode ID: 881449cfb3698208a2118f556acfa75c9345b8200cb772ebede57fab89045a82
                                                          • Instruction ID: d2491451abcd09d99ba66d60cdfd2e6fe60374c026b0afd2eeb7af0e877b2284
                                                          • Opcode Fuzzy Hash: 881449cfb3698208a2118f556acfa75c9345b8200cb772ebede57fab89045a82
                                                          • Instruction Fuzzy Hash: FA019276805208BFDB316BA5DC0EBEE7A69FF81731F204219F925961D0EB798D01C7A1
                                                          APIs
                                                            • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                          • GetClientRect.USER32(?,?), ref: 00829F31
                                                          • GetCursorPos.USER32(?), ref: 00829F3B
                                                          • ScreenToClient.USER32(?,?), ref: 00829F46
                                                          • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00829F7A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Client$CursorLongProcRectScreenWindow
                                                          • String ID:
                                                          • API String ID: 4127811313-0
                                                          • Opcode ID: 7aec3685d80ee34fda9dcc207fb2e84733b6ccfa260db53e21de384c5284e0cd
                                                          • Instruction ID: d17fb3e55335ee5a8a90d542596ac25abb564b5d7dd70bffa6c14a9457cee82f
                                                          • Opcode Fuzzy Hash: 7aec3685d80ee34fda9dcc207fb2e84733b6ccfa260db53e21de384c5284e0cd
                                                          • Instruction Fuzzy Hash: 4811883290012AABCB10DFA8E9899FE77B8FF05301F004451F951E3140DB30BA82CBA1
                                                          APIs
                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0079604C
                                                          • GetStockObject.GDI32(00000011), ref: 00796060
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 0079606A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateMessageObjectSendStockWindow
                                                          • String ID:
                                                          • API String ID: 3970641297-0
                                                          • Opcode ID: 0778b88673381a5a199bdeb4fbd63218d24897fb115b7992bbda8b646914a6ef
                                                          • Instruction ID: 649f7ed021d05210978879e7beaf8fb5e47d7bcd81fd7d81fbd8d651ce7c3a7e
                                                          • Opcode Fuzzy Hash: 0778b88673381a5a199bdeb4fbd63218d24897fb115b7992bbda8b646914a6ef
                                                          • Instruction Fuzzy Hash: 74118072501508BFEF224FA8EC94EFABBA9FF187A4F044216FA1452110D736DC60DBA0
                                                          APIs
                                                          • ___BuildCatchObject.LIBVCRUNTIME ref: 007B3B56
                                                            • Part of subcall function 007B3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 007B3AD2
                                                            • Part of subcall function 007B3AA3: ___AdjustPointer.LIBCMT ref: 007B3AED
                                                          • _UnwindNestedFrames.LIBCMT ref: 007B3B6B
                                                          • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 007B3B7C
                                                          • CallCatchBlock.LIBVCRUNTIME ref: 007B3BA4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                          • String ID:
                                                          • API String ID: 737400349-0
                                                          • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                          • Instruction ID: 74ef203f8404c04de63dca05f9643c6fa68434eee9a0fbc3489288d6a3aa2ded
                                                          • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                          • Instruction Fuzzy Hash: 34012972100148BBDF126E95CC46EEB7B6AFF48754F044014FE4896121C73AE9A1EBA0
                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,007913C6,00000000,00000000,?,007C301A,007913C6,00000000,00000000,00000000,?,007C328B,00000006,FlsSetValue), ref: 007C30A5
                                                          • GetLastError.KERNEL32(?,007C301A,007913C6,00000000,00000000,00000000,?,007C328B,00000006,FlsSetValue,00832290,FlsSetValue,00000000,00000364,?,007C2E46), ref: 007C30B1
                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,007C301A,007913C6,00000000,00000000,00000000,?,007C328B,00000006,FlsSetValue,00832290,FlsSetValue,00000000), ref: 007C30BF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: LibraryLoad$ErrorLast
                                                          • String ID:
                                                          • API String ID: 3177248105-0
                                                          • Opcode ID: 077c00b71719fb22db1604b7adabce196b9fdbe67768ebfcdbe35ce79db5b6cd
                                                          • Instruction ID: 94430d53c4350698327f89ee7c31950224ba3f1146844ac23cc6739af6d14d51
                                                          • Opcode Fuzzy Hash: 077c00b71719fb22db1604b7adabce196b9fdbe67768ebfcdbe35ce79db5b6cd
                                                          • Instruction Fuzzy Hash: FA01FC33301626ABCB314B78AC44F67779ABF45B61B11872CF906D3140CB25D942C6D0
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 007F747F
                                                          • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 007F7497
                                                          • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 007F74AC
                                                          • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 007F74CA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Type$Register$FileLoadModuleNameUser
                                                          • String ID:
                                                          • API String ID: 1352324309-0
                                                          • Opcode ID: 6edfa34d43423e0f8be2fc731882d575b30c5048675656c36da5204b4d3ee4b6
                                                          • Instruction ID: e5a028c78039ed2585c85dc2b877a64bb51c90c581979d31e96c5f1a368362a5
                                                          • Opcode Fuzzy Hash: 6edfa34d43423e0f8be2fc731882d575b30c5048675656c36da5204b4d3ee4b6
                                                          • Instruction Fuzzy Hash: DC11ADB1205359ABE7309F14EC09BB67BFCFB00B10F108569E626D7291D7B4E904DBA1
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,007FACD3,?,00008000), ref: 007FB0C4
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,007FACD3,?,00008000), ref: 007FB0E9
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,007FACD3,?,00008000), ref: 007FB0F3
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,007FACD3,?,00008000), ref: 007FB126
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CounterPerformanceQuerySleep
                                                          • String ID:
                                                          • API String ID: 2875609808-0
                                                          • Opcode ID: 26c2cd221654c55649fea01a75b8c5a2d7573b479792748e0c1359f0eabecb6c
                                                          • Instruction ID: 51ec25283e899556c58d85ba53db7cef61f08a6928e85138ecc0552e2a897357
                                                          • Opcode Fuzzy Hash: 26c2cd221654c55649fea01a75b8c5a2d7573b479792748e0c1359f0eabecb6c
                                                          • Instruction Fuzzy Hash: 59116D31C01A2CE7CF10AFE4E9696FEBF78FF49711F108086DA41B2281CB3896518B51
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 00827E33
                                                          • ScreenToClient.USER32(?,?), ref: 00827E4B
                                                          • ScreenToClient.USER32(?,?), ref: 00827E6F
                                                          • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00827E8A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ClientRectScreen$InvalidateWindow
                                                          • String ID:
                                                          • API String ID: 357397906-0
                                                          • Opcode ID: 0871379442132902b3a80bd569fa975a113ca82492f0ac68eb881d4cf8bfdc6f
                                                          • Instruction ID: ba943ced25b84adc69aef8ac3e92956145d63f19cf6fd734b492b09e474459e9
                                                          • Opcode Fuzzy Hash: 0871379442132902b3a80bd569fa975a113ca82492f0ac68eb881d4cf8bfdc6f
                                                          • Instruction Fuzzy Hash: F91140B9D0020AAFDB51CF99D884AEEBBF9FF18310F509066E915E2210D735AA55CF90
                                                          APIs
                                                          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 007F2DC5
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 007F2DD6
                                                          • GetCurrentThreadId.KERNEL32 ref: 007F2DDD
                                                          • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 007F2DE4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 2710830443-0
                                                          • Opcode ID: 0699c842ac0476aba4cbd690c3c1f70776f7ef2ceffb2166365ac8aeb7a189eb
                                                          • Instruction ID: 7e7ab9f835e1eedfd7dc54f57ec6be4f01340ca11954cc1a8e0ed6d52a237c17
                                                          • Opcode Fuzzy Hash: 0699c842ac0476aba4cbd690c3c1f70776f7ef2ceffb2166365ac8aeb7a189eb
                                                          • Instruction Fuzzy Hash: 71E06DB12016287BE7301B629C0EEFB7E6CFB52BA1F404119B206D11819AA88842C6B0
                                                          APIs
                                                            • Part of subcall function 007A9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 007A9693
                                                            • Part of subcall function 007A9639: SelectObject.GDI32(?,00000000), ref: 007A96A2
                                                            • Part of subcall function 007A9639: BeginPath.GDI32(?), ref: 007A96B9
                                                            • Part of subcall function 007A9639: SelectObject.GDI32(?,00000000), ref: 007A96E2
                                                          • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00828887
                                                          • LineTo.GDI32(?,?,?), ref: 00828894
                                                          • EndPath.GDI32(?), ref: 008288A4
                                                          • StrokePath.GDI32(?), ref: 008288B2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                          • String ID:
                                                          • API String ID: 1539411459-0
                                                          • Opcode ID: 952a3dc8a85956eeb34b4c9382736e74a7f939caa93f2e84580034b2ff63f836
                                                          • Instruction ID: ba179a81d04382f52a6ebd9d61b7c1a74f78329970f9bec3771598d8d387597b
                                                          • Opcode Fuzzy Hash: 952a3dc8a85956eeb34b4c9382736e74a7f939caa93f2e84580034b2ff63f836
                                                          • Instruction Fuzzy Hash: 51F03A36042668FAEF225F94AC0EFDE3E59BF06310F448100FA11A50E2C7B55562CBE5
                                                          APIs
                                                          • GetSysColor.USER32(00000008), ref: 007A98CC
                                                          • SetTextColor.GDI32(?,?), ref: 007A98D6
                                                          • SetBkMode.GDI32(?,00000001), ref: 007A98E9
                                                          • GetStockObject.GDI32(00000005), ref: 007A98F1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$ModeObjectStockText
                                                          • String ID:
                                                          • API String ID: 4037423528-0
                                                          • Opcode ID: db6338ba68a7bcfb6b48a5f9367bb32339cbaf2dde66e654e5ec160ade8674c7
                                                          • Instruction ID: ab1bcd9601bbc3b16d26792a531a73e6530c3bf8084578ed03ac5591ef65d7cf
                                                          • Opcode Fuzzy Hash: db6338ba68a7bcfb6b48a5f9367bb32339cbaf2dde66e654e5ec160ade8674c7
                                                          • Instruction Fuzzy Hash: 20E06D31244680AADB315B75AC0ABED3F20BB56336F04C21AF6FA580E1C3B58661DB11
                                                          APIs
                                                          • GetCurrentThread.KERNEL32 ref: 007F1634
                                                          • OpenThreadToken.ADVAPI32(00000000,?,?,?,007F11D9), ref: 007F163B
                                                          • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,007F11D9), ref: 007F1648
                                                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,007F11D9), ref: 007F164F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentOpenProcessThreadToken
                                                          • String ID:
                                                          • API String ID: 3974789173-0
                                                          • Opcode ID: 91b8be9903b4e6eec883f4c7fe3444f20e2dbbf75ab3179d2539d724dff2583c
                                                          • Instruction ID: 8ae857bfc7ca525678e06b5106d195f85112775f79470164ab3b858658559435
                                                          • Opcode Fuzzy Hash: 91b8be9903b4e6eec883f4c7fe3444f20e2dbbf75ab3179d2539d724dff2583c
                                                          • Instruction Fuzzy Hash: A9E0E671601211DBD7301FA19D0DB6A7B7CFF55791F14C818F745DA090DA784446C754
                                                          APIs
                                                          • GetDesktopWindow.USER32 ref: 007ED858
                                                          • GetDC.USER32(00000000), ref: 007ED862
                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 007ED882
                                                          • ReleaseDC.USER32(?), ref: 007ED8A3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: 6d737f29e1ee93a1dbe5f819c0542a82054ea8f905a06b2475c813938890e402
                                                          • Instruction ID: 7dc18fd9b4e662c75f8986f0b97e0a18407046fa0765d73edf094ec7b88e2ef7
                                                          • Opcode Fuzzy Hash: 6d737f29e1ee93a1dbe5f819c0542a82054ea8f905a06b2475c813938890e402
                                                          • Instruction Fuzzy Hash: 3EE01AB1800204DFCF619FA0D80C67DBBB2FB18710F14C009F806E7250D7384942AF40
                                                          APIs
                                                          • GetDesktopWindow.USER32 ref: 007ED86C
                                                          • GetDC.USER32(00000000), ref: 007ED876
                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 007ED882
                                                          • ReleaseDC.USER32(?), ref: 007ED8A3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: 4709104586180d889febfd370e1e110ea3b7dd635c32141a068c587c2ffa7e75
                                                          • Instruction ID: 26318164d91b549577329d7ffa8b5a8e68778aed791330b2f99100973c68a6da
                                                          • Opcode Fuzzy Hash: 4709104586180d889febfd370e1e110ea3b7dd635c32141a068c587c2ffa7e75
                                                          • Instruction Fuzzy Hash: A6E092B5C00204EFCF61AFA0D80C66EBBB6FB58711B149449F94AE7250DB385902AF90
                                                          APIs
                                                            • Part of subcall function 00797620: _wcslen.LIBCMT ref: 00797625
                                                          • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00804ED4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Connection_wcslen
                                                          • String ID: *$LPT
                                                          • API String ID: 1725874428-3443410124
                                                          • Opcode ID: 84b7a55cdd11542044bfc65dd73daca297cf091bf4e2ba6f80d8a8b7495c1aef
                                                          • Instruction ID: 7f2dd9ff25f8f9d5d444f28604d637ffcd86b4f8b31426f700451e023d25b605
                                                          • Opcode Fuzzy Hash: 84b7a55cdd11542044bfc65dd73daca297cf091bf4e2ba6f80d8a8b7495c1aef
                                                          • Instruction Fuzzy Hash: E5915EB5A04205DFCB54DF54C884EAABBF1FF44304F159099E90A9B3A2CB35ED85CB91
                                                          APIs
                                                          • __startOneArgErrorHandling.LIBCMT ref: 007BE30D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorHandling__start
                                                          • String ID: pow
                                                          • API String ID: 3213639722-2276729525
                                                          • Opcode ID: 68936689cbb8b4e2b684cfa9c1b3b2e2432e773bba4b49791ebb556f56df96a8
                                                          • Instruction ID: 1b2470f50562bee5b3c8127742f9986658c23543adb2cdb64525791d99035a10
                                                          • Opcode Fuzzy Hash: 68936689cbb8b4e2b684cfa9c1b3b2e2432e773bba4b49791ebb556f56df96a8
                                                          • Instruction Fuzzy Hash: 6E512961A0C60296CB197714C945BFA3BE8BB50741F348D6CE096833A9EF3D8C95DE86
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: #
                                                          • API String ID: 0-1885708031
                                                          • Opcode ID: eb253bba222dc651e4e37b186e1c83610d7665dbd63806dbf99a16a45944bfd2
                                                          • Instruction ID: 1d441742a6b82f36fce7762cc61817deea475513ed6297e82074bdb61db0d636
                                                          • Opcode Fuzzy Hash: eb253bba222dc651e4e37b186e1c83610d7665dbd63806dbf99a16a45944bfd2
                                                          • Instruction Fuzzy Hash: 7F513435501286DFDF25DF29C485ABA7BA4FFAA310F248559FC919B2C0D63C9D42CBA0
                                                          APIs
                                                          • Sleep.KERNEL32(00000000), ref: 007AF2A2
                                                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 007AF2BB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: GlobalMemorySleepStatus
                                                          • String ID: @
                                                          • API String ID: 2783356886-2766056989
                                                          • Opcode ID: 6a53db1df7cfd15c2bd80e0a95e5d9d18e95bca14c3d83f5797eccd01f3c88e6
                                                          • Instruction ID: 64da553f5b4a3ee07643f61f6f5067a6f3013538241bf21f043bb36a76c79113
                                                          • Opcode Fuzzy Hash: 6a53db1df7cfd15c2bd80e0a95e5d9d18e95bca14c3d83f5797eccd01f3c88e6
                                                          • Instruction Fuzzy Hash: BA516772418744DBDB20AF14EC8ABAFBBF8FB85300F81885CF1D941095EB748569CB66
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 008157E0
                                                          • _wcslen.LIBCMT ref: 008157EC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper_wcslen
                                                          • String ID: CALLARGARRAY
                                                          • API String ID: 157775604-1150593374
                                                          • Opcode ID: 411eae235b4bb56cba84710a75e365ac1ae1453e00f249df7e4819715963405f
                                                          • Instruction ID: f71176ef81a41e9b5ac0c537e10ef4d6f5562707acd245e556f585c354258f19
                                                          • Opcode Fuzzy Hash: 411eae235b4bb56cba84710a75e365ac1ae1453e00f249df7e4819715963405f
                                                          • Instruction Fuzzy Hash: 76418C31A00209DFCB14DFA9C8869FEBBB9FF99724F104169E505E7291E7349D81CBA0
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 0080D130
                                                          • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0080D13A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CrackInternet_wcslen
                                                          • String ID: |
                                                          • API String ID: 596671847-2343686810
                                                          • Opcode ID: 8e41848927b717492749ab17e87c1199ca0f40206e90b1c11b264b192c72f8db
                                                          • Instruction ID: 819c1fef96cca6512c7fd9359c783528300538ab935c47c8cd7ea8cea3c118b9
                                                          • Opcode Fuzzy Hash: 8e41848927b717492749ab17e87c1199ca0f40206e90b1c11b264b192c72f8db
                                                          • Instruction Fuzzy Hash: 22311971D00209EBCF15EFA4DC89AEEBFB9FF04340F000119F815A6162EB35AA06CB60
                                                          APIs
                                                          • DestroyWindow.USER32(?,?,?,?), ref: 00823621
                                                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0082365C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$DestroyMove
                                                          • String ID: static
                                                          • API String ID: 2139405536-2160076837
                                                          • Opcode ID: 9d6e741baf29a05a43986afe71400cc041b0b31020e01460cb2c70eacdc7d212
                                                          • Instruction ID: 56420c82864c857ae2b3a5e9274d8d6900e80c78e796ffc51634dd90d313c317
                                                          • Opcode Fuzzy Hash: 9d6e741baf29a05a43986afe71400cc041b0b31020e01460cb2c70eacdc7d212
                                                          • Instruction Fuzzy Hash: CD318F71110614AEDB209F28EC90EBB73A9FF98724F109619F8A5D7280DA35AD91D760
                                                          APIs
                                                          • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 0082461F
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00824634
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: '
                                                          • API String ID: 3850602802-1997036262
                                                          • Opcode ID: 5593837eb5513ffd4989385c3a9ec41e4b2ad9fd19c0fb5bc6e0bcd43cf98562
                                                          • Instruction ID: 00a4964598df136835bd8056418354f97085762d4c5b93b0dbb258c25dbe20e2
                                                          • Opcode Fuzzy Hash: 5593837eb5513ffd4989385c3a9ec41e4b2ad9fd19c0fb5bc6e0bcd43cf98562
                                                          • Instruction Fuzzy Hash: 2B313874A0121A9FDF14CFA9D981BDABBB5FF19300F14506AE904EB381D771A981CFA0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0082327C
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00823287
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: Combobox
                                                          • API String ID: 3850602802-2096851135
                                                          • Opcode ID: 3cfa0041a918a5a84baa68a3b33a1a6295e4f56a32f6f3dfa058fc5b6e0ed017
                                                          • Instruction ID: c19874b9e845657c378395590919058a9fa0ed8f2f6f18c519255929f67e5c80
                                                          • Opcode Fuzzy Hash: 3cfa0041a918a5a84baa68a3b33a1a6295e4f56a32f6f3dfa058fc5b6e0ed017
                                                          • Instruction Fuzzy Hash: 1111E271300218BFEF219E54EC94EBB3B6AFB943A5F104129F918E7290D6399D918760
                                                          APIs
                                                            • Part of subcall function 0079600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0079604C
                                                            • Part of subcall function 0079600E: GetStockObject.GDI32(00000011), ref: 00796060
                                                            • Part of subcall function 0079600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0079606A
                                                          • GetWindowRect.USER32(00000000,?), ref: 0082377A
                                                          • GetSysColor.USER32(00000012), ref: 00823794
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                          • String ID: static
                                                          • API String ID: 1983116058-2160076837
                                                          • Opcode ID: 1c945fd04aab8e2b4e9d8741cad16498faf273975c60a9be3dd92ff05f55250d
                                                          • Instruction ID: 476b28e78ee812caa609133232d2c1193d0176faa6232ea4b352e42abfd08d30
                                                          • Opcode Fuzzy Hash: 1c945fd04aab8e2b4e9d8741cad16498faf273975c60a9be3dd92ff05f55250d
                                                          • Instruction Fuzzy Hash: 9B1129B2610219AFDF10DFA8DC45EFE7BB9FB08314F004525F955E2250E779E8519B50
                                                          APIs
                                                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0080CD7D
                                                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0080CDA6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Internet$OpenOption
                                                          • String ID: <local>
                                                          • API String ID: 942729171-4266983199
                                                          • Opcode ID: 56501e12a4de5330303eebd0b2567d867b346eb86ef16b5e1e94dba6158479e6
                                                          • Instruction ID: c4d8fc1b5ae6d607e762ea3716b5fcb2d30cda9e23fd6c55dccafe2774fa3dd3
                                                          • Opcode Fuzzy Hash: 56501e12a4de5330303eebd0b2567d867b346eb86ef16b5e1e94dba6158479e6
                                                          • Instruction Fuzzy Hash: A311A371215635BED7B44F668C45EF7BE69FF127A4F004326B909C31C0E6649845D6F0
                                                          APIs
                                                          • GetWindowTextLengthW.USER32(00000000), ref: 008234AB
                                                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 008234BA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: LengthMessageSendTextWindow
                                                          • String ID: edit
                                                          • API String ID: 2978978980-2167791130
                                                          • Opcode ID: 5eeff508d21d567d826de16ae7ebf24370f7bf8f83bd527ebac3b436e0195417
                                                          • Instruction ID: 138c8761fc68c0d632bb9d0219267a30d46d8ce6b1569f8f5c403058d54a5ab8
                                                          • Opcode Fuzzy Hash: 5eeff508d21d567d826de16ae7ebf24370f7bf8f83bd527ebac3b436e0195417
                                                          • Instruction Fuzzy Hash: 4411BF71100128ABEF216E64EC54ABB3B6AFB24378F504364FA60D31D0C779DD919B68
                                                          APIs
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                          • CharUpperBuffW.USER32(?,?,?), ref: 007F6CB6
                                                          • _wcslen.LIBCMT ref: 007F6CC2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharUpper
                                                          • String ID: STOP
                                                          • API String ID: 1256254125-2411985666
                                                          • Opcode ID: 4ddc2e1e09125ad1a425e2deafaaf2de7ff81d266a650836538402331de8596d
                                                          • Instruction ID: 683588fcbf434ca7dcb0ce7d18724b8cca4c0c02ccb85b24b4dbc8873c352235
                                                          • Opcode Fuzzy Hash: 4ddc2e1e09125ad1a425e2deafaaf2de7ff81d266a650836538402331de8596d
                                                          • Instruction Fuzzy Hash: 2501263270052A9BCF20AFFDDC949BF73B4FB617107000528EAA293295EB39E804C660
                                                          APIs
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                            • Part of subcall function 007F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007F3CCA
                                                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 007F1D4C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: 987b66fe8dab1d1b01e25c3d730787f7c4d520ff8b561a203721219e4eecb3a5
                                                          • Instruction ID: a35a45f7ea954f98d71f5aab71628208fe3f5dd06029c01a09aac447cb2ea2de
                                                          • Opcode Fuzzy Hash: 987b66fe8dab1d1b01e25c3d730787f7c4d520ff8b561a203721219e4eecb3a5
                                                          • Instruction Fuzzy Hash: 4301B571701218EB9F14EBA4DC59CFE73B8FB56360F44091EAA32673D1EA395908C670
                                                          APIs
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                            • Part of subcall function 007F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007F3CCA
                                                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 007F1C46
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: a0e2ec4efed4c1f733741d271993e225e0500ae417df8ee5e40d56c34b32ab53
                                                          • Instruction ID: 79cd98f64539424afc9bc0ed86f27c75d21b319ef23002e7c6b929eab789810a
                                                          • Opcode Fuzzy Hash: a0e2ec4efed4c1f733741d271993e225e0500ae417df8ee5e40d56c34b32ab53
                                                          • Instruction Fuzzy Hash: B901A77568110CE6DF14EBA4DD69DFF77A89B12340F54001DAA16773C1EA289E0CC6B1
                                                          APIs
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                            • Part of subcall function 007F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007F3CCA
                                                          • SendMessageW.USER32(?,00000182,?,00000000), ref: 007F1CC8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: 57180678dbd98f1fc99445c4eeaf7f950ba1e2458cce5e9a679ba180bec5c6e2
                                                          • Instruction ID: 1797e5b7f96d57c8e21981343347e23c1b86737cdf9b2e5877a69474f7a17720
                                                          • Opcode Fuzzy Hash: 57180678dbd98f1fc99445c4eeaf7f950ba1e2458cce5e9a679ba180bec5c6e2
                                                          • Instruction Fuzzy Hash: E001DB71A4011CE7DF14EBA5DE15EFE77A8AB11340F540019BA1273381EA299F08C671
                                                          APIs
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                            • Part of subcall function 007F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007F3CCA
                                                          • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 007F1DD3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: 4b4245cf5c396a72b579ff53d773c37ff02c3494e78ab9149069ba5f01eadd10
                                                          • Instruction ID: 230cd29f0aa3690de7c6681ab96e2c4ab472052c994f3b3bc53db75dc6be913a
                                                          • Opcode Fuzzy Hash: 4b4245cf5c396a72b579ff53d773c37ff02c3494e78ab9149069ba5f01eadd10
                                                          • Instruction Fuzzy Hash: FDF0A971B41218E6DF14E7A5DC59EFE7778AB02350F44091DBA32633C1DA685908C271
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: 3, 3, 16, 1
                                                          • API String ID: 176396367-3042988571
                                                          • Opcode ID: 2e0b1b8745d89c07aa5c8dc4e0b259426896168835ef83008eeb3fa94c415ec1
                                                          • Instruction ID: 7eaeed67d993a5841a7449fc8971d7b5067847596be7aad9b0a49975ab4573cb
                                                          • Opcode Fuzzy Hash: 2e0b1b8745d89c07aa5c8dc4e0b259426896168835ef83008eeb3fa94c415ec1
                                                          • Instruction Fuzzy Hash: 71E02B422042206093311279ACC5AFF569DEFC97A0714182FF981C2267EA989DD193A5
                                                          APIs
                                                          • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 007F0B23
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Message
                                                          • String ID: AutoIt$Error allocating memory.
                                                          • API String ID: 2030045667-4017498283
                                                          • Opcode ID: 0f2026b6baee4413c99f9225859528f4ee9b20a68b71408feffd089e0408421f
                                                          • Instruction ID: cb4acf06fea1841e82f6a5cd4c2f9b54c95ac680113d91c675999978849da1cf
                                                          • Opcode Fuzzy Hash: 0f2026b6baee4413c99f9225859528f4ee9b20a68b71408feffd089e0408421f
                                                          • Instruction Fuzzy Hash: 29E0D831244318AAD22036D47C07F9D7AC4DF05B51F100466FB58956C38AE9649006E9
                                                          APIs
                                                            • Part of subcall function 007AF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,007B0D71,?,?,?,0079100A), ref: 007AF7CE
                                                          • IsDebuggerPresent.KERNEL32(?,?,?,0079100A), ref: 007B0D75
                                                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0079100A), ref: 007B0D84
                                                          Strings
                                                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 007B0D7F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                          • API String ID: 55579361-631824599
                                                          • Opcode ID: c7c9c8787d553fd1690e14eaa90b8c720391bcb72139990ca5c0db59b0318963
                                                          • Instruction ID: 0f444fe215b3e5e9297a2355cdfc3fc98f3384fd4cddb92ccb103d491989860f
                                                          • Opcode Fuzzy Hash: c7c9c8787d553fd1690e14eaa90b8c720391bcb72139990ca5c0db59b0318963
                                                          • Instruction Fuzzy Hash: 4AE039742003118BD7309FA8E4083967BF0FB00740F018A2DE482C6692DBB8E485CBD1
                                                          APIs
                                                          • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 0080302F
                                                          • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00803044
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Temp$FileNamePath
                                                          • String ID: aut
                                                          • API String ID: 3285503233-3010740371
                                                          • Opcode ID: bc7e20b08accb3c677a1653666d00bccb1597611aa0965d274a725b6a4fbdccc
                                                          • Instruction ID: 1112bb476bc0119a6db6099ebff125cb221dd4474c45e91966fe3c56f41f8ca9
                                                          • Opcode Fuzzy Hash: bc7e20b08accb3c677a1653666d00bccb1597611aa0965d274a725b6a4fbdccc
                                                          • Instruction Fuzzy Hash: 7BD05E72500328A7DA30A7A4AC0EFDB3B6CEB04751F4002A1BA55E2091EEB49985CAD0
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: LocalTime
                                                          • String ID: %.3d$X64
                                                          • API String ID: 481472006-1077770165
                                                          • Opcode ID: 1f1483404cc33f1dbd66dacf2565b29f4fa8a804c2e90d909f912d3828b7662f
                                                          • Instruction ID: 024f023edb2cb0e06106a9e3ab918785cddcfe0e37c986ad8b78773d6d103d26
                                                          • Opcode Fuzzy Hash: 1f1483404cc33f1dbd66dacf2565b29f4fa8a804c2e90d909f912d3828b7662f
                                                          • Instruction Fuzzy Hash: E3D012A180A148E9CB7097E1DD498BAB37CFB4D341F508452FA16E1040D62CCD086761
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0082232C
                                                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0082233F
                                                            • Part of subcall function 007FE97B: Sleep.KERNEL32 ref: 007FE9F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: 36007830800275cc06a0169619c0c4e48e04680b6c68c60c7c94045046c05542
                                                          • Instruction ID: 171d1e66da8aa8da75d4195de7836ff97b3e12d8dd9e8da2b47a63ede3f65305
                                                          • Opcode Fuzzy Hash: 36007830800275cc06a0169619c0c4e48e04680b6c68c60c7c94045046c05542
                                                          • Instruction Fuzzy Hash: EBD0A932390300B6E2B4AB309C0FFEA6A04BB00B00F008A167705AA2E0C8F4A8028A10
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0082236C
                                                          • PostMessageW.USER32(00000000), ref: 00822373
                                                            • Part of subcall function 007FE97B: Sleep.KERNEL32 ref: 007FE9F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: 4804e7bb71a4d1d427ea56754c6355f809b068711b7b92750428e03e46a45e08
                                                          • Instruction ID: ce53e60186df15dd93e3dfe62d3df5e96b13a2decb46665d0ebaa99cfd6bbc2b
                                                          • Opcode Fuzzy Hash: 4804e7bb71a4d1d427ea56754c6355f809b068711b7b92750428e03e46a45e08
                                                          • Instruction Fuzzy Hash: 34D0C932391710BAE6B4AB709C0FFDA6615BB14B11F408A167755EA2E0D9F4B8068A54
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 007CBE93
                                                          • GetLastError.KERNEL32 ref: 007CBEA1
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 007CBEFC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1667043483.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.1667028712.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667495185.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667568625.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1667583583.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$ErrorLast
                                                          • String ID:
                                                          • API String ID: 1717984340-0
                                                          • Opcode ID: a7c5839a6a6a3a2c645723a44979097a3b68f6dacc785474cefd3bfae193a3c2
                                                          • Instruction ID: f2a073a2eae75c8ba818b7af1c5a280cbd7290c4f3304bacf9e2b5088783a8a7
                                                          • Opcode Fuzzy Hash: a7c5839a6a6a3a2c645723a44979097a3b68f6dacc785474cefd3bfae193a3c2
                                                          • Instruction Fuzzy Hash: BB41D235600216EFDF218FA5CC8AFBE7BA5AF41720F14416DF9599B2A1DB388D05CB60