Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1523818
MD5:6f2531641192fca92cb3f1de7713c3ad
SHA1:9e90e3873d853c6cc8b1671011982bf1eb4ce52d
SHA256:3f81da9b41afd6e4a1a4a0307876771cd2d565d4d049557d84f6bc255418eaca
Tags:exeuser-Bitsight
Infos:

Detection

Credential Flusher
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Credential Flusher
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Enables debug privileges
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • file.exe (PID: 6216 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 6F2531641192FCA92CB3F1DE7713C3AD)
    • taskkill.exe (PID: 6232 cmdline: taskkill /F /IM chrome.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 6444 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • chrome.exe (PID: 2024 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
      • chrome.exe (PID: 1588 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=2132,i,4500856115818636558,18326832539678006832,262144 /prefetch:8 MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
      • chrome.exe (PID: 7904 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5140 --field-trial-handle=2132,i,4500856115818636558,18326832539678006832,262144 /prefetch:8 MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
      • chrome.exe (PID: 7912 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=2132,i,4500856115818636558,18326832539678006832,262144 /prefetch:8 MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: file.exe PID: 6216JoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: file.exeReversingLabs: Detection: 13%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
    Source: file.exeJoe Sandbox ML: detected
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 173.222.162.64:443 -> 192.168.2.6:49761 version: TLS 1.0
    Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:49717 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.6:49726 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.6:49728 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:49743 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.6:49757 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:49765 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:49766 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.6:49770 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:49773 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:49779 version: TLS 1.2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0081DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0081DBBE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007EC2A2 FindFirstFileExW,0_2_007EC2A2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008268EE FindFirstFileW,FindClose,0_2_008268EE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0082698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0082698F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0081D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0081D076
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0081D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0081D3A9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00829642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00829642
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0082979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0082979D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00829B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00829B2B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00825C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00825C97
    Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
    Source: Joe Sandbox ViewJA3 fingerprint: 1138de370e523e824bbca92d049a3777
    Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
    Source: unknownHTTPS traffic detected: 173.222.162.64:443 -> 192.168.2.6:49761 version: TLS 1.0
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
    Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
    Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
    Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
    Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
    Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
    Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
    Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
    Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
    Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
    Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
    Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
    Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
    Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
    Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
    Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
    Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
    Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
    Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0082CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_0082CE44
    Source: global trafficHTTP traffic detected: GET /account?=https://accounts.google.com/v3/signin/challenge/pwd HTTP/1.1Host: youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlKHLAQj6mM0BCIWgzQEI3L3NAQiPys0BCLnKzQEI6dLNAQjo1c0BCMvWzQEIqNjNAQj5wNQVGLrSzQEY642lFw==Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1Host: www.youtube.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlKHLAQj6mM0BCIWgzQEI3L3NAQiPys0BCLnKzQEI6dLNAQjo1c0BCMvWzQEIqNjNAQj5wNQVGLrSzQEY642lFw==Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentsec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
    Source: global trafficHTTP traffic detected: GET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=1216272960&timestamp=1727839267352 HTTP/1.1Host: accounts.youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-full-version: "117.0.5938.134"sec-ch-ua-arch: "x86"sec-ch-ua-platform: "Windows"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-model: ""sec-ch-ua-bitness: "64"sec-ch-ua-wow64: ?0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlKHLAQj6mM0BCIWgzQEI3L3NAQiPys0BCLnKzQEI6dLNAQjo1c0BCMvWzQEIqNjNAQj5wNQVGLrSzQEY642lFw==Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-Dest: iframeReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: www.google.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"sec-ch-ua-full-version: "117.0.5938.134"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlKHLAQj6mM0BCIWgzQEI3L3NAQiPys0BCLnKzQEI6dLNAQjo1c0BCMvWzQEIqNjNAQj5wNQVGLrSzQEY642lFw==Sec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=ZuwdNuSvWpCmchb&MD=Vrk6OwWM HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
    Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=ZuwdNuSvWpCmchb&MD=Vrk6OwWM HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
    Source: chromecache_84.6.drString found in binary or memory: _.fq(p)+"/familylink/privacy/notice/embedded?langCountry="+_.fq(p);break;case "PuZJUb":a+="https://www.youtube.com/t/terms?chromeless=1&hl="+_.fq(m);break;case "fxTQxb":a+="https://youtube.com/t/terms?gl="+_.fq(_.oq(c))+"&hl="+_.fq(d)+"&override_hl=1"+(f?"&linkless=1":"");break;case "prAmvd":a+="https://www.google.com/intl/"+_.fq(m)+"/chromebook/termsofservice.html?languageCode="+_.fq(d)+"&regionCode="+_.fq(c);break;case "NfnTze":a+="https://policies.google.com/privacy/google-partners"+(f?"/embedded": equals www.youtube.com (Youtube)
    Source: global trafficDNS traffic detected: DNS query: youtube.com
    Source: global trafficDNS traffic detected: DNS query: www.youtube.com
    Source: global trafficDNS traffic detected: DNS query: www.google.com
    Source: global trafficDNS traffic detected: DNS query: accounts.youtube.com
    Source: global trafficDNS traffic detected: DNS query: play.google.com
    Source: unknownHTTP traffic detected: POST /log?format=json&hasfast=true&authuser=0 HTTP/1.1Host: play.google.comConnection: keep-aliveContent-Length: 519sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"Content-Type: application/x-www-form-urlencoded;charset=UTF-8sec-ch-ua-full-version: "117.0.5938.134"sec-ch-ua-platform-version: "10.0.0"X-Goog-AuthUser: 0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: */*Origin: https://accounts.google.comX-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlKHLAQj6mM0BCIWgzQEI3L3NAQiPys0BCLnKzQEI6dLNAQjo1c0BCMvWzQEIqNjNAQj5wNQVGLrSzQEY642lFw==Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: file.exe, 00000000.00000003.2145785951.0000000001769000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2145857365.000000000176C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2146691347.000000000176E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.gLNz
    Source: chromecache_84.6.drString found in binary or memory: https://accounts.google.com
    Source: chromecache_84.6.drString found in binary or memory: https://accounts.google.com/TOS?loc=
    Source: file.exe, 00000000.00000003.2145785951.0000000001769000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2145857365.000000000176C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2146691347.000000000176E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/challenge/pwd
    Source: file.exe, 00000000.00000002.2146498743.0000000001738000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/challenge/pwds
    Source: chromecache_90.6.drString found in binary or memory: https://apis.google.com/js/api.js
    Source: chromecache_84.6.drString found in binary or memory: https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage
    Source: chromecache_84.6.drString found in binary or memory: https://families.google.com/intl/
    Source: chromecache_90.6.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/drive_2020q4/v10/192px.svg
    Source: chromecache_90.6.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/gmail_2020q4/v10/web-48dp/logo_gmail_2020q4_color_2x_web_
    Source: chromecache_90.6.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/maps/v7/192px.svg
    Source: chromecache_84.6.drString found in binary or memory: https://g.co/recover
    Source: chromecache_84.6.drString found in binary or memory: https://play.google.com/log?format=json&hasfast=true
    Source: chromecache_84.6.drString found in binary or memory: https://play.google.com/work/enroll?identifier=
    Source: chromecache_84.6.drString found in binary or memory: https://play.google/intl/
    Source: chromecache_84.6.drString found in binary or memory: https://policies.google.com/privacy
    Source: chromecache_84.6.drString found in binary or memory: https://policies.google.com/privacy/additional
    Source: chromecache_84.6.drString found in binary or memory: https://policies.google.com/privacy/google-partners
    Source: chromecache_84.6.drString found in binary or memory: https://policies.google.com/technologies/cookies
    Source: chromecache_84.6.drString found in binary or memory: https://policies.google.com/technologies/location-data
    Source: chromecache_84.6.drString found in binary or memory: https://policies.google.com/terms
    Source: chromecache_84.6.drString found in binary or memory: https://policies.google.com/terms/location
    Source: chromecache_84.6.drString found in binary or memory: https://policies.google.com/terms/service-specific
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-email-pin.gif
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-password.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-or-voice-pin.gif
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-pin.gif
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-stop-go-landing-page_1x.png
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/animation/
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_device.png
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_pin.png
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync.png
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_1x.png
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_2x.png
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_darkmode_1x.png
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/continue_on_your_phone.png
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_phone_number_verification.png
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_silent_tap_yes_darkmode.gif
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes.gif
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes_darkmode.gif
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_dark_v2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_v2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_not_ready.png
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_1.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_dark_1.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_1.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_darkmode_1.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_1.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_darkmode_1.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_created.png
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_full_house.png
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_1.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_darkmode_1.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_1.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_darkmode_1.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_1.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_darkmode_1.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_stop.png
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/personalization_reminders.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/phone_number_sign_in_2x.png
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key.gif
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_ios_center.png
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_laptop.gif
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered.gif
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered_darkmode.gif
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_phone.gif
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_ios.gif
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_pulldown.gif
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_tapyes.gif
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/smart_lock_2x.png
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/usb_key.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/web_and_app_activity.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/who_will_be_using_this_device.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/you_tube_history.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/gmail_ios_authzen.gif
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/paaskey.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_light.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/screenlock.png
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_ipad.gif
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone.gif
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_nfc.gif
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_usb.gif
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_phone.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_keys.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/loading_spinner_gm.gif
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/progress_spinner_color_20dp_4x.gif
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/success-gm-default_2x.png
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/apps/signup/resources/custom-email-address.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/images/hpp/shield_security_checkup_green_2x_web_96dp.png
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_dark_1.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_v1.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_dark_v1.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_v1.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_dark_v1.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_v1.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_confirmation.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_0.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_dark_0.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_dark_2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_dark_2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_dark_2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_dark_2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_dark_3.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_1.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_dark_1.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_1.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_dark_1.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_dark_2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_1.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_dark_1.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_dark_2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_dark_v2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_v2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set_darkmode.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_v2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_dark_v2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_v2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space.png
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space_dark.png
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2_dark.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess.svg
    Source: chromecache_90.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess_dark.svg
    Source: chromecache_84.6.drString found in binary or memory: https://support.google.com/accounts?hl=
    Source: chromecache_84.6.drString found in binary or memory: https://support.google.com/accounts?p=new-si-ui
    Source: chromecache_84.6.drString found in binary or memory: https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072
    Source: chromecache_90.6.drString found in binary or memory: https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=
    Source: chromecache_84.6.drString found in binary or memory: https://www.google.com
    Source: chromecache_84.6.drString found in binary or memory: https://www.google.com/intl/
    Source: chromecache_90.6.drString found in binary or memory: https://www.gstatic.com/accounts/speedbump/authzen_optin_illustration.gif
    Source: chromecache_90.6.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/chrome_48dp.png
    Source: chromecache_90.6.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/googleg_48dp.png
    Source: chromecache_90.6.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/gsa_48dp.png
    Source: chromecache_90.6.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/play_prism_48dp.png
    Source: chromecache_90.6.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/youtube_48dp.png
    Source: chromecache_84.6.drString found in binary or memory: https://www.gstatic.com/images/branding/productlogos/googleg/v6/36px.svg
    Source: chromecache_84.6.drString found in binary or memory: https://www.youtube.com/t/terms?chromeless=1&hl=
    Source: file.exe, 00000000.00000003.2124611910.0000000000FC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
    Source: chromecache_84.6.drString found in binary or memory: https://youtube.com/t/terms?gl=
    Source: file.exe, 00000000.00000003.2145785951.0000000001769000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2145857365.000000000176C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2146691347.000000000176E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.comSNs
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
    Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
    Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
    Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
    Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
    Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
    Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
    Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
    Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
    Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
    Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
    Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
    Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
    Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:49717 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.6:49726 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.6:49728 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:49743 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.6:49757 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:49765 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:49766 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.6:49770 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:49773 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:49779 version: TLS 1.2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0082EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0082EAFF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0082ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0082ED6A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0082EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0082EAFF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0081AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_0081AA57
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00849576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00849576

    System Summary

    barindex
    Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
    Source: file.exe, 00000000.00000000.2110568132.0000000000872000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_d591a478-2
    Source: file.exe, 00000000.00000000.2110568132.0000000000872000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_2e27f3f6-a
    Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_15d1998c-d
    Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_07541852-4
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0081D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_0081D5EB
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00811201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00811201
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0081E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0081E8F6
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B80600_2_007B8060
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008220460_2_00822046
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008182980_2_00818298
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007EE4FF0_2_007EE4FF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007E676B0_2_007E676B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008448730_2_00844873
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007BCAF00_2_007BCAF0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007DCAA00_2_007DCAA0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007CCC390_2_007CCC39
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007E6DD90_2_007E6DD9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007CB1190_2_007CB119
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B91C00_2_007B91C0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007D13940_2_007D1394
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007D781B0_2_007D781B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007C997D0_2_007C997D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B79200_2_007B7920
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007D7A4A0_2_007D7A4A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007D7CA70_2_007D7CA7
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007E9EEE0_2_007E9EEE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0083BE440_2_0083BE44
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 007CF9F2 appears 40 times
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 007D0A30 appears 46 times
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 007B9CB3 appears 31 times
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: classification engineClassification label: mal72.troj.evad.winEXE@40/30@12/8
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008237B5 GetLastError,FormatMessageW,0_2_008237B5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008110BF AdjustTokenPrivileges,CloseHandle,0_2_008110BF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008116C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_008116C3
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008251CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_008251CD
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0083A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0083A67C
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0082648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_0082648E
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_007B42A2
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6444:120:WilError_03
    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: file.exeReversingLabs: Detection: 13%
    Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=2132,i,4500856115818636558,18326832539678006832,262144 /prefetch:8
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5140 --field-trial-handle=2132,i,4500856115818636558,18326832539678006832,262144 /prefetch:8
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=2132,i,4500856115818636558,18326832539678006832,262144 /prefetch:8
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobarsJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=2132,i,4500856115818636558,18326832539678006832,262144 /prefetch:8Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5140 --field-trial-handle=2132,i,4500856115818636558,18326832539678006832,262144 /prefetch:8Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=2132,i,4500856115818636558,18326832539678006832,262144 /prefetch:8Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007B42DE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007D0A76 push ecx; ret 0_2_007D0A89
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007CF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_007CF98E
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00841C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00841C41
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-95126
    Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.6 %
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0081DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0081DBBE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007EC2A2 FindFirstFileExW,0_2_007EC2A2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008268EE FindFirstFileW,FindClose,0_2_008268EE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0082698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0082698F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0081D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0081D076
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0081D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0081D3A9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00829642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00829642
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0082979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0082979D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00829B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00829B2B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00825C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00825C97
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007B42DE
    Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0082EAA2 BlockInput,0_2_0082EAA2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007E2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007E2622
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007B42DE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007D4CE8 mov eax, dword ptr fs:[00000030h]0_2_007D4CE8
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00810B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00810B62
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007E2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007E2622
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007D083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007D083F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007D09D5 SetUnhandledExceptionFilter,0_2_007D09D5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007D0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_007D0C21
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00811201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00811201
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F2BA5 KiUserCallbackDispatcher,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_007F2BA5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0081B226 SendInput,keybd_event,0_2_0081B226
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008322DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_008322DA
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00810B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00810B62
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00811663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00811663
    Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
    Source: file.exeBinary or memory string: Shell_TrayWnd
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007D0698 cpuid 0_2_007D0698
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00828195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00828195
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080D27A GetUserNameW,0_2_0080D27A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007EB952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_007EB952
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007B42DE

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 6216, type: MEMORYSTR
    Source: file.exeBinary or memory string: WIN_81
    Source: file.exeBinary or memory string: WIN_XP
    Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
    Source: file.exeBinary or memory string: WIN_XPe
    Source: file.exeBinary or memory string: WIN_VISTA
    Source: file.exeBinary or memory string: WIN_7
    Source: file.exeBinary or memory string: WIN_8

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 6216, type: MEMORYSTR
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00831204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00831204
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00831806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00831806
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire Infrastructure2
    Valid Accounts
    1
    Windows Management Instrumentation
    1
    DLL Side-Loading
    1
    Exploitation for Privilege Escalation
    2
    Disable or Modify Tools
    21
    Input Capture
    2
    System Time Discovery
    Remote Services1
    Archive Collected Data
    2
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault Accounts1
    Native API
    2
    Valid Accounts
    1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    LSASS Memory1
    Account Discovery
    Remote Desktop Protocol21
    Input Capture
    11
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
    Valid Accounts
    2
    Obfuscated Files or Information
    Security Account Manager1
    File and Directory Discovery
    SMB/Windows Admin Shares3
    Clipboard Data
    3
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
    Access Token Manipulation
    1
    DLL Side-Loading
    NTDS16
    System Information Discovery
    Distributed Component Object ModelInput Capture4
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
    Process Injection
    2
    Valid Accounts
    LSA Secrets12
    Security Software Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    Virtualization/Sandbox Evasion
    Cached Domain Credentials1
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
    Access Token Manipulation
    DCSync3
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
    Process Injection
    Proc Filesystem1
    Application Window Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
    System Owner/User Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1523818 Sample: file.exe Startdate: 02/10/2024 Architecture: WINDOWS Score: 72 34 Multi AV Scanner detection for submitted file 2->34 36 Yara detected Credential Flusher 2->36 38 Binary is likely a compiled AutoIt script file 2->38 40 2 other signatures 2->40 7 file.exe 2->7         started        process3 signatures4 42 Binary is likely a compiled AutoIt script file 7->42 44 Found API chain indicative of sandbox detection 7->44 10 chrome.exe 1 7->10         started        13 taskkill.exe 1 7->13         started        process5 dnsIp6 24 192.168.2.6, 443, 49704, 49705 unknown unknown 10->24 26 239.255.255.250 unknown Reserved 10->26 15 chrome.exe 10->15         started        18 chrome.exe 10->18         started        20 chrome.exe 6 10->20         started        22 conhost.exe 13->22         started        process7 dnsIp8 28 youtube-ui.l.google.com 142.250.181.238, 443, 49716 GOOGLEUS United States 15->28 30 www.google.com 142.250.184.228, 443, 49722, 49772 GOOGLEUS United States 15->30 32 6 other IPs or domains 15->32

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    file.exe13%ReversingLabs
    file.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    youtube-ui.l.google.com0%VirustotalBrowse
    www.google.com0%VirustotalBrowse
    youtube.com0%VirustotalBrowse
    accounts.youtube.com0%VirustotalBrowse
    www3.l.google.com0%VirustotalBrowse
    www.youtube.com0%VirustotalBrowse
    play.google.com0%VirustotalBrowse
    SourceDetectionScannerLabelLink
    https://play.google/intl/0%URL Reputationsafe
    https://families.google.com/intl/0%URL Reputationsafe
    https://policies.google.com/technologies/location-data0%URL Reputationsafe
    https://apis.google.com/js/api.js0%URL Reputationsafe
    https://policies.google.com/privacy/google-partners0%URL Reputationsafe
    https://policies.google.com/terms/service-specific0%URL Reputationsafe
    https://g.co/recover0%URL Reputationsafe
    https://policies.google.com/privacy/additional0%URL Reputationsafe
    https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=32850720%URL Reputationsafe
    https://policies.google.com/technologies/cookies0%URL Reputationsafe
    https://policies.google.com/terms0%URL Reputationsafe
    https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=0%URL Reputationsafe
    https://support.google.com/accounts?hl=0%URL Reputationsafe
    https://policies.google.com/terms/location0%URL Reputationsafe
    https://policies.google.com/privacy0%URL Reputationsafe
    https://support.google.com/accounts?p=new-si-ui0%URL Reputationsafe
    https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage0%URL Reputationsafe
    https://www.google.com/intl/1%VirustotalBrowse
    https://play.google.com/log?format=json&hasfast=true&authuser=00%VirustotalBrowse
    https://youtube.com/t/terms?gl=0%VirustotalBrowse
    https://play.google.com/work/enroll?identifier=0%VirustotalBrowse
    https://www.google.com0%VirustotalBrowse
    https://www.google.com/favicon.ico0%VirustotalBrowse
    https://www.youtube.com/t/terms?chromeless=1&hl=0%VirustotalBrowse
    https://play.google.com/log?format=json&hasfast=true0%VirustotalBrowse
    https://play.google.com/log?hasfast=true&authuser=0&format=json0%VirustotalBrowse
    NameIPActiveMaliciousAntivirus DetectionReputation
    youtube-ui.l.google.com
    142.250.181.238
    truefalseunknown
    www3.l.google.com
    142.250.74.206
    truefalseunknown
    play.google.com
    142.250.185.174
    truefalseunknown
    www.google.com
    142.250.184.228
    truefalseunknown
    youtube.com
    216.58.206.78
    truefalseunknown
    accounts.youtube.com
    unknown
    unknownfalseunknown
    www.youtube.com
    unknown
    unknownfalseunknown
    NameMaliciousAntivirus DetectionReputation
    https://play.google.com/log?format=json&hasfast=true&authuser=0falseunknown
    https://www.google.com/favicon.icofalseunknown
    https://play.google.com/log?hasfast=true&authuser=0&format=jsonfalseunknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://play.google/intl/chromecache_84.6.drfalse
    • URL Reputation: safe
    unknown
    https://families.google.com/intl/chromecache_84.6.drfalse
    • URL Reputation: safe
    unknown
    https://youtube.com/t/terms?gl=chromecache_84.6.drfalseunknown
    https://accounts.gLNzfile.exe, 00000000.00000003.2145785951.0000000001769000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2145857365.000000000176C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2146691347.000000000176E000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      https://policies.google.com/technologies/location-datachromecache_84.6.drfalse
      • URL Reputation: safe
      unknown
      https://www.google.com/intl/chromecache_84.6.drfalseunknown
      https://apis.google.com/js/api.jschromecache_90.6.drfalse
      • URL Reputation: safe
      unknown
      https://policies.google.com/privacy/google-partnerschromecache_84.6.drfalse
      • URL Reputation: safe
      unknown
      https://play.google.com/work/enroll?identifier=chromecache_84.6.drfalseunknown
      https://policies.google.com/terms/service-specificchromecache_84.6.drfalse
      • URL Reputation: safe
      unknown
      https://g.co/recoverchromecache_84.6.drfalse
      • URL Reputation: safe
      unknown
      https://policies.google.com/privacy/additionalchromecache_84.6.drfalse
      • URL Reputation: safe
      unknown
      https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072chromecache_84.6.drfalse
      • URL Reputation: safe
      unknown
      https://youtube.comSNsfile.exe, 00000000.00000003.2145785951.0000000001769000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2145857365.000000000176C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2146691347.000000000176E000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        https://policies.google.com/technologies/cookieschromecache_84.6.drfalse
        • URL Reputation: safe
        unknown
        https://policies.google.com/termschromecache_84.6.drfalse
        • URL Reputation: safe
        unknown
        https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=chromecache_90.6.drfalse
        • URL Reputation: safe
        unknown
        https://www.google.comchromecache_84.6.drfalseunknown
        https://play.google.com/log?format=json&hasfast=truechromecache_84.6.drfalseunknown
        https://www.youtube.com/t/terms?chromeless=1&hl=chromecache_84.6.drfalseunknown
        https://support.google.com/accounts?hl=chromecache_84.6.drfalse
        • URL Reputation: safe
        unknown
        https://policies.google.com/terms/locationchromecache_84.6.drfalse
        • URL Reputation: safe
        unknown
        https://policies.google.com/privacychromecache_84.6.drfalse
        • URL Reputation: safe
        unknown
        https://support.google.com/accounts?p=new-si-uichromecache_84.6.drfalse
        • URL Reputation: safe
        unknown
        https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessagechromecache_84.6.drfalse
        • URL Reputation: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        142.250.74.206
        www3.l.google.comUnited States
        15169GOOGLEUSfalse
        216.58.206.78
        youtube.comUnited States
        15169GOOGLEUSfalse
        142.250.181.238
        youtube-ui.l.google.comUnited States
        15169GOOGLEUSfalse
        239.255.255.250
        unknownReserved
        unknownunknownfalse
        142.250.185.174
        play.google.comUnited States
        15169GOOGLEUSfalse
        142.250.184.238
        unknownUnited States
        15169GOOGLEUSfalse
        142.250.184.228
        www.google.comUnited States
        15169GOOGLEUSfalse
        IP
        192.168.2.6
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1523818
        Start date and time:2024-10-02 05:20:06 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 5m 3s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:13
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:file.exe
        Detection:MAL
        Classification:mal72.troj.evad.winEXE@40/30@12/8
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 96%
        • Number of executed functions: 39
        • Number of non-executed functions: 309
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 172.217.16.131, 142.250.185.142, 142.251.173.84, 34.104.35.123, 172.217.18.10, 142.250.185.234, 216.58.212.138, 142.250.185.138, 216.58.206.42, 142.250.185.106, 142.250.186.42, 142.250.185.202, 216.58.206.74, 142.250.186.106, 142.250.185.170, 172.217.18.106, 142.250.185.74, 142.250.186.74, 172.217.16.202, 142.250.186.138, 142.250.185.163, 216.58.206.35, 142.250.186.170, 142.250.74.202, 142.250.184.234, 142.250.184.202, 142.250.181.234, 216.58.212.170, 172.217.16.138, 192.229.221.95, 2.19.126.137, 142.250.186.35, 74.125.206.84, 199.232.210.172, 142.250.186.46
        • Excluded domains from analysis (whitelisted): clients1.google.com, client.wns.windows.com, fs.microsoft.com, accounts.google.com, content-autofill.googleapis.com, slscr.update.microsoft.com, fonts.gstatic.com, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, ocsp.digicert.com, edgedl.me.gvt1.com, update.googleapis.com, clients.l.google.com, www.gstatic.com, optimizationguide-pa.googleapis.com
        • Not all processes where analyzed, report is missing behavior information
        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
        No simulations
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        239.255.255.250file.exeGet hashmaliciousCredential FlusherBrowse
          http://loglnmicrosoftonl365.Globalfoundries.vitoriorefrigeracao.com.br/excel/active/test@globalfoundries.comGet hashmaliciousUnknownBrowse
            file.exeGet hashmaliciousCredential FlusherBrowse
              http://lamourskinclinic.com.auGet hashmaliciousUnknownBrowse
                https://unpaidrefund.top/view/mygovGet hashmaliciousHTMLPhisherBrowse
                  file.exeGet hashmaliciousCredential FlusherBrowse
                    file.exeGet hashmaliciousCredential FlusherBrowse
                      file.exeGet hashmaliciousCredential FlusherBrowse
                        file.exeGet hashmaliciousCredential FlusherBrowse
                          http://tvsurf.jp/Get hashmaliciousUnknownBrowse
                            No context
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            1138de370e523e824bbca92d049a3777https://dvs.ntoinetted.com/kJthYXSER3TmsdtC7bAT5eXqQ/#geir@byggernfauske.noGet hashmaliciousHTMLPhisherBrowse
                            • 173.222.162.64
                            https://email.mg.pmctraining.com/c/eJwUzDGOhSAQANDTSCfBAQQL2n-PgRmUDaAh_E329hvbVzwKpJF3Ehw2B84ro50WV0j68CYB2SNnQrVvLloHPjtLjAq9KAFAJ7thXDVQWlEdcfVg82oOBTo6s9ucFqPaKZ-W5sDSSz9lupuogbhPrBkT10n4ooxjgU8jXuDzfeqNJJ_rESP8fLGXiXJw6ddd6S3_GnaczPIep_gN8B8AAP__bcA-LwGet hashmaliciousHTMLPhisherBrowse
                            • 173.222.162.64
                            https://swissquotech.com/swissquote-2024.zipGet hashmaliciousPhisherBrowse
                            • 173.222.162.64
                            file.exeGet hashmaliciousCredential FlusherBrowse
                            • 173.222.162.64
                            file.exeGet hashmaliciousUnknownBrowse
                            • 173.222.162.64
                            Swift_ach Complaints.sppgCQDM.htmlGet hashmaliciousHTMLPhisherBrowse
                            • 173.222.162.64
                            https://l.facebook.com/l.php?u=https%3A%2F%2Fglossydollyknock.com%2Fw4n3hka2p6%3Fkey%3D4adf7f60948fc97f20eb71a37f488b68%26fbclid%3DIwZXh0bgNhZW0CMTAAAR2sWCkriUyPdlHfdRTPbCt2g8yn2B0gn49apZn-9YDDT6mmSsMKBb63wBg_aem_LHXLb0b6XyEafa9vMdu15Q&h=AT3Q5pc4JYuZUEyX8rr8abFazLnrJX82c0Mzs4joBZygkyzWKVOG4MfAjLuQ9vGazIv4IV-N-QhihzSx2jrkeAjehZSm2YhcT1T0Hz7uxtZvtRIbuTkA_Am76OeQhuopaQ&__tn__=R%5D-R&c%5B0%5D=AT0B8CUrOUWDDhBkBSoY_sR_Q2IdaQRs5o-hIRLRUlMk669issrBSNbduA-V2UNVUT_XZ9QJcwePs_4iUMdBe8WDu2kbum__cQyKqnoqtSz4-dHASRwGlJAYUngRXsgxmoYUj9q1YNGw0-hNPPtRpfV-WyB5ptMMsMbm355vN9Vz8k6D9ZXB_vjILzh8k0OO_w_zawh-IINi5cndpF3-4aGCWeoOMMG3q1NB8mKT_pQljubmHEwtBLrB3RTViT2btvAGet hashmaliciousAnonymous ProxyBrowse
                            • 173.222.162.64
                            file.exeGet hashmaliciousUnknownBrowse
                            • 173.222.162.64
                            https://app.getresponse.com/change_details.html?x=a62b&m=BrgFNl&s=BW9rcZD&u=C3YQM&z=EMkQID6&pt=change_detailsGet hashmaliciousUnknownBrowse
                            • 173.222.162.64
                            file.exeGet hashmaliciousUnknownBrowse
                            • 173.222.162.64
                            28a2c9bd18a11de089ef85a160da29e4file.exeGet hashmaliciousCredential FlusherBrowse
                            • 52.165.165.26
                            • 184.28.90.27
                            http://loglnmicrosoftonl365.Globalfoundries.vitoriorefrigeracao.com.br/excel/active/test@globalfoundries.comGet hashmaliciousUnknownBrowse
                            • 52.165.165.26
                            • 184.28.90.27
                            file.exeGet hashmaliciousCredential FlusherBrowse
                            • 52.165.165.26
                            • 184.28.90.27
                            https://unpaidrefund.top/view/mygovGet hashmaliciousHTMLPhisherBrowse
                            • 52.165.165.26
                            • 184.28.90.27
                            file.exeGet hashmaliciousCredential FlusherBrowse
                            • 52.165.165.26
                            • 184.28.90.27
                            file.exeGet hashmaliciousCredential FlusherBrowse
                            • 52.165.165.26
                            • 184.28.90.27
                            file.exeGet hashmaliciousCredential FlusherBrowse
                            • 52.165.165.26
                            • 184.28.90.27
                            file.exeGet hashmaliciousCredential FlusherBrowse
                            • 52.165.165.26
                            • 184.28.90.27
                            http://tvsurf.jp/Get hashmaliciousUnknownBrowse
                            • 52.165.165.26
                            • 184.28.90.27
                            https://docs.google.com/forms/d/e/1FAIpQLSdpweVM1inxltc4AWxPatki3D8pgrAZSJz39loK6XS45S8Ubg/viewform?usp=pp_urlGet hashmaliciousUnknownBrowse
                            • 52.165.165.26
                            • 184.28.90.27
                            3b5074b1b5d032e5620f69f9f700ff0emitec_purchase_order_PDF (1).vbsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                            • 40.115.3.253
                            DHL Shipping documents 0020398484995500.exeGet hashmaliciousAgentTeslaBrowse
                            • 40.115.3.253
                            http://tvsurf.jp/Get hashmaliciousUnknownBrowse
                            • 40.115.3.253
                            https://files.constantcontact.com/2d77228b901/702368a5-3f96-4cb6-b61d-aab8728be1ff.pdfGet hashmaliciousUnknownBrowse
                            • 40.115.3.253
                            https://sanbernardinoscounty.telcom-info.com/Get hashmaliciousHtmlDropperBrowse
                            • 40.115.3.253
                            OXrZ6fj4Hq.exeGet hashmaliciousNeshta, Oski Stealer, StormKitty, SugarDump, Vidar, XWormBrowse
                            • 40.115.3.253
                            Pedido09669281099195.com.exeGet hashmaliciousDarkTortilla, QuasarBrowse
                            • 40.115.3.253
                            https://finalstepgetshere.com/uploads/beta9.zipGet hashmaliciousLummaCBrowse
                            • 40.115.3.253
                            https://k7qo.sarnerholz.cam/APRjVfmkGet hashmaliciousUnknownBrowse
                            • 40.115.3.253
                            origin.bin.exeGet hashmaliciousUnknownBrowse
                            • 40.115.3.253
                            No context
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (468)
                            Category:downloaded
                            Size (bytes):1858
                            Entropy (8bit):5.298162049824456
                            Encrypted:false
                            SSDEEP:48:o7vGoolL3ALFKphnpiu7xOKAcfO/3d/rYh4vZorw:o/QLUFUL4KA+2y0Mw
                            MD5:CE055F881BDAB4EF6C1C8AA4B3890348
                            SHA1:2671741A70E9F5B608F690AAEEA4972003747654
                            SHA-256:9B91C23691D6032CDFE28863E369624B2EDB033E1487A1D1BB0977E3590E5462
                            SHA-512:8A22250628985C2E570E6FBADFC0D5CB6753F0735130F9E74962A409476C2859C5C81F8A0F5C427A9F13ED399C8E251FA43FF67AD5F16860640D45E7A538E857
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=iAskyc,ziXSP"
                            Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("iAskyc");._.QZ=function(a){_.W.call(this,a.Fa);this.window=a.Ea.window.get();this.Nc=a.Ea.Nc};_.J(_.QZ,_.W);_.QZ.Ba=function(){return{Ea:{window:_.qu,Nc:_.DE}}};_.QZ.prototype.Po=function(){};_.QZ.prototype.addEncryptionRecoveryMethod=function(){};_.RZ=function(a){return(a==null?void 0:a.Jo)||function(){}};_.SZ=function(a){return(a==null?void 0:a.m3)||function(){}};_.GPb=function(a){return(a==null?void 0:a.Op)||function(){}};._.HPb=function(a){return new Map(Array.from(a,function(b){var c=_.n(b);b=c.next().value;c=c.next().value;return[b,c.map(function(d){return{epoch:d.epoch,key:new Uint8Array(d.key)}})]}))};_.IPb=function(a){setTimeout(function(){throw a;},0)};_.QZ.prototype.kO=function(){return!0};_.nu(_.An,_.QZ);._.l();._.k("ziXSP");.var j_=function(a){_.QZ.call(this,a.Fa)};_.J(j_,_.QZ);j_.Ba=_.QZ.Ba;j_.prototype.Po=function(a,b,c){var d;if((d=this.window.chrome)==nu
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (683)
                            Category:downloaded
                            Size (bytes):3131
                            Entropy (8bit):5.355381206612617
                            Encrypted:false
                            SSDEEP:48:o7FEEM3MtH15jNQ8jsK3rnw0dkckTrKEp/OqLE9xz0W5Bzv3M6hIHYA+JITbwrF8:oq675jOArwoAmI/DLaxNPL5m+m6w
                            MD5:E2A7251AD83A0D0634FEA2703D10ED07
                            SHA1:90D72011F31FC40D3DA3748F2817F90A29EB5C01
                            SHA-256:1079B49C4AAF5C10E4F2E6A086623F40D200A71FF2A1F64E88AA6C91E4BE7A6F
                            SHA-512:CD6D75580EA8BD97CF7C7C0E0BD9D9A54FB6EA7DF1DDB5A95E94D38B260F9EE1425C640839ECD229B8D01E145CF2786CA374D31EC537EB8FE17FF415D5B985F5
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ZwDk9d,RMhBfe"
                            Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("ZwDk9d");.var gA=function(a){_.W.call(this,a.Fa)};_.J(gA,_.W);gA.Ba=_.W.Ba;gA.prototype.eS=function(a){return _.Xe(this,{Xa:{gT:_.ll}}).then(function(b){var c=window._wjdd,d=window._wjdc;return!c&&d?new _.li(function(e){window._wjdc=function(f){d(f);e(ZJa(f,b,a))}}):ZJa(c,b,a)})};var ZJa=function(a,b,c){return(a=a&&a[c])?a:b.Xa.gT.eS(c)};.gA.prototype.aa=function(a,b){var c=_.Zra(b).Rj;if(c.startsWith("$")){var d=_.gm.get(a);_.uq[b]&&(d||(d={},_.gm.set(a,d)),d[c]=_.uq[b],delete _.uq[b],_.vq--);if(d)if(a=d[c])b=_.af(a);else throw Error("Jb`"+b);else b=null}else b=null;return b};_.nu(_.Lfa,gA);._.l();._.k("SNUn3");._.YJa=new _.pf(_.wg);._.l();._.k("RMhBfe");.var $Ja=function(a){var b=_.tq(a);return b?new _.li(function(c,d){var e=function(){b=_.tq(a);var f=_.Sfa(a,b);f?c(f.getAttribute("jsdata")):window.document.readyState=="complete"?(f=["Unable to find deferred jsdata wit
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                            Category:downloaded
                            Size (bytes):5430
                            Entropy (8bit):3.6534652184263736
                            Encrypted:false
                            SSDEEP:48:wIJct3xIAxG/7nvWDtZcdYLtX7B6QXL3aqG8Q:wIJct+A47v+rcqlBPG9B
                            MD5:F3418A443E7D841097C714D69EC4BCB8
                            SHA1:49263695F6B0CDD72F45CF1B775E660FDC36C606
                            SHA-256:6DA5620880159634213E197FAFCA1DDE0272153BE3E4590818533FAB8D040770
                            SHA-512:82D017C4B7EC8E0C46E8B75DA0CA6A52FD8BCE7FCF4E556CBDF16B49FC81BE9953FE7E25A05F63ECD41C7272E8BB0A9FD9AEDF0AC06CB6032330B096B3702563
                            Malicious:false
                            Reputation:high, very likely benign file
                            URL:https://www.google.com/favicon.ico
                            Preview:............ .h...&... .... .........(....... ..... ............................................0...................................................................................................................................v.].X.:.X.:.r.Y........................................q.X.S.4.S.4.S.4.S.4.S.4.S.4...X....................0........q.W.S.4.X.:.................J...A...g.........................K.H.V.8..........................F..B.....................,.......................................B..............................................B..B..B..B..B...u..........................................B..B..B..B..B...{.................5.......k...........................................................7R..8F.................................................2........Vb..5C..;I..................R^.....................0................Xc..5C..5C..5C..5C..5C..5C..lv..........................................]i..<J..:G..Zf....................................................
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (5693)
                            Category:downloaded
                            Size (bytes):698314
                            Entropy (8bit):5.595120835898624
                            Encrypted:false
                            SSDEEP:6144:TJvaKtQfcxene0F2HhPM8RGYcBlKmd5r6XISxi7SlncOpYMSrBg5X3O4mAEFD7:TJyKtkIct842ISxXJ09
                            MD5:F82438F9EAD5F57493C673008EED9E09
                            SHA1:E4681E68FD66D8C76C6ACBC21E2C45F36FD645BC
                            SHA-256:B4B092F54EAAA82BFAA159B8D61FB867B51C3067CBD60F4904A205A11F503250
                            SHA-512:89027A7B1B3A080D40411F2E6E3B62BF57AC60879223566E71BD41D900C17051F0A058EFE04F8F1FED5E05DC54617D7A86F83D21BDED0F79347795C8B980B4B2
                            Malicious:false
                            URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=LEikZe,_b,_tp,byfTOb,lsjVmc/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=n73qwf,SCuOPb,IZT63,vfuNJf,UUJqVe,ws9Tlc,siKnQd,XVq9Qb,STuCOe,njlZCf,m9oV,vjKJJ,y5vRwf,iyZMqd,NTMZac,mzzZzc,rCcCxc,vvMGie,K1ZKnb,ziZ8Mc,b3kMqb,mvkUhe,CMcBD,Fndnac,t2srLd,EN3i8d,z0u0L,xiZRqc,NOeYWe,O6y8ed,L9OGUe,PrPYRd,MpJwZc,qPfo0c,cYShmd,hc6Ubd,Rkm0ef,KUM7Z,oLggrd,inNHtf,L1AAkb,WpP9Yc,lwddkf,gJzDyc,SpsfSb,aC1iue,tUnxGc,aW3pY,ZakeSe,EFQ78c,xQtZb,I6YDgd,zbML3c,zr1jrb,vHEMJe,YHI3We,YTxL4,bSspM,Uas9Hd,zy0vNb,K0PMbc,AvtSve,qmdT9,MY7mZe,xBaz7b,GwYlN,eVCnO,EIOG1e,LDQI"
                            Preview:"use strict";_F_installCss(".r4WGQb{position:relative}.Dl08I>:first-child{margin-top:0}.Dl08I>:last-child{margin-bottom:0}.IzwVE{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-family:\"Google Sans\",roboto,\"Noto Sans Myanmar UI\",arial,sans-serif;font-size:1.25rem;font-weight:400;letter-spacing:0rem;line-height:1.2}.l5PPKe{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-size:1rem}.l5PPKe .dMNVAe{margin:0;padding:0}.l5PPKe>:first-child{margin-top:0;padding-top:0}.l5PPKe>:last-child{margin-bottom:0;padding-bottom:0}.Dl08I{margin:0;padding:0;position:relative}.Dl08I>.SmR8:only-child{padding-top:1px}.Dl08I>.SmR8:only-child::before{top:0}.Dl08I>.SmR8:not(first-child){padding-bottom:1px}.Dl08I>.SmR8::after{bottom:0}.Dl08I>.SmR8:only-child::before,.Dl08I>.SmR8::after{border-bottom:1px solid #c4c7c5;border-bottom:1px solid var(--gm3-sys-color-outline-variant,#c4c7c5);content:\"\";height:0;left:0;position:absolute;width:100%}.aZvCDf{margin-top:8px;margin-left
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (2907)
                            Category:downloaded
                            Size (bytes):22833
                            Entropy (8bit):5.425034548615223
                            Encrypted:false
                            SSDEEP:384:7lFo6ZEdpgtmyiPixV9OX9gMBpHkHnfst9lZulagGcwYHiRFjJzN7:77o6ZviPixV8xpEHn89l4IgGcwYCRtb7
                            MD5:749B18538FE32BFE0815D75F899F5B21
                            SHA1:AF95A019211AF69F752A43CAA54A83C2AFD41D28
                            SHA-256:116B2687C1D5E00DB56A79894AB0C12D4E2E000B9379B7E7AD751B84DF611F3F
                            SHA-512:E4B6F4556AA0FD9979BB52681508F5E26FFB256473803F74F7F5C8D93FA3636D7D0A5835618FBC6123022805CE0D9616A7451A0F302C665E28A6090B5D588505
                            Malicious:false
                            URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=RqjULd"
                            Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.uu.prototype.da=_.ca(40,function(){return _.rj(this,3)});_.$y=function(a,b){this.key=a;this.defaultValue=!1;this.flagName=b};_.$y.prototype.ctor=function(a){return typeof a==="boolean"?a:this.defaultValue};_.az=function(){this.ka=!0;var a=_.vj(_.dk(_.Be("TSDtV",window),_.zya),_.uu,1,_.qj())[0];if(a){var b={};for(var c=_.n(_.vj(a,_.Aya,2,_.qj())),d=c.next();!d.done;d=c.next()){d=d.value;var e=_.Jj(d,1).toString();switch(_.tj(d,_.vu)){case 3:b[e]=_.Hj(d,_.lj(d,_.vu,3));break;case 2:b[e]=_.Jj(d,_.lj(d,_.vu,2));break;case 4:b[e]=_.Kj(d,_.lj(d,_.vu,4));break;case 5:b[e]=_.Lj(d,_.lj(d,_.vu,5));break;case 6:b[e]=_.Pj(d,_.ff,6,_.vu);break;default:throw Error("jd`"+_.tj(d,_.vu));}}}else b={};this.ea=b;this.token=.a?a.da():null};_.az.prototype.aa=function(a){if(!this.ka||a.key in this.ea)a=a.ctor(this.ea[a.key]);else if(_.Be("nQyAE",window)){var b=_.Cya(a.flagName);if(b===null)a=a.de
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:HTML document, ASCII text, with very long lines (681)
                            Category:downloaded
                            Size (bytes):4066
                            Entropy (8bit):5.363016925556486
                            Encrypted:false
                            SSDEEP:96:G2CiFZX5BReR68ujioIRVrqtyzBeTV6SfyAKLif9c7w:bCMZXVeR6jiosVrqtyzBaImyAKw9x
                            MD5:FC5E597D923838E10390DADD12651A81
                            SHA1:C9959F8D539DB5DF07B8246EC12539B6A9CC101F
                            SHA-256:A7EBD5280C50AE93C061EAE1E9727329E015E97531F8F2D82D0E3EA76ADB37B4
                            SHA-512:784CA572808F184A849388723FBB3701E6981D885BBA8A330A933F90BF0B36A2E4A491D4463A27911B1D9F7A7134F23E15F187FC7CB4554EAE9BC252513EED7C
                            Malicious:false
                            URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=sOXFj,q0xTif,ZZ4WUe"
                            Preview:"use strict";_F_installCss(".N7rBcd{overflow-x:auto}sentinel{}");.this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.vg(_.aqa);._.k("sOXFj");.var tu=function(a){_.W.call(this,a.Fa)};_.J(tu,_.W);tu.Ba=_.W.Ba;tu.prototype.aa=function(a){return a()};_.nu(_.$pa,tu);._.l();._.k("oGtAuc");._.yya=new _.pf(_.aqa);._.l();._.k("q0xTif");.var sza=function(a){var b=function(d){_.Sn(d)&&(_.Sn(d).Jc=null,_.Du(d,null));d.XyHi9&&(d.XyHi9=null)};b(a);a=a.querySelectorAll("[c-wiz]");for(var c=0;c<a.length;c++)b(a[c])},Pu=function(a){_.kt.call(this,a.Fa);this.Qa=this.dom=null;if(this.kl()){var b=_.zm(this.Ug(),[_.Em,_.Dm]);b=_.ni([b[_.Em],b[_.Dm]]).then(function(c){this.Qa=c[0];this.dom=c[1]},null,this);_.hu(this,b)}this.Ra=a.lm.zea};_.J(Pu,_.kt);Pu.Ba=function(){return{lm:{zea:function(a){return _.Ue(a)}}}};Pu.prototype.zp=function(a){return this.Ra.zp(a)};.Pu.prototype.getData=function(a){return this.Ra.getData(a)};Pu.prototype.qo=function(){_.Kt(this.d
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
                            Category:downloaded
                            Size (bytes):52280
                            Entropy (8bit):7.995413196679271
                            Encrypted:true
                            SSDEEP:1536:1rvqtK8DZilXxwJ8mMwAZy7phqsFLdG3B4d:xytBZits8bw4wzbFxG3B4d
                            MD5:F61F0D4D0F968D5BBA39A84C76277E1A
                            SHA1:AA3693EA140ECA418B4B2A30F6A68F6F43B4BEB2
                            SHA-256:57147F08949ABABE7DEEF611435AE418475A693E3823769A25C2A39B6EAD9CCC
                            SHA-512:6C3BD90F709BCF9151C9ED9FFEA55C4F6883E7FDA2A4E26BF018C83FE1CFBE4F4AA0DB080D6D024070D53B2257472C399C8AC44EEFD38B9445640EFA85D5C487
                            Malicious:false
                            URL:https://fonts.gstatic.com/s/googlesans/v58/4UaRrENHsxJlGDuGo1OIlJfC6l_24rlCK1Yo_Iq2vgCI.woff2
                            Preview:wOF2.......8.....................................^...$..4?HVAR..?MVAR9.`?STAT.*',..J/.......`..(..Z.0..R.6.$.... .....K..[..q..c..T.....>.P.j.`.w..#...%......N.".....$..3.0.6......... .L.rX/r[j.y.|*(.4.%#.....2.v.m..-..%.....;-.Y.{..&..O=#l@...k..7g..ZI...#.Z./+T..r7...M..3).Z%.x....s..sL..[A!.5*1w'/.8V..2Z..%.X.h.o.).]..9..Q`.$.....7..kZ.~O........d..g.n.d.Rw+&....Cz..uy#..fz,(.J....v.%..`..9.....h...?O..:...c%.....6s....xl..#...5..._......1.>.)"U.4 W....?%......6//!$...!.n9C@n...........!""^.....W..Z<.7.x.."UT.T....E.."R>.R..t.....H d..e_.K../.+8.Q.P.ZQ....;...U....]......._.e*......71.?.7.ORv.?...l...G|.P...|:...I.X..2.,.L........d.g.]}W#uW]QnuP-s.;.-Y.....].......C..j_.M0...y.......J..........NY..@A...,....-.F......'..w./j5g.vUS...U..0.&...y7.LP.....%.....Y......Y..D. e.A..G.?.$.......6...eaK.n5.m...N...,...+BCl..L> .E9~.b[.w.x....6<...}.e...%V....O.......*.?...a..#[eE.4..p..$...].....%......o._......N.._~..El....b..A.0.r8.....|..D.d..
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (533)
                            Category:downloaded
                            Size (bytes):9210
                            Entropy (8bit):5.404371326611379
                            Encrypted:false
                            SSDEEP:192:EEFZpeip4HzZlY0If0Ma23jcUcrhCx6VD1TYPi8:Es/p4jgjUhtD1TY68
                            MD5:21E893B65627B397E22619A9F5BB9662
                            SHA1:F561B0F66211C1E7B22F94B4935C312AB7087E85
                            SHA-256:FFA9B8BC8EF2CDFF5EB4BA1A0BA1710A253A5B42535E2A369D5026967DCF4673
                            SHA-512:3DE3CD6A4E9B06AB3EB324E90A40B5F2AEEA8D7D6A2651C310E993CF79EEB5AC6E2E33C587F46B2DD20CC862354FD1A61AEBB9B990E6805F6629404BA285F8FA
                            Malicious:false
                            URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PrPYRd,Rkm0ef,SCuOPb,STuCOe,SpsfSb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,byfTOb,cYShmd,eVCnO,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,qPfo0c,qmdT9,rCcCxc,siKnQd,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ltDFwf,SD8Jgb,rmumx,E87wgc,qPYxq,Tbb4sb,pxq3x,f8Gu1e,soHxf,YgOFye,yRXbo,bTi8wc,ywOR5c,PHUIyb"
                            Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.qNa=_.y("SD8Jgb",[]);._.GX=function(a,b){if(typeof b==="string")a.Lc(b);else if(b instanceof _.Fp&&b.ia&&b.ia===_.A)b=_.Ya(b.Lw()),a.empty().append(b);else if(b instanceof _.Ua)b=_.Ya(b),a.empty().append(b);else if(b instanceof Node)a.empty().append(b);else throw Error("Vf");};_.HX=function(a){var b=_.Io(a,"[jsslot]");if(b.size()>0)return b;b=new _.Go([_.Kk("span")]);_.Jo(b,"jsslot","");a.empty().append(b);return b};_.NLb=function(a){return a===null||typeof a==="string"&&_.Hi(a)};._.k("SD8Jgb");._.MX=function(a){_.X.call(this,a.Fa);this.Ua=a.controller.Ua;this.od=a.controllers.od[0]||null;this.header=a.controller.header;this.nav=a.controller.nav;var b;(b=this.oa().find("button:not([type])").el())==null||b.setAttribute("type","button")};_.J(_.MX,_.X);_.MX.Ba=function(){return{controller:{Ua:{jsname:"n7vHCb",ctor:_.mv},header:{jsname:"tJHJj",ctor:_.mv},nav:{jsname:"DH6Rkf",ct
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (755)
                            Category:downloaded
                            Size (bytes):1460
                            Entropy (8bit):5.291808298251231
                            Encrypted:false
                            SSDEEP:24:kMYD7DuZvuhqCsNRxoYTY9/qoVk7hz1l2p6vDMW94uEQOeGbCx4VGbgCSFBV87OU:o7DuZWhv6oy12kvwKEeGbC6GbHSh/Hrw
                            MD5:4CA7ADFE744A690411EA4D3EA8DB9E4B
                            SHA1:2CF1777A199E25378D330DA68BED1871B5C5BC32
                            SHA-256:128129BA736B3094323499B0498A5B3A909C1529717461C34B70080A5B1603BD
                            SHA-512:8BD3477AF41D1F0FE74AFFCB177BEC0F5F4FDCBBA6BD29D9C2567E6FFDEF5DEB7FF74BF348F33209C39D7BB4958E748DF6731D3DC8F6947352276BC92EAF9E79
                            Malicious:false
                            URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=P6sQOc"
                            Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("lOO0Vd");._.VZa=new _.pf(_.Am);._.l();._.k("P6sQOc");.var $Za=!!(_.Kh[1]&16);var b_a=function(a,b,c,d,e){this.ea=a;this.wa=b;this.ka=c;this.Ca=d;this.Ga=e;this.aa=0;this.da=a_a(this)},c_a=function(a){var b={};_.La(a.yS(),function(e){b[e]=!0});var c=a.pS(),d=a.tS();return new b_a(a.qP(),c.aa()*1E3,a.WR(),d.aa()*1E3,b)},a_a=function(a){return Math.random()*Math.min(a.wa*Math.pow(a.ka,a.aa),a.Ca)},OG=function(a,b){return a.aa>=a.ea?!1:b!=null?!!a.Ga[b]:!0};var PG=function(a){_.W.call(this,a.Fa);this.da=a.Ea.EV;this.ea=a.Ea.metadata;a=a.Ea.Xga;this.fetch=a.fetch.bind(a)};_.J(PG,_.W);PG.Ba=function(){return{Ea:{EV:_.YZa,metadata:_.VZa,Xga:_.OZa}}};PG.prototype.aa=function(a,b){if(this.ea.getType(a.Od())!==1)return _.Sm(a);var c=this.da.eV;return(c=c?c_a(c):null)&&OG(c)?_.wya(a,d_a(this,a,b,c)):_.Sm(a)};.var d_a=function(a,b,c,d){return c.then(function(e){return e},function(e)
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (553)
                            Category:downloaded
                            Size (bytes):743936
                            Entropy (8bit):5.791086230020914
                            Encrypted:false
                            SSDEEP:6144:YVXWBQkPdzg5pTX1ROv/duPzd8C3s891/N:Nfd8j91/N
                            MD5:1A3606C746E7B1C949D9078E8E8C1244
                            SHA1:56A3EB1E93E61ACD7AAD39DC3526CB60E23651B1
                            SHA-256:5F49AE5162183E2EF6F082B29EC99F18DB0212B8ADDB03699B1BFB0AC7869742
                            SHA-512:F2D15243311C472331C5F3F083BB6C18D38EC0247A3F3CBAFD96DBA40E4EAE489CDA04176672E39FE3760EF7347596B2A5EAB0FB0125E881EF514475C99863B9
                            Malicious:false
                            URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/excm=_b,_tp,identifierview/ed=1/dg=0/wt=2/ujg=1/rs=AOaEmlE6O04h0gj7Nu50q-nmaRKM6WWcJw/m=_b,_tp"
                            Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._._F_toggles_initialize=function(a){(typeof globalThis!=="undefined"?globalThis:typeof self!=="undefined"?self:this)._F_toggles=a||[]};(0,_._F_toggles_initialize)([0x286081c4, 0x2046d860, 0x39e13c40, 0x14501e80, 0xe420, 0x0, 0x1a000000, 0x1d000003, 0xc, ]);./*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright Google LLC. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright 2024 Google, Inc. SPDX-License-Identifier: MIT.*/./*. SPDX-License-Identifier: Apache-2.0.*/./*. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/.var baa,daa,Ma,Sa,gaa,iaa,jb,qaa,waa,Caa,Haa,Kaa,Jb,Laa,Ob,Qb,Rb,Maa,Naa,Sb,Oaa,Paa,Qaa,Yb,Vaa,Xaa,ec,fc,gc,bba,cba,gba,jba,lba,mba,qba,tba,nba,sba,rba,pba,oba,uba,yba,Cba,Dba,Aba,Hc,Ic,Gba,Iba,Mba,Nba,Oba,Pba,Lba,Qba,Sba,dd,Uba,Vba,Xba,Zba,Yba,aca,bca,cca,dca,fca,eca,hca,ica,jca,kca,nca,
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (522)
                            Category:downloaded
                            Size (bytes):5050
                            Entropy (8bit):5.289052544075544
                            Encrypted:false
                            SSDEEP:96:o4We0hP7OBFXYvB1sig3Fd8HkaXzLmUrv8Vh1WJlLQXT2v2gqw:655758Fd8HkaPZ0GmAD
                            MD5:26E26FD11772DFF5C7004BEA334289CC
                            SHA1:638DAAF541BDE31E95AEE4F8ADA677434D7051DB
                            SHA-256:ADFE3E4960982F5EF4C043052A9990D8683C5FC2B590E817B6B1A5774DDE2CE3
                            SHA-512:C31929EB6D1C60D6A84A2574FF60490394A6D6F9B354972F3328952F570D80B3F2AEC916B0E1B66DDB1AC056EB75BFAC477E7AF631D0AD1810EDBAF025465D66
                            Malicious:false
                            URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,FCpbqb,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WhJNk,WpP9Yc,Wt6vjf,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,hhhU8,iAskyc,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=wg1P6b"
                            Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.jNa=_.y("wg1P6b",[_.TA,_.Cn,_.Kn]);._.k("wg1P6b");.var Z5a;Z5a=_.mh(["aria-"]);._.uJ=function(a){_.X.call(this,a.Fa);this.Ka=this.wa=this.aa=this.viewportElement=this.Na=null;this.Hc=a.Ea.ff;this.ab=a.Ea.focus;this.Fc=a.Ea.Fc;this.ea=this.Pi();a=-1*parseInt(_.Co(this.Pi().el(),"marginTop")||"0",10);var b=parseInt(_.Co(this.Pi().el(),"marginBottom")||"0",10);this.Ta={top:a,right:0,bottom:b,left:0};a=_.cf(this.getData("isMenuDynamic"),!1);b=_.cf(this.getData("isMenuHoisted"),!1);this.Ga=a?1:b?2:0;this.ka=!1;this.Ca=1;this.Ga!==1&&(this.aa=this.Sa("U0exHf").children().Wc(0),_.ku(this,.$5a(this,this.aa.el())));_.kF(this.oa())&&(a=this.oa().el(),b=this.we.bind(this),a.__soy_skip_handler=b)};_.J(_.uJ,_.X);_.uJ.Ba=function(){return{Ea:{ff:_.ZE,focus:_.KE,Fc:_.ru}}};_.uJ.prototype.xF=function(a){var b=a.source;this.Na=b;var c;((c=a.data)==null?0:c.fz)?(a=a.data.fz,this.Ca=a==="MOUS
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with no line terminators
                            Category:downloaded
                            Size (bytes):84
                            Entropy (8bit):4.875266466142591
                            Encrypted:false
                            SSDEEP:3:DZFJu0+WVTBCq2Bjdw2KsJJuYHSKnZ:lFJuuVTBudw29nu4SKZ
                            MD5:87B6333E98B7620EA1FF98D1A837A39E
                            SHA1:105DE6815B0885357DE1414BFC0D77FCC9E924EF
                            SHA-256:DCD3C133C5C40BECD4100BBE6EDAE84C9735E778E4234A5E8395C56FF8A733BA
                            SHA-512:867D7943D813685FAA76394E53199750C55817E836FD19C933F74D11E9657CE66719A6D6B2E39EE1DE62358BCE364E38A55F4E138DF92337DE6985DDCD5D0994
                            Malicious:false
                            URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzQSHgmA6QC9dWevzxIFDRkBE_oSBQ3oIX6GEgUN05ioBw==?alt=proto
                            Preview:Cj0KBw0ZARP6GgAKKQ3oIX6GGgQISxgCKhwIClIYCg5AIS4jJF8qLSY/Ky8lLBABGP////8PCgcN05ioBxoA
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (395)
                            Category:downloaded
                            Size (bytes):1608
                            Entropy (8bit):5.257113147606035
                            Encrypted:false
                            SSDEEP:48:o72ZrNZ4yNAbU+15fMxIdf5WENoBCbw7DbG2bEJrw:oyNNAY+1i4HoBNG2Ilw
                            MD5:F06E2DC5CC446B39F878B5F8E4D78418
                            SHA1:9F1F34FDD8F8DAB942A9B95D9F720587B6F6AD48
                            SHA-256:118E4D2FE7CEF205F9AFC87636554C6D8220882B158333EE3D1990282D158B8F
                            SHA-512:893C4F883CD1C88C6AAF5A6E7F232D62823A53E1FFDE5C1C52BB066D75781DD041F4D281CDBF18070D921CE862652D8863E2B9D5E0190CFA4128890D62C44168
                            Malicious:false
                            URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=w9hDv,ZDZcre,A7fCU"
                            Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("w9hDv");._.vg(_.Hla);_.eA=function(a){_.W.call(this,a.Fa);this.aa=a.Xa.cache};_.J(_.eA,_.W);_.eA.Ba=function(){return{Xa:{cache:_.dt}}};_.eA.prototype.execute=function(a){_.Bb(a,function(b){var c;_.$e(b)&&(c=b.eb.kc(b.kb));c&&this.aa.xG(c)},this);return{}};_.nu(_.Nla,_.eA);._.l();._.k("ZDZcre");.var fH=function(a){_.W.call(this,a.Fa);this.Wl=a.Ea.Wl;this.d4=a.Ea.metadata;this.aa=a.Ea.ot};_.J(fH,_.W);fH.Ba=function(){return{Ea:{Wl:_.KG,metadata:_.VZa,ot:_.HG}}};fH.prototype.execute=function(a){var b=this;a=this.aa.create(a);return _.Bb(a,function(c){var d=b.d4.getType(c.Od())===2?b.Wl.Rb(c):b.Wl.fetch(c);return _.yl(c,_.LG)?d.then(function(e){return _.Dd(e)}):d},this)};_.nu(_.Sla,fH);._.l();._.k("K5nYTd");._.UZa=new _.pf(_.Ola);._.l();._.k("sP4Vbe");.._.l();._.k("kMFpHd");.._.l();._.k("A7fCU");.var NG=function(a){_.W.call(this,a.Fa);this.aa=a.Ea.tQ};_.J(NG,_.W);NG.Ba=func
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (570)
                            Category:downloaded
                            Size (bytes):3467
                            Entropy (8bit):5.514745431912774
                            Encrypted:false
                            SSDEEP:96:ozbld2fNUmeqJNizhNtt1W8t//loyIpXmdVE2w:onSKE8PWe/Cy4X3j
                            MD5:8DEF399E8355ABC23E64505281005099
                            SHA1:24FF74C3AEFD7696D84FF148465DF4B1B60B1696
                            SHA-256:F128D7218E1286B05DF11310AD3C8F4CF781402698E45448850D2A3A22F5F185
                            SHA-512:33721DD47658D8E12ADF6BD9E9316EB89F5B6297927F7FD60F954E04B829DCBF0E1AE6DDD9A3401F45E0011AE4B1397B960C218238A3D0F633A2173D8E604082
                            Malicious:false
                            URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,iAskyc,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=Wt6vjf,hhhU8,FCpbqb,WhJNk"
                            Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("Wt6vjf");.var cya=function(){var a=_.He();return _.Lj(a,1)},Yt=function(a){this.Da=_.t(a,0,Yt.messageId)};_.J(Yt,_.w);Yt.prototype.Ha=function(){return _.Dj(this,1)};Yt.prototype.Va=function(a){return _.Vj(this,1,a)};Yt.messageId="f.bo";var Zt=function(){_.hm.call(this)};_.J(Zt,_.hm);Zt.prototype.xd=function(){this.CT=!1;dya(this);_.hm.prototype.xd.call(this)};Zt.prototype.aa=function(){eya(this);if(this.wC)return fya(this),!1;if(!this.KV)return $t(this),!0;this.dispatchEvent("p");if(!this.zP)return $t(this),!0;this.wM?(this.dispatchEvent("r"),$t(this)):fya(this);return!1};.var gya=function(a){var b=new _.ap(a.W4);a.qQ!=null&&_.Jn(b,"authuser",a.qQ);return b},fya=function(a){a.wC=!0;var b=gya(a),c="rt=r&f_uid="+_.pk(a.zP);_.cn(b,(0,_.bg)(a.ea,a),"POST",c)};.Zt.prototype.ea=function(a){a=a.target;eya(this);if(_.fn(a)){this.cK=0;if(this.wM)this.wC=!1,this.dispatchEvent("r"
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (1694)
                            Category:downloaded
                            Size (bytes):32500
                            Entropy (8bit):5.378903546681047
                            Encrypted:false
                            SSDEEP:768:zYlbuROstb0e39nKGrkysU0smpu4OLOdzIf1p/5GeSsngurz6aKEEEGo/:zYl61Cysbu4OLOdzIfrIen72ZFo/
                            MD5:BF4BF9728A7C302FBA5B14F3D0F1878B
                            SHA1:2607CA7A93710D629400077FF3602CB207E6F53D
                            SHA-256:8981E7B228DF7D6A8797C0CD1E9B0F1F88337D5F0E1C27A04E7A57D2C4309798
                            SHA-512:AC9E170FC3AFDC0CF6BB8E926B93EF129A5FAD1BBA51B60BABCF3555E9B652E98F86A00FB099879DED35DD3FFE72ECFA597E20E6CA8CF402BEDEC40F78412EDA
                            Malicious:false
                            URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=_b,_tp/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=byfTOb,lsjVmc,LEikZe"
                            Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{.var Aua=function(a,b){this.da=a;this.ea=b;if(!c){var c=new _.ap("//www.google.com/images/cleardot.gif");_.op(c)}this.ka=c};_.h=Aua.prototype;_.h.Zc=null;_.h.lZ=1E4;_.h.bA=!1;_.h.nQ=0;_.h.zJ=null;_.h.bV=null;_.h.setTimeout=function(a){this.lZ=a};_.h.start=function(){if(this.bA)throw Error("dc");this.bA=!0;this.nQ=0;Bua(this)};_.h.stop=function(){Cua(this);this.bA=!1};.var Bua=function(a){a.nQ++;navigator!==null&&"onLine"in navigator&&!navigator.onLine?_.km((0,_.bg)(a.aH,a,!1),0):(a.aa=new Image,a.aa.onload=(0,_.bg)(a.Fja,a),a.aa.onerror=(0,_.bg)(a.Eja,a),a.aa.onabort=(0,_.bg)(a.Dja,a),a.zJ=_.km(a.Gja,a.lZ,a),a.aa.src=String(a.ka))};_.h=Aua.prototype;_.h.Fja=function(){this.aH(!0)};_.h.Eja=function(){this.aH(!1)};_.h.Dja=function(){this.aH(!1)};_.h.Gja=function(){this.aH(!1)};._.h.aH=function(a){Cua(this);a?(this.bA=!1,this.da.call(this.ea,!0)):this.nQ<=0?Bua(this):(this.bA=!1,
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):6.58232658379601
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:file.exe
                            File size:918'528 bytes
                            MD5:6f2531641192fca92cb3f1de7713c3ad
                            SHA1:9e90e3873d853c6cc8b1671011982bf1eb4ce52d
                            SHA256:3f81da9b41afd6e4a1a4a0307876771cd2d565d4d049557d84f6bc255418eaca
                            SHA512:fe111840940782e5ecf94da628fd48deeb74778e2d963cd1667704fab4b3e0ad17f8f6d6cea62ddc8a37d630b59bfe0151ee209d96ced92dba9cb614418dcbc0
                            SSDEEP:12288:8qDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDga2Tx:8qDEvCTbMWu7rQYlBQcBiT6rprG8aOx
                            TLSH:26159E0273D1C062FFAB92334B5AF6515BBC69260123E61F13981DB9BE701B1563E7A3
                            File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                            Icon Hash:aaf3e3e3938382a0
                            Entrypoint:0x420577
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                            Time Stamp:0x66FCBB96 [Wed Oct 2 03:18:46 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:5
                            OS Version Minor:1
                            File Version Major:5
                            File Version Minor:1
                            Subsystem Version Major:5
                            Subsystem Version Minor:1
                            Import Hash:948cc502fe9226992dce9417f952fce3
                            Instruction
                            call 00007F661CB6F3B3h
                            jmp 00007F661CB6ECBFh
                            push ebp
                            mov ebp, esp
                            push esi
                            push dword ptr [ebp+08h]
                            mov esi, ecx
                            call 00007F661CB6EE9Dh
                            mov dword ptr [esi], 0049FDF0h
                            mov eax, esi
                            pop esi
                            pop ebp
                            retn 0004h
                            and dword ptr [ecx+04h], 00000000h
                            mov eax, ecx
                            and dword ptr [ecx+08h], 00000000h
                            mov dword ptr [ecx+04h], 0049FDF8h
                            mov dword ptr [ecx], 0049FDF0h
                            ret
                            push ebp
                            mov ebp, esp
                            push esi
                            push dword ptr [ebp+08h]
                            mov esi, ecx
                            call 00007F661CB6EE6Ah
                            mov dword ptr [esi], 0049FE0Ch
                            mov eax, esi
                            pop esi
                            pop ebp
                            retn 0004h
                            and dword ptr [ecx+04h], 00000000h
                            mov eax, ecx
                            and dword ptr [ecx+08h], 00000000h
                            mov dword ptr [ecx+04h], 0049FE14h
                            mov dword ptr [ecx], 0049FE0Ch
                            ret
                            push ebp
                            mov ebp, esp
                            push esi
                            mov esi, ecx
                            lea eax, dword ptr [esi+04h]
                            mov dword ptr [esi], 0049FDD0h
                            and dword ptr [eax], 00000000h
                            and dword ptr [eax+04h], 00000000h
                            push eax
                            mov eax, dword ptr [ebp+08h]
                            add eax, 04h
                            push eax
                            call 00007F661CB71A5Dh
                            pop ecx
                            pop ecx
                            mov eax, esi
                            pop esi
                            pop ebp
                            retn 0004h
                            lea eax, dword ptr [ecx+04h]
                            mov dword ptr [ecx], 0049FDD0h
                            push eax
                            call 00007F661CB71AA8h
                            pop ecx
                            ret
                            push ebp
                            mov ebp, esp
                            push esi
                            mov esi, ecx
                            lea eax, dword ptr [esi+04h]
                            mov dword ptr [esi], 0049FDD0h
                            push eax
                            call 00007F661CB71A91h
                            test byte ptr [ebp+08h], 00000001h
                            pop ecx
                            Programming Language:
                            • [ C ] VS2008 SP1 build 30729
                            • [IMP] VS2008 SP1 build 30729
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x991c.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xde0000x7594.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0xd40000x991c0x9a0061019abd98fc19215c0828bc4b6b5c75False0.302835836038961data5.278485106425611IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0xde0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                            RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                            RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                            RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                            RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                            RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                            RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                            RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                            RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                            RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                            RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                            RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                            RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                            RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                            RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                            RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                            RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                            RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                            RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                            RT_RCDATA0xdc7b80xbe2data1.0036160420775806
                            RT_GROUP_ICON0xdd39c0x76dataEnglishGreat Britain0.6610169491525424
                            RT_GROUP_ICON0xdd4140x14dataEnglishGreat Britain1.25
                            RT_GROUP_ICON0xdd4280x14dataEnglishGreat Britain1.15
                            RT_GROUP_ICON0xdd43c0x14dataEnglishGreat Britain1.25
                            RT_VERSION0xdd4500xdcdataEnglishGreat Britain0.6181818181818182
                            RT_MANIFEST0xdd52c0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                            DLLImport
                            WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                            VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                            WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                            COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                            MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                            WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                            PSAPI.DLLGetProcessMemoryInfo
                            IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                            USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                            UxTheme.dllIsThemeActive
                            KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                            USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                            GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                            COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                            ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                            SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                            ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                            OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                            Language of compilation systemCountry where language is spokenMap
                            EnglishGreat Britain
                            TimestampSource PortDest PortSource IPDest IP
                            Oct 2, 2024 05:20:52.281081915 CEST49674443192.168.2.6173.222.162.64
                            Oct 2, 2024 05:20:52.281083107 CEST49673443192.168.2.6173.222.162.64
                            Oct 2, 2024 05:20:52.546674967 CEST49672443192.168.2.6173.222.162.64
                            Oct 2, 2024 05:20:59.490545988 CEST49710443192.168.2.6216.58.206.78
                            Oct 2, 2024 05:20:59.490665913 CEST44349710216.58.206.78192.168.2.6
                            Oct 2, 2024 05:20:59.490748882 CEST49710443192.168.2.6216.58.206.78
                            Oct 2, 2024 05:20:59.493052006 CEST49710443192.168.2.6216.58.206.78
                            Oct 2, 2024 05:20:59.493108988 CEST44349710216.58.206.78192.168.2.6
                            Oct 2, 2024 05:21:00.148266077 CEST44349710216.58.206.78192.168.2.6
                            Oct 2, 2024 05:21:00.148482084 CEST49710443192.168.2.6216.58.206.78
                            Oct 2, 2024 05:21:00.148551941 CEST44349710216.58.206.78192.168.2.6
                            Oct 2, 2024 05:21:00.148957968 CEST44349710216.58.206.78192.168.2.6
                            Oct 2, 2024 05:21:00.149020910 CEST49710443192.168.2.6216.58.206.78
                            Oct 2, 2024 05:21:00.149943113 CEST44349710216.58.206.78192.168.2.6
                            Oct 2, 2024 05:21:00.150013924 CEST49710443192.168.2.6216.58.206.78
                            Oct 2, 2024 05:21:00.150991917 CEST49710443192.168.2.6216.58.206.78
                            Oct 2, 2024 05:21:00.151063919 CEST44349710216.58.206.78192.168.2.6
                            Oct 2, 2024 05:21:00.151160002 CEST49710443192.168.2.6216.58.206.78
                            Oct 2, 2024 05:21:00.151177883 CEST44349710216.58.206.78192.168.2.6
                            Oct 2, 2024 05:21:00.202636003 CEST49710443192.168.2.6216.58.206.78
                            Oct 2, 2024 05:21:00.433372021 CEST44349710216.58.206.78192.168.2.6
                            Oct 2, 2024 05:21:00.433453083 CEST44349710216.58.206.78192.168.2.6
                            Oct 2, 2024 05:21:00.433645964 CEST49710443192.168.2.6216.58.206.78
                            Oct 2, 2024 05:21:00.434113026 CEST49710443192.168.2.6216.58.206.78
                            Oct 2, 2024 05:21:00.434153080 CEST44349710216.58.206.78192.168.2.6
                            Oct 2, 2024 05:21:00.446700096 CEST49716443192.168.2.6142.250.181.238
                            Oct 2, 2024 05:21:00.446732044 CEST44349716142.250.181.238192.168.2.6
                            Oct 2, 2024 05:21:00.446867943 CEST49716443192.168.2.6142.250.181.238
                            Oct 2, 2024 05:21:00.447093010 CEST49716443192.168.2.6142.250.181.238
                            Oct 2, 2024 05:21:00.447103977 CEST44349716142.250.181.238192.168.2.6
                            Oct 2, 2024 05:21:00.550904989 CEST49717443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:00.550930977 CEST4434971740.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:00.551012993 CEST49717443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:00.551570892 CEST49717443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:00.551579952 CEST4434971740.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:01.079062939 CEST44349716142.250.181.238192.168.2.6
                            Oct 2, 2024 05:21:01.081885099 CEST49716443192.168.2.6142.250.181.238
                            Oct 2, 2024 05:21:01.081906080 CEST44349716142.250.181.238192.168.2.6
                            Oct 2, 2024 05:21:01.082321882 CEST44349716142.250.181.238192.168.2.6
                            Oct 2, 2024 05:21:01.082429886 CEST49716443192.168.2.6142.250.181.238
                            Oct 2, 2024 05:21:01.083018064 CEST44349716142.250.181.238192.168.2.6
                            Oct 2, 2024 05:21:01.083062887 CEST49716443192.168.2.6142.250.181.238
                            Oct 2, 2024 05:21:01.084625959 CEST49716443192.168.2.6142.250.181.238
                            Oct 2, 2024 05:21:01.084625959 CEST49716443192.168.2.6142.250.181.238
                            Oct 2, 2024 05:21:01.084645987 CEST44349716142.250.181.238192.168.2.6
                            Oct 2, 2024 05:21:01.084693909 CEST44349716142.250.181.238192.168.2.6
                            Oct 2, 2024 05:21:01.124527931 CEST49716443192.168.2.6142.250.181.238
                            Oct 2, 2024 05:21:01.124551058 CEST44349716142.250.181.238192.168.2.6
                            Oct 2, 2024 05:21:01.187058926 CEST49716443192.168.2.6142.250.181.238
                            Oct 2, 2024 05:21:01.335539103 CEST4434971740.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:01.337558031 CEST49717443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:01.340724945 CEST49717443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:01.340730906 CEST4434971740.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:01.340964079 CEST4434971740.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:01.343091011 CEST49717443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:01.343091011 CEST49717443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:01.343103886 CEST4434971740.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:01.343374968 CEST49717443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:01.383443117 CEST4434971740.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:01.384141922 CEST44349716142.250.181.238192.168.2.6
                            Oct 2, 2024 05:21:01.384160995 CEST44349716142.250.181.238192.168.2.6
                            Oct 2, 2024 05:21:01.384216070 CEST49716443192.168.2.6142.250.181.238
                            Oct 2, 2024 05:21:01.384228945 CEST44349716142.250.181.238192.168.2.6
                            Oct 2, 2024 05:21:01.384248972 CEST44349716142.250.181.238192.168.2.6
                            Oct 2, 2024 05:21:01.384294033 CEST49716443192.168.2.6142.250.181.238
                            Oct 2, 2024 05:21:01.386308908 CEST49716443192.168.2.6142.250.181.238
                            Oct 2, 2024 05:21:01.386322975 CEST44349716142.250.181.238192.168.2.6
                            Oct 2, 2024 05:21:01.520062923 CEST4434971740.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:01.520133018 CEST4434971740.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:01.520184040 CEST49717443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:01.520416975 CEST49717443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:01.520430088 CEST4434971740.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:01.890151024 CEST49673443192.168.2.6173.222.162.64
                            Oct 2, 2024 05:21:01.890182972 CEST49674443192.168.2.6173.222.162.64
                            Oct 2, 2024 05:21:02.155812025 CEST49672443192.168.2.6173.222.162.64
                            Oct 2, 2024 05:21:03.720563889 CEST49722443192.168.2.6142.250.184.228
                            Oct 2, 2024 05:21:03.720603943 CEST44349722142.250.184.228192.168.2.6
                            Oct 2, 2024 05:21:03.720679998 CEST49722443192.168.2.6142.250.184.228
                            Oct 2, 2024 05:21:03.720890999 CEST49722443192.168.2.6142.250.184.228
                            Oct 2, 2024 05:21:03.720905066 CEST44349722142.250.184.228192.168.2.6
                            Oct 2, 2024 05:21:03.800067902 CEST44349705173.222.162.64192.168.2.6
                            Oct 2, 2024 05:21:03.800168037 CEST49705443192.168.2.6173.222.162.64
                            Oct 2, 2024 05:21:04.108973026 CEST49726443192.168.2.6184.28.90.27
                            Oct 2, 2024 05:21:04.108995914 CEST44349726184.28.90.27192.168.2.6
                            Oct 2, 2024 05:21:04.109083891 CEST49726443192.168.2.6184.28.90.27
                            Oct 2, 2024 05:21:04.110495090 CEST49726443192.168.2.6184.28.90.27
                            Oct 2, 2024 05:21:04.110508919 CEST44349726184.28.90.27192.168.2.6
                            Oct 2, 2024 05:21:04.351800919 CEST44349722142.250.184.228192.168.2.6
                            Oct 2, 2024 05:21:04.352005959 CEST49722443192.168.2.6142.250.184.228
                            Oct 2, 2024 05:21:04.352026939 CEST44349722142.250.184.228192.168.2.6
                            Oct 2, 2024 05:21:04.353014946 CEST44349722142.250.184.228192.168.2.6
                            Oct 2, 2024 05:21:04.353070974 CEST49722443192.168.2.6142.250.184.228
                            Oct 2, 2024 05:21:04.357438087 CEST49722443192.168.2.6142.250.184.228
                            Oct 2, 2024 05:21:04.357502937 CEST44349722142.250.184.228192.168.2.6
                            Oct 2, 2024 05:21:04.403908968 CEST49722443192.168.2.6142.250.184.228
                            Oct 2, 2024 05:21:04.403939962 CEST44349722142.250.184.228192.168.2.6
                            Oct 2, 2024 05:21:04.450798988 CEST49722443192.168.2.6142.250.184.228
                            Oct 2, 2024 05:21:04.752996922 CEST44349726184.28.90.27192.168.2.6
                            Oct 2, 2024 05:21:04.753067970 CEST49726443192.168.2.6184.28.90.27
                            Oct 2, 2024 05:21:04.756074905 CEST49726443192.168.2.6184.28.90.27
                            Oct 2, 2024 05:21:04.756083012 CEST44349726184.28.90.27192.168.2.6
                            Oct 2, 2024 05:21:04.756475925 CEST44349726184.28.90.27192.168.2.6
                            Oct 2, 2024 05:21:04.803148985 CEST49726443192.168.2.6184.28.90.27
                            Oct 2, 2024 05:21:04.843410015 CEST44349726184.28.90.27192.168.2.6
                            Oct 2, 2024 05:21:05.021035910 CEST44349726184.28.90.27192.168.2.6
                            Oct 2, 2024 05:21:05.021106005 CEST44349726184.28.90.27192.168.2.6
                            Oct 2, 2024 05:21:05.021157980 CEST49726443192.168.2.6184.28.90.27
                            Oct 2, 2024 05:21:05.021261930 CEST49726443192.168.2.6184.28.90.27
                            Oct 2, 2024 05:21:05.021275997 CEST44349726184.28.90.27192.168.2.6
                            Oct 2, 2024 05:21:05.021287918 CEST49726443192.168.2.6184.28.90.27
                            Oct 2, 2024 05:21:05.021292925 CEST44349726184.28.90.27192.168.2.6
                            Oct 2, 2024 05:21:05.066482067 CEST49728443192.168.2.6184.28.90.27
                            Oct 2, 2024 05:21:05.066538095 CEST44349728184.28.90.27192.168.2.6
                            Oct 2, 2024 05:21:05.066618919 CEST49728443192.168.2.6184.28.90.27
                            Oct 2, 2024 05:21:05.067022085 CEST49728443192.168.2.6184.28.90.27
                            Oct 2, 2024 05:21:05.067034960 CEST44349728184.28.90.27192.168.2.6
                            Oct 2, 2024 05:21:05.720873117 CEST44349728184.28.90.27192.168.2.6
                            Oct 2, 2024 05:21:05.721034050 CEST49728443192.168.2.6184.28.90.27
                            Oct 2, 2024 05:21:06.112426043 CEST49728443192.168.2.6184.28.90.27
                            Oct 2, 2024 05:21:06.112462044 CEST44349728184.28.90.27192.168.2.6
                            Oct 2, 2024 05:21:06.112756968 CEST44349728184.28.90.27192.168.2.6
                            Oct 2, 2024 05:21:06.113967896 CEST49728443192.168.2.6184.28.90.27
                            Oct 2, 2024 05:21:06.155406952 CEST44349728184.28.90.27192.168.2.6
                            Oct 2, 2024 05:21:06.302989960 CEST44349728184.28.90.27192.168.2.6
                            Oct 2, 2024 05:21:06.303066969 CEST44349728184.28.90.27192.168.2.6
                            Oct 2, 2024 05:21:06.303505898 CEST49728443192.168.2.6184.28.90.27
                            Oct 2, 2024 05:21:06.304207087 CEST49728443192.168.2.6184.28.90.27
                            Oct 2, 2024 05:21:06.304220915 CEST44349728184.28.90.27192.168.2.6
                            Oct 2, 2024 05:21:06.304253101 CEST49728443192.168.2.6184.28.90.27
                            Oct 2, 2024 05:21:06.304258108 CEST44349728184.28.90.27192.168.2.6
                            Oct 2, 2024 05:21:08.609400034 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:08.609432936 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:08.609505892 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:08.609867096 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:08.609884024 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:08.629677057 CEST49743443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:08.629704952 CEST4434974340.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:08.629762888 CEST49743443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:08.630362988 CEST49743443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:08.630377054 CEST4434974340.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:09.276801109 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.278250933 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:09.278275967 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.278719902 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.278778076 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:09.279508114 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.279556990 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:09.280950069 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:09.281021118 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.281131983 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:09.281141043 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.330296040 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:09.430826902 CEST4434974340.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:09.430908918 CEST49743443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:09.432914972 CEST49743443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:09.432928085 CEST4434974340.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:09.433298111 CEST4434974340.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:09.435328007 CEST49743443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:09.435379982 CEST49743443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:09.435391903 CEST4434974340.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:09.435520887 CEST49743443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:09.479409933 CEST4434974340.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:09.595743895 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.595791101 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.595829964 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.595850945 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:09.595885992 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.595901012 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:09.601733923 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.601818085 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:09.601828098 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.605745077 CEST4434974340.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:09.605950117 CEST4434974340.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:09.606029987 CEST49743443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:09.607954979 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.608009100 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:09.608016968 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.608040094 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.608082056 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:09.608089924 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.608371973 CEST49743443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:09.608407974 CEST4434974340.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:09.614265919 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.614478111 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:09.614485979 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.620428085 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.620471001 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:09.620477915 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.620568037 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.620614052 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:09.620620966 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.663117886 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:09.682281017 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.682346106 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:09.682351112 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.682363033 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.682398081 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:09.684773922 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.684823990 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:09.690973997 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.691020966 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.691028118 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:09.691039085 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.691096067 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:09.697268963 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.697318077 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:09.703522921 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.703597069 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:09.703604937 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.709945917 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.709986925 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:09.709997892 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.716131926 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.716176987 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:09.716183901 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.716257095 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:09.716301918 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:09.716394901 CEST49742443192.168.2.6142.250.74.206
                            Oct 2, 2024 05:21:09.716417074 CEST44349742142.250.74.206192.168.2.6
                            Oct 2, 2024 05:21:10.020355940 CEST49747443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:10.020395041 CEST44349747142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:10.020442009 CEST49747443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:10.021095037 CEST49747443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:10.021112919 CEST44349747142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:10.089576960 CEST49748443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:10.089642048 CEST44349748142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:10.089724064 CEST49748443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:10.091643095 CEST49748443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:10.091660976 CEST44349748142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:10.649348974 CEST44349747142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:10.649823904 CEST49747443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:10.649833918 CEST44349747142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:10.650219917 CEST44349747142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:10.650289059 CEST49747443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:10.650999069 CEST44349747142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:10.651046991 CEST49747443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:10.652621984 CEST49747443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:10.652707100 CEST44349747142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:10.653069019 CEST49747443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:10.653076887 CEST44349747142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:10.702042103 CEST49747443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:10.741051912 CEST44349748142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:10.741575956 CEST49748443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:10.741602898 CEST44349748142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:10.742122889 CEST44349748142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:10.742192984 CEST49748443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:10.742891073 CEST44349748142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:10.742934942 CEST49748443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:10.745616913 CEST49748443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:10.745699883 CEST44349748142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:10.747786045 CEST49748443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:10.747795105 CEST44349748142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:10.800426960 CEST49748443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:10.925431967 CEST44349747142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:10.925548077 CEST44349747142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:10.925616026 CEST49747443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:10.948662043 CEST49747443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:10.948676109 CEST44349747142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:10.980262995 CEST49751443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:10.980305910 CEST44349751142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:10.980406046 CEST49751443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:11.021538973 CEST44349748142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:11.021635056 CEST44349748142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:11.021863937 CEST49748443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:11.031644106 CEST49751443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:11.031657934 CEST44349751142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:11.032494068 CEST49748443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:11.032504082 CEST44349748142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:11.033997059 CEST49753443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:11.034034967 CEST44349753142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:11.034096003 CEST49753443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:11.035933018 CEST49753443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:11.035955906 CEST44349753142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:11.068655014 CEST49722443192.168.2.6142.250.184.228
                            Oct 2, 2024 05:21:11.111408949 CEST44349722142.250.184.228192.168.2.6
                            Oct 2, 2024 05:21:11.333839893 CEST44349722142.250.184.228192.168.2.6
                            Oct 2, 2024 05:21:11.333880901 CEST44349722142.250.184.228192.168.2.6
                            Oct 2, 2024 05:21:11.333915949 CEST44349722142.250.184.228192.168.2.6
                            Oct 2, 2024 05:21:11.333939075 CEST44349722142.250.184.228192.168.2.6
                            Oct 2, 2024 05:21:11.333947897 CEST49722443192.168.2.6142.250.184.228
                            Oct 2, 2024 05:21:11.333978891 CEST44349722142.250.184.228192.168.2.6
                            Oct 2, 2024 05:21:11.333993912 CEST49722443192.168.2.6142.250.184.228
                            Oct 2, 2024 05:21:11.334049940 CEST44349722142.250.184.228192.168.2.6
                            Oct 2, 2024 05:21:11.334089041 CEST49722443192.168.2.6142.250.184.228
                            Oct 2, 2024 05:21:11.336611032 CEST49722443192.168.2.6142.250.184.228
                            Oct 2, 2024 05:21:11.336630106 CEST44349722142.250.184.228192.168.2.6
                            Oct 2, 2024 05:21:11.657809019 CEST44349751142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:11.658242941 CEST49751443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:11.658277988 CEST44349751142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:11.658715963 CEST44349751142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:11.658792973 CEST49751443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:11.659512997 CEST44349751142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:11.659571886 CEST49751443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:11.659740925 CEST49751443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:11.659811020 CEST44349751142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:11.660152912 CEST49751443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:11.660160065 CEST44349751142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:11.660180092 CEST49751443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:11.683907986 CEST44349753142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:11.684303045 CEST49753443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:11.684338093 CEST44349753142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:11.684694052 CEST44349753142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:11.684750080 CEST49753443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:11.685319901 CEST44349753142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:11.685389996 CEST49753443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:11.685487986 CEST49753443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:11.685549974 CEST44349753142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:11.685744047 CEST49753443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:11.685751915 CEST44349753142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:11.685796976 CEST49753443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:11.701708078 CEST49751443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:11.701718092 CEST44349751142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:11.731409073 CEST44349753142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:11.732956886 CEST49753443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:11.849920034 CEST44349751142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:11.850050926 CEST44349751142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:11.850107908 CEST49751443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:11.851011992 CEST49751443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:11.851032972 CEST44349751142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:11.880912066 CEST44349753142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:11.881042957 CEST44349753142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:11.881115913 CEST49753443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:11.882237911 CEST49753443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:11.882258892 CEST44349753142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:12.764221907 CEST49757443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:12.764282942 CEST4434975752.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:12.764355898 CEST49757443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:12.765744925 CEST49757443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:12.765763998 CEST4434975752.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:13.440457106 CEST4434975752.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:13.440555096 CEST49757443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:13.495024920 CEST49757443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:13.495058060 CEST4434975752.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:13.496032000 CEST4434975752.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:13.545515060 CEST49757443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:13.623491049 CEST49757443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:13.667402029 CEST4434975752.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:13.734838009 CEST49705443192.168.2.6173.222.162.64
                            Oct 2, 2024 05:21:13.734920979 CEST49705443192.168.2.6173.222.162.64
                            Oct 2, 2024 05:21:13.739707947 CEST44349705173.222.162.64192.168.2.6
                            Oct 2, 2024 05:21:13.739720106 CEST44349705173.222.162.64192.168.2.6
                            Oct 2, 2024 05:21:13.780066013 CEST49761443192.168.2.6173.222.162.64
                            Oct 2, 2024 05:21:13.780106068 CEST44349761173.222.162.64192.168.2.6
                            Oct 2, 2024 05:21:13.780155897 CEST49761443192.168.2.6173.222.162.64
                            Oct 2, 2024 05:21:13.783571005 CEST49761443192.168.2.6173.222.162.64
                            Oct 2, 2024 05:21:13.783579111 CEST44349761173.222.162.64192.168.2.6
                            Oct 2, 2024 05:21:13.845885992 CEST4434975752.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:13.845922947 CEST4434975752.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:13.845952034 CEST4434975752.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:13.845968962 CEST4434975752.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:13.845974922 CEST49757443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:13.845999002 CEST4434975752.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:13.846008062 CEST4434975752.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:13.846024036 CEST49757443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:13.846045971 CEST4434975752.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:13.846045971 CEST49757443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:13.846057892 CEST4434975752.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:13.846090078 CEST49757443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:13.846095085 CEST4434975752.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:13.846437931 CEST4434975752.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:13.846477032 CEST49757443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:13.866373062 CEST49757443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:13.866388083 CEST4434975752.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:13.866401911 CEST49757443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:13.866406918 CEST4434975752.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:14.397850037 CEST44349761173.222.162.64192.168.2.6
                            Oct 2, 2024 05:21:14.397938967 CEST49761443192.168.2.6173.222.162.64
                            Oct 2, 2024 05:21:14.432660103 CEST49761443192.168.2.6173.222.162.64
                            Oct 2, 2024 05:21:14.432679892 CEST44349761173.222.162.64192.168.2.6
                            Oct 2, 2024 05:21:14.432980061 CEST44349761173.222.162.64192.168.2.6
                            Oct 2, 2024 05:21:14.433041096 CEST49761443192.168.2.6173.222.162.64
                            Oct 2, 2024 05:21:14.433568001 CEST49761443192.168.2.6173.222.162.64
                            Oct 2, 2024 05:21:14.433595896 CEST44349761173.222.162.64192.168.2.6
                            Oct 2, 2024 05:21:14.433764935 CEST49761443192.168.2.6173.222.162.64
                            Oct 2, 2024 05:21:14.479407072 CEST44349761173.222.162.64192.168.2.6
                            Oct 2, 2024 05:21:14.679378986 CEST44349761173.222.162.64192.168.2.6
                            Oct 2, 2024 05:21:14.679445028 CEST49761443192.168.2.6173.222.162.64
                            Oct 2, 2024 05:21:14.679450989 CEST44349761173.222.162.64192.168.2.6
                            Oct 2, 2024 05:21:14.679498911 CEST49761443192.168.2.6173.222.162.64
                            Oct 2, 2024 05:21:17.659811020 CEST49764443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:17.659859896 CEST44349764142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:17.660171986 CEST49764443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:17.660387993 CEST49764443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:17.660401106 CEST44349764142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:18.396991968 CEST44349764142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:18.397243977 CEST49764443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:18.397269011 CEST44349764142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:18.397655964 CEST44349764142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:18.398037910 CEST49764443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:18.398104906 CEST44349764142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:18.398209095 CEST49764443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:18.398248911 CEST49764443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:18.398255110 CEST44349764142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:18.688383102 CEST44349764142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:18.688539028 CEST44349764142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:18.688627005 CEST49764443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:18.692956924 CEST49764443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:18.692981005 CEST44349764142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:20.853537083 CEST49765443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:20.853646994 CEST4434976540.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:20.853790045 CEST49765443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:20.854386091 CEST49765443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:20.854422092 CEST4434976540.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:21.657205105 CEST4434976540.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:21.657311916 CEST49765443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:21.663455963 CEST49765443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:21.663506031 CEST4434976540.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:21.663757086 CEST4434976540.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:21.665899038 CEST49765443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:21.665963888 CEST49765443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:21.665977001 CEST4434976540.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:21.666119099 CEST49765443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:21.711406946 CEST4434976540.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:21.835762024 CEST4434976540.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:21.835851908 CEST4434976540.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:21.835930109 CEST49765443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:21.836102962 CEST49765443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:21.836164951 CEST4434976540.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:39.721919060 CEST49766443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:39.721971989 CEST4434976640.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:39.722070932 CEST49766443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:39.722847939 CEST49766443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:39.722865105 CEST4434976640.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:40.163923979 CEST49767443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:40.164063931 CEST44349767142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:40.164241076 CEST49767443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:40.165462971 CEST49767443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:40.165501118 CEST44349767142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:40.517780066 CEST4434976640.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:40.517920017 CEST49766443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:40.519892931 CEST49766443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:40.519917011 CEST4434976640.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:40.520164013 CEST4434976640.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:40.522401094 CEST49766443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:40.522495031 CEST49766443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:40.522500992 CEST4434976640.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:40.522696018 CEST49766443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:40.563409090 CEST4434976640.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:40.694070101 CEST4434976640.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:40.694248915 CEST4434976640.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:40.694334030 CEST49766443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:40.694891930 CEST49766443192.168.2.640.115.3.253
                            Oct 2, 2024 05:21:40.694917917 CEST4434976640.115.3.253192.168.2.6
                            Oct 2, 2024 05:21:40.793452978 CEST44349767142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:40.793751955 CEST49767443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:40.793800116 CEST44349767142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:40.794189930 CEST44349767142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:40.794656992 CEST49767443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:40.794732094 CEST44349767142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:40.794811010 CEST49767443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:40.794903994 CEST49767443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:40.794915915 CEST44349767142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:40.986155033 CEST44349767142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:40.986310005 CEST44349767142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:40.986382961 CEST49767443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:40.986706018 CEST49767443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:40.986740112 CEST44349767142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:42.786082029 CEST49768443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:42.786130905 CEST44349768142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:42.786196947 CEST49768443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:42.786556005 CEST49768443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:42.786569118 CEST44349768142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:42.986530066 CEST49769443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:42.986573935 CEST44349769142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:42.986654997 CEST49769443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:42.987067938 CEST49769443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:42.987081051 CEST44349769142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:43.428219080 CEST44349768142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:43.428661108 CEST49768443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:43.428694010 CEST44349768142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:43.429214954 CEST44349768142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:43.429546118 CEST49768443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:43.429632902 CEST44349768142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:43.429704905 CEST49768443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:43.429721117 CEST49768443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:43.429737091 CEST44349768142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:43.623600006 CEST44349769142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:43.623806000 CEST49769443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:43.623819113 CEST44349769142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:43.624170065 CEST44349769142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:43.624507904 CEST49769443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:43.624568939 CEST44349769142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:43.624641895 CEST49769443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:43.624658108 CEST49769443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:43.624665976 CEST44349769142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:43.706229925 CEST44349768142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:43.706378937 CEST44349768142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:43.706439972 CEST49768443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:43.706660986 CEST49768443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:43.706686974 CEST44349768142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:43.900573015 CEST44349769142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:43.900713921 CEST44349769142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:43.900779963 CEST49769443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:43.901268005 CEST49769443192.168.2.6142.250.185.174
                            Oct 2, 2024 05:21:43.901287079 CEST44349769142.250.185.174192.168.2.6
                            Oct 2, 2024 05:21:50.271786928 CEST49770443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:50.271848917 CEST4434977052.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:50.271924973 CEST49770443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:50.272352934 CEST49770443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:50.272368908 CEST4434977052.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:50.952024937 CEST4434977052.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:50.952106953 CEST49770443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:50.955312014 CEST49770443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:50.955331087 CEST4434977052.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:50.955670118 CEST4434977052.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:50.970629930 CEST49770443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:51.015405893 CEST4434977052.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:51.218132973 CEST4434977052.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:51.218256950 CEST4434977052.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:51.218300104 CEST4434977052.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:51.218453884 CEST49770443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:51.218477011 CEST4434977052.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:51.218545914 CEST49770443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:51.218604088 CEST49770443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:51.219078064 CEST4434977052.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:51.219144106 CEST4434977052.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:51.219192982 CEST49770443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:51.219204903 CEST4434977052.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:51.219269037 CEST49770443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:51.219347000 CEST4434977052.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:51.219537973 CEST49770443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:51.223865986 CEST49770443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:51.223890066 CEST4434977052.165.165.26192.168.2.6
                            Oct 2, 2024 05:21:51.223908901 CEST49770443192.168.2.652.165.165.26
                            Oct 2, 2024 05:21:51.223915100 CEST4434977052.165.165.26192.168.2.6
                            Oct 2, 2024 05:22:03.764154911 CEST49772443192.168.2.6142.250.184.228
                            Oct 2, 2024 05:22:03.764214993 CEST44349772142.250.184.228192.168.2.6
                            Oct 2, 2024 05:22:03.764324903 CEST49772443192.168.2.6142.250.184.228
                            Oct 2, 2024 05:22:03.764602900 CEST49772443192.168.2.6142.250.184.228
                            Oct 2, 2024 05:22:03.764616966 CEST44349772142.250.184.228192.168.2.6
                            Oct 2, 2024 05:22:04.118715048 CEST49773443192.168.2.640.115.3.253
                            Oct 2, 2024 05:22:04.118750095 CEST4434977340.115.3.253192.168.2.6
                            Oct 2, 2024 05:22:04.118837118 CEST49773443192.168.2.640.115.3.253
                            Oct 2, 2024 05:22:04.119437933 CEST49773443192.168.2.640.115.3.253
                            Oct 2, 2024 05:22:04.119451046 CEST4434977340.115.3.253192.168.2.6
                            Oct 2, 2024 05:22:04.401926041 CEST44349772142.250.184.228192.168.2.6
                            Oct 2, 2024 05:22:04.402267933 CEST49772443192.168.2.6142.250.184.228
                            Oct 2, 2024 05:22:04.402302980 CEST44349772142.250.184.228192.168.2.6
                            Oct 2, 2024 05:22:04.402664900 CEST44349772142.250.184.228192.168.2.6
                            Oct 2, 2024 05:22:04.403008938 CEST49772443192.168.2.6142.250.184.228
                            Oct 2, 2024 05:22:04.403078079 CEST44349772142.250.184.228192.168.2.6
                            Oct 2, 2024 05:22:04.452344894 CEST49772443192.168.2.6142.250.184.228
                            Oct 2, 2024 05:22:04.898664951 CEST4434977340.115.3.253192.168.2.6
                            Oct 2, 2024 05:22:04.898794889 CEST49773443192.168.2.640.115.3.253
                            Oct 2, 2024 05:22:04.900758028 CEST49773443192.168.2.640.115.3.253
                            Oct 2, 2024 05:22:04.900768042 CEST4434977340.115.3.253192.168.2.6
                            Oct 2, 2024 05:22:04.901031017 CEST4434977340.115.3.253192.168.2.6
                            Oct 2, 2024 05:22:04.902899027 CEST49773443192.168.2.640.115.3.253
                            Oct 2, 2024 05:22:04.902935982 CEST49773443192.168.2.640.115.3.253
                            Oct 2, 2024 05:22:04.902941942 CEST4434977340.115.3.253192.168.2.6
                            Oct 2, 2024 05:22:04.903078079 CEST49773443192.168.2.640.115.3.253
                            Oct 2, 2024 05:22:04.947406054 CEST4434977340.115.3.253192.168.2.6
                            Oct 2, 2024 05:22:05.077491045 CEST4434977340.115.3.253192.168.2.6
                            Oct 2, 2024 05:22:05.077589989 CEST4434977340.115.3.253192.168.2.6
                            Oct 2, 2024 05:22:05.077672005 CEST49773443192.168.2.640.115.3.253
                            Oct 2, 2024 05:22:05.078234911 CEST49773443192.168.2.640.115.3.253
                            Oct 2, 2024 05:22:05.078258038 CEST4434977340.115.3.253192.168.2.6
                            Oct 2, 2024 05:22:13.151952982 CEST49775443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:13.152003050 CEST44349775142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:13.152070999 CEST49775443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:13.152306080 CEST49775443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:13.152323961 CEST44349775142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:13.783946037 CEST44349775142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:13.784459114 CEST49775443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:13.784497976 CEST44349775142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:13.784930944 CEST44349775142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:13.785268068 CEST49775443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:13.785352945 CEST44349775142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:13.785433054 CEST49775443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:13.785458088 CEST49775443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:13.785470009 CEST44349775142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:14.059314013 CEST44349775142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:14.059470892 CEST44349775142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:14.059547901 CEST49775443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:14.059966087 CEST49775443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:14.059989929 CEST44349775142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:14.366403103 CEST44349772142.250.184.228192.168.2.6
                            Oct 2, 2024 05:22:14.366468906 CEST44349772142.250.184.228192.168.2.6
                            Oct 2, 2024 05:22:14.366516113 CEST49772443192.168.2.6142.250.184.228
                            Oct 2, 2024 05:22:15.019088984 CEST49772443192.168.2.6142.250.184.228
                            Oct 2, 2024 05:22:15.019164085 CEST44349772142.250.184.228192.168.2.6
                            Oct 2, 2024 05:22:15.019568920 CEST49777443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:15.019620895 CEST44349777142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:15.019690990 CEST49777443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:15.020061970 CEST49777443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:15.020087004 CEST44349777142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:15.736820936 CEST44349777142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:15.737298965 CEST49777443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:15.737318993 CEST44349777142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:15.737683058 CEST44349777142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:15.738028049 CEST49777443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:15.738087893 CEST44349777142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:15.738172054 CEST49777443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:15.738184929 CEST49777443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:15.738194942 CEST44349777142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:16.012896061 CEST44349777142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:16.013073921 CEST44349777142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:16.013171911 CEST49777443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:16.013561964 CEST49777443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:16.013581038 CEST44349777142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:32.359016895 CEST4970480192.168.2.693.184.221.240
                            Oct 2, 2024 05:22:32.364423990 CEST804970493.184.221.240192.168.2.6
                            Oct 2, 2024 05:22:32.364484072 CEST4970480192.168.2.693.184.221.240
                            Oct 2, 2024 05:22:38.339719057 CEST49779443192.168.2.640.115.3.253
                            Oct 2, 2024 05:22:38.339754105 CEST4434977940.115.3.253192.168.2.6
                            Oct 2, 2024 05:22:38.339827061 CEST49779443192.168.2.640.115.3.253
                            Oct 2, 2024 05:22:38.340580940 CEST49779443192.168.2.640.115.3.253
                            Oct 2, 2024 05:22:38.340593100 CEST4434977940.115.3.253192.168.2.6
                            Oct 2, 2024 05:22:39.162889957 CEST4434977940.115.3.253192.168.2.6
                            Oct 2, 2024 05:22:39.162992001 CEST49779443192.168.2.640.115.3.253
                            Oct 2, 2024 05:22:39.167076111 CEST49779443192.168.2.640.115.3.253
                            Oct 2, 2024 05:22:39.167112112 CEST4434977940.115.3.253192.168.2.6
                            Oct 2, 2024 05:22:39.167399883 CEST4434977940.115.3.253192.168.2.6
                            Oct 2, 2024 05:22:39.169310093 CEST49779443192.168.2.640.115.3.253
                            Oct 2, 2024 05:22:39.169356108 CEST49779443192.168.2.640.115.3.253
                            Oct 2, 2024 05:22:39.169369936 CEST4434977940.115.3.253192.168.2.6
                            Oct 2, 2024 05:22:39.169490099 CEST49779443192.168.2.640.115.3.253
                            Oct 2, 2024 05:22:39.211424112 CEST4434977940.115.3.253192.168.2.6
                            Oct 2, 2024 05:22:39.346990108 CEST4434977940.115.3.253192.168.2.6
                            Oct 2, 2024 05:22:39.347088099 CEST4434977940.115.3.253192.168.2.6
                            Oct 2, 2024 05:22:39.347162962 CEST49779443192.168.2.640.115.3.253
                            Oct 2, 2024 05:22:39.347400904 CEST49779443192.168.2.640.115.3.253
                            Oct 2, 2024 05:22:39.347425938 CEST4434977940.115.3.253192.168.2.6
                            Oct 2, 2024 05:22:45.254750013 CEST49780443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:45.254808903 CEST44349780142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:45.254899025 CEST49780443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:45.255291939 CEST49780443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:45.255304098 CEST44349780142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:45.376084089 CEST49781443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:45.376126051 CEST44349781142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:45.376291037 CEST49781443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:45.376656055 CEST49781443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:45.376671076 CEST44349781142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:45.883589029 CEST44349780142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:45.931629896 CEST49780443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:45.932333946 CEST49780443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:45.932344913 CEST44349780142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:45.932979107 CEST44349780142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:45.933852911 CEST49780443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:45.933924913 CEST44349780142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:45.934053898 CEST49780443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:45.934096098 CEST49780443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:45.934140921 CEST44349780142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:46.024794102 CEST44349781142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:46.066833973 CEST49781443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:46.083827019 CEST49781443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:46.083848953 CEST44349781142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:46.084346056 CEST44349781142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:46.090766907 CEST49781443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:46.090900898 CEST44349781142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:46.112798929 CEST49781443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:46.117408037 CEST49781443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:46.117420912 CEST44349781142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:46.161298990 CEST44349780142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:46.161462069 CEST44349780142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:46.161519051 CEST49780443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:46.161772966 CEST49780443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:46.161796093 CEST44349780142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:46.310136080 CEST44349781142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:46.310297012 CEST44349781142.250.184.238192.168.2.6
                            Oct 2, 2024 05:22:46.310372114 CEST49781443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:46.311373949 CEST49781443192.168.2.6142.250.184.238
                            Oct 2, 2024 05:22:46.311398983 CEST44349781142.250.184.238192.168.2.6
                            TimestampSource PortDest PortSource IPDest IP
                            Oct 2, 2024 05:20:59.425117970 CEST53566011.1.1.1192.168.2.6
                            Oct 2, 2024 05:20:59.480920076 CEST6396053192.168.2.61.1.1.1
                            Oct 2, 2024 05:20:59.481120110 CEST5170353192.168.2.61.1.1.1
                            Oct 2, 2024 05:20:59.488035917 CEST53639601.1.1.1192.168.2.6
                            Oct 2, 2024 05:20:59.488378048 CEST53517031.1.1.1192.168.2.6
                            Oct 2, 2024 05:20:59.543005943 CEST53563331.1.1.1192.168.2.6
                            Oct 2, 2024 05:21:00.437930107 CEST5222053192.168.2.61.1.1.1
                            Oct 2, 2024 05:21:00.437930107 CEST5442353192.168.2.61.1.1.1
                            Oct 2, 2024 05:21:00.445889950 CEST53522201.1.1.1192.168.2.6
                            Oct 2, 2024 05:21:00.446067095 CEST53544231.1.1.1192.168.2.6
                            Oct 2, 2024 05:21:00.518311024 CEST53522481.1.1.1192.168.2.6
                            Oct 2, 2024 05:21:03.712667942 CEST5849253192.168.2.61.1.1.1
                            Oct 2, 2024 05:21:03.713046074 CEST6243153192.168.2.61.1.1.1
                            Oct 2, 2024 05:21:03.719297886 CEST53584921.1.1.1192.168.2.6
                            Oct 2, 2024 05:21:03.719706059 CEST53624311.1.1.1192.168.2.6
                            Oct 2, 2024 05:21:03.783286095 CEST53580371.1.1.1192.168.2.6
                            Oct 2, 2024 05:21:06.058168888 CEST53630431.1.1.1192.168.2.6
                            Oct 2, 2024 05:21:08.599636078 CEST6231453192.168.2.61.1.1.1
                            Oct 2, 2024 05:21:08.599937916 CEST5573253192.168.2.61.1.1.1
                            Oct 2, 2024 05:21:08.608045101 CEST53623141.1.1.1192.168.2.6
                            Oct 2, 2024 05:21:08.608072042 CEST53557321.1.1.1192.168.2.6
                            Oct 2, 2024 05:21:10.012792110 CEST5577553192.168.2.61.1.1.1
                            Oct 2, 2024 05:21:10.012948990 CEST6397953192.168.2.61.1.1.1
                            Oct 2, 2024 05:21:10.019378901 CEST53557751.1.1.1192.168.2.6
                            Oct 2, 2024 05:21:10.019449949 CEST53639791.1.1.1192.168.2.6
                            Oct 2, 2024 05:21:17.615504026 CEST53560861.1.1.1192.168.2.6
                            Oct 2, 2024 05:21:36.572798014 CEST53572531.1.1.1192.168.2.6
                            Oct 2, 2024 05:21:58.978550911 CEST53556651.1.1.1192.168.2.6
                            Oct 2, 2024 05:21:59.296248913 CEST53500721.1.1.1192.168.2.6
                            Oct 2, 2024 05:22:10.683661938 CEST53524341.1.1.1192.168.2.6
                            Oct 2, 2024 05:22:13.144520044 CEST5028853192.168.2.61.1.1.1
                            Oct 2, 2024 05:22:13.144674063 CEST6052353192.168.2.61.1.1.1
                            Oct 2, 2024 05:22:13.151418924 CEST53605231.1.1.1192.168.2.6
                            Oct 2, 2024 05:22:13.151438951 CEST53502881.1.1.1192.168.2.6
                            Oct 2, 2024 05:22:27.602153063 CEST53552201.1.1.1192.168.2.6
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Oct 2, 2024 05:20:59.480920076 CEST192.168.2.61.1.1.10xe678Standard query (0)youtube.comA (IP address)IN (0x0001)false
                            Oct 2, 2024 05:20:59.481120110 CEST192.168.2.61.1.1.10x3612Standard query (0)youtube.com65IN (0x0001)false
                            Oct 2, 2024 05:21:00.437930107 CEST192.168.2.61.1.1.10x7da1Standard query (0)www.youtube.comA (IP address)IN (0x0001)false
                            Oct 2, 2024 05:21:00.437930107 CEST192.168.2.61.1.1.10x3b98Standard query (0)www.youtube.com65IN (0x0001)false
                            Oct 2, 2024 05:21:03.712667942 CEST192.168.2.61.1.1.10x31daStandard query (0)www.google.comA (IP address)IN (0x0001)false
                            Oct 2, 2024 05:21:03.713046074 CEST192.168.2.61.1.1.10x2c77Standard query (0)www.google.com65IN (0x0001)false
                            Oct 2, 2024 05:21:08.599636078 CEST192.168.2.61.1.1.10x4fc5Standard query (0)accounts.youtube.comA (IP address)IN (0x0001)false
                            Oct 2, 2024 05:21:08.599937916 CEST192.168.2.61.1.1.10x69edStandard query (0)accounts.youtube.com65IN (0x0001)false
                            Oct 2, 2024 05:21:10.012792110 CEST192.168.2.61.1.1.10x56faStandard query (0)play.google.comA (IP address)IN (0x0001)false
                            Oct 2, 2024 05:21:10.012948990 CEST192.168.2.61.1.1.10x84c7Standard query (0)play.google.com65IN (0x0001)false
                            Oct 2, 2024 05:22:13.144520044 CEST192.168.2.61.1.1.10x2425Standard query (0)play.google.comA (IP address)IN (0x0001)false
                            Oct 2, 2024 05:22:13.144674063 CEST192.168.2.61.1.1.10x5af4Standard query (0)play.google.com65IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Oct 2, 2024 05:20:59.488035917 CEST1.1.1.1192.168.2.60xe678No error (0)youtube.com216.58.206.78A (IP address)IN (0x0001)false
                            Oct 2, 2024 05:20:59.488378048 CEST1.1.1.1192.168.2.60x3612No error (0)youtube.com65IN (0x0001)false
                            Oct 2, 2024 05:21:00.445889950 CEST1.1.1.1192.168.2.60x7da1No error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                            Oct 2, 2024 05:21:00.445889950 CEST1.1.1.1192.168.2.60x7da1No error (0)youtube-ui.l.google.com142.250.181.238A (IP address)IN (0x0001)false
                            Oct 2, 2024 05:21:00.445889950 CEST1.1.1.1192.168.2.60x7da1No error (0)youtube-ui.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                            Oct 2, 2024 05:21:00.445889950 CEST1.1.1.1192.168.2.60x7da1No error (0)youtube-ui.l.google.com142.250.186.142A (IP address)IN (0x0001)false
                            Oct 2, 2024 05:21:00.445889950 CEST1.1.1.1192.168.2.60x7da1No error (0)youtube-ui.l.google.com142.250.186.78A (IP address)IN (0x0001)false
                            Oct 2, 2024 05:21:00.445889950 CEST1.1.1.1192.168.2.60x7da1No error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                            Oct 2, 2024 05:21:00.445889950 CEST1.1.1.1192.168.2.60x7da1No error (0)youtube-ui.l.google.com142.250.185.78A (IP address)IN (0x0001)false
                            Oct 2, 2024 05:21:00.445889950 CEST1.1.1.1192.168.2.60x7da1No error (0)youtube-ui.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                            Oct 2, 2024 05:21:00.445889950 CEST1.1.1.1192.168.2.60x7da1No error (0)youtube-ui.l.google.com216.58.206.78A (IP address)IN (0x0001)false
                            Oct 2, 2024 05:21:00.445889950 CEST1.1.1.1192.168.2.60x7da1No error (0)youtube-ui.l.google.com216.58.206.46A (IP address)IN (0x0001)false
                            Oct 2, 2024 05:21:00.445889950 CEST1.1.1.1192.168.2.60x7da1No error (0)youtube-ui.l.google.com172.217.23.110A (IP address)IN (0x0001)false
                            Oct 2, 2024 05:21:00.445889950 CEST1.1.1.1192.168.2.60x7da1No error (0)youtube-ui.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                            Oct 2, 2024 05:21:00.445889950 CEST1.1.1.1192.168.2.60x7da1No error (0)youtube-ui.l.google.com142.250.184.206A (IP address)IN (0x0001)false
                            Oct 2, 2024 05:21:00.445889950 CEST1.1.1.1192.168.2.60x7da1No error (0)youtube-ui.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                            Oct 2, 2024 05:21:00.445889950 CEST1.1.1.1192.168.2.60x7da1No error (0)youtube-ui.l.google.com142.250.185.238A (IP address)IN (0x0001)false
                            Oct 2, 2024 05:21:00.445889950 CEST1.1.1.1192.168.2.60x7da1No error (0)youtube-ui.l.google.com142.250.185.110A (IP address)IN (0x0001)false
                            Oct 2, 2024 05:21:00.445889950 CEST1.1.1.1192.168.2.60x7da1No error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                            Oct 2, 2024 05:21:00.446067095 CEST1.1.1.1192.168.2.60x3b98No error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                            Oct 2, 2024 05:21:00.446067095 CEST1.1.1.1192.168.2.60x3b98No error (0)youtube-ui.l.google.com65IN (0x0001)false
                            Oct 2, 2024 05:21:03.719297886 CEST1.1.1.1192.168.2.60x31daNo error (0)www.google.com142.250.184.228A (IP address)IN (0x0001)false
                            Oct 2, 2024 05:21:03.719706059 CEST1.1.1.1192.168.2.60x2c77No error (0)www.google.com65IN (0x0001)false
                            Oct 2, 2024 05:21:08.608045101 CEST1.1.1.1192.168.2.60x4fc5No error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                            Oct 2, 2024 05:21:08.608045101 CEST1.1.1.1192.168.2.60x4fc5No error (0)www3.l.google.com142.250.74.206A (IP address)IN (0x0001)false
                            Oct 2, 2024 05:21:08.608072042 CEST1.1.1.1192.168.2.60x69edNo error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                            Oct 2, 2024 05:21:10.019378901 CEST1.1.1.1192.168.2.60x56faNo error (0)play.google.com142.250.185.174A (IP address)IN (0x0001)false
                            Oct 2, 2024 05:22:13.151438951 CEST1.1.1.1192.168.2.60x2425No error (0)play.google.com142.250.184.238A (IP address)IN (0x0001)false
                            • youtube.com
                            • www.youtube.com
                            • fs.microsoft.com
                            • https:
                              • accounts.youtube.com
                              • www.google.com
                              • play.google.com
                              • www.bing.com
                            • slscr.update.microsoft.com
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.649710216.58.206.784431588C:\Program Files\Google\Chrome\Application\chrome.exe
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:21:00 UTC847OUTGET /account?=https://accounts.google.com/v3/signin/challenge/pwd HTTP/1.1
                            Host: youtube.com
                            Connection: keep-alive
                            sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                            sec-ch-ua-mobile: ?0
                            sec-ch-ua-platform: "Windows"
                            Upgrade-Insecure-Requests: 1
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                            X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlKHLAQj6mM0BCIWgzQEI3L3NAQiPys0BCLnKzQEI6dLNAQjo1c0BCMvWzQEIqNjNAQj5wNQVGLrSzQEY642lFw==
                            Sec-Fetch-Site: none
                            Sec-Fetch-Mode: navigate
                            Sec-Fetch-User: ?1
                            Sec-Fetch-Dest: document
                            Accept-Encoding: gzip, deflate, br
                            Accept-Language: en-US,en;q=0.9
                            2024-10-02 03:21:00 UTC1704INHTTP/1.1 301 Moved Permanently
                            Content-Type: application/binary
                            X-Content-Type-Options: nosniff
                            Expires: Wed, 02 Oct 2024 03:21:00 GMT
                            Date: Wed, 02 Oct 2024 03:21:00 GMT
                            Cache-Control: private, max-age=31536000
                            Location: https://www.youtube.com/account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd
                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                            X-Frame-Options: SAMEORIGIN
                            Report-To: {"group":"youtube_main","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/youtube_main"}]}
                            Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                            Vary: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                            Origin-Trial: AmhMBR6zCLzDDxpW+HfpP67BqwIknWnyMOXOQGfzYswFmJe+fgaI6XZgAzcxOrzNtP7hEDsOo1jdjFnVr2IdxQ4AAAB4eyJvcmlnaW4iOiJodHRwczovL3lvdXR1YmUuY29tOjQ0MyIsImZlYXR1cmUiOiJXZWJWaWV3WFJlcXVlc3RlZFdpdGhEZXByZWNhdGlvbiIsImV4cGlyeSI6MTc1ODA2NzE5OSwiaXNTdWJkb21haW4iOnRydWV9
                            Content-Security-Policy: require-trusted-types-for 'script'
                            Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="youtube_main"
                            Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                            Server: ESF
                            Content-Length: 0
                            X-XSS-Protection: 0
                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                            Connection: close


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            1192.168.2.649716142.250.181.2384431588C:\Program Files\Google\Chrome\Application\chrome.exe
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:21:01 UTC865OUTGET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1
                            Host: www.youtube.com
                            Connection: keep-alive
                            Upgrade-Insecure-Requests: 1
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                            X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlKHLAQj6mM0BCIWgzQEI3L3NAQiPys0BCLnKzQEI6dLNAQjo1c0BCMvWzQEIqNjNAQj5wNQVGLrSzQEY642lFw==
                            Sec-Fetch-Site: none
                            Sec-Fetch-Mode: navigate
                            Sec-Fetch-User: ?1
                            Sec-Fetch-Dest: document
                            sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                            sec-ch-ua-mobile: ?0
                            sec-ch-ua-platform: "Windows"
                            Accept-Encoding: gzip, deflate, br
                            Accept-Language: en-US,en;q=0.9
                            2024-10-02 03:21:01 UTC2634INHTTP/1.1 303 See Other
                            Content-Type: application/binary
                            X-Content-Type-Options: nosniff
                            Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                            Pragma: no-cache
                            Expires: Mon, 01 Jan 1990 00:00:00 GMT
                            Date: Wed, 02 Oct 2024 03:21:01 GMT
                            Location: https://accounts.google.com/ServiceLogin?service=youtube&uilel=3&passive=true&continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%253F%253Dhttps%25253A%25252F%25252Faccounts.google.com%25252Fv3%25252Fsignin%25252Fchallenge%25252Fpwd%26feature%3Dredirect_login&hl=en
                            X-Frame-Options: SAMEORIGIN
                            Strict-Transport-Security: max-age=31536000
                            Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                            Vary: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                            Content-Security-Policy: require-trusted-types-for 'script'
                            Report-To: {"group":"youtube_main","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/youtube_main"}]}
                            Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="youtube_main"
                            Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                            Origin-Trial: AmhMBR6zCLzDDxpW+HfpP67BqwIknWnyMOXOQGfzYswFmJe+fgaI6XZgAzcxOrzNtP7hEDsOo1jdjFnVr2IdxQ4AAAB4eyJvcmlnaW4iOiJodHRwczovL3lvdXR1YmUuY29tOjQ0MyIsImZlYXR1cmUiOiJXZWJWaWV3WFJlcXVlc3RlZFdpdGhEZXByZWNhdGlvbiIsImV4cGlyeSI6MTc1ODA2NzE5OSwiaXNTdWJkb21haW4iOnRydWV9
                            P3P: CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657?hl=en for more info."
                            Server: ESF
                            Content-Length: 0
                            X-XSS-Protection: 0
                            Set-Cookie: GPS=1; Domain=.youtube.com; Expires=Wed, 02-Oct-2024 03:51:01 GMT; Path=/; Secure; HttpOnly
                            Set-Cookie: YSC=e4j6DAgP0O4; Domain=.youtube.com; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                            Set-Cookie: VISITOR_INFO1_LIVE=EQiTx6q9SBM; Domain=.youtube.com; Expires=Mon, 31-Mar-2025 03:21:01 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                            Set-Cookie: VISITOR_PRIVACY_METADATA=CgJVUxIEGgAgVA%3D%3D; Domain=.youtube.com; Expires=Mon, 31-Mar-2025 03:21:01 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                            Connection: close


                            Session IDSource IPSource PortDestination IPDestination Port
                            2192.168.2.64971740.115.3.253443
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:21:01 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 37 45 48 54 6b 6d 42 43 6c 55 57 35 49 6e 5a 34 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 63 36 36 33 64 61 62 33 38 33 30 30 38 62 37 30 0d 0a 0d 0a
                            Data Ascii: CNT 1 CON 305MS-CV: 7EHTkmBClUW5InZ4.1Context: c663dab383008b70
                            2024-10-02 03:21:01 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                            Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                            2024-10-02 03:21:01 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 37 45 48 54 6b 6d 42 43 6c 55 57 35 49 6e 5a 34 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 63 36 36 33 64 61 62 33 38 33 30 30 38 62 37 30 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 62 49 64 52 72 6a 6e 62 75 76 56 6b 53 7a 33 56 4c 71 52 63 4c 4c 39 73 4f 38 46 6e 4c 6f 47 49 45 33 6e 52 79 66 39 34 55 4a 63 32 2f 62 65 30 75 34 6b 6d 66 30 6c 47 5a 4d 58 2b 35 59 55 48 45 78 62 4c 6f 59 6d 65 50 78 44 7a 4a 55 2b 57 34 54 42 57 68 2f 2f 56 57 72 35 71 48 67 65 6b 33 6d 57 37 6e 6a 45 34 54 6c 62 50 77
                            Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: 7EHTkmBClUW5InZ4.2Context: c663dab383008b70<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAbIdRrjnbuvVkSz3VLqRcLL9sO8FnLoGIE3nRyf94UJc2/be0u4kmf0lGZMX+5YUHExbLoYmePxDzJU+W4TBWh//VWr5qHgek3mW7njE4TlbPw
                            2024-10-02 03:21:01 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 37 45 48 54 6b 6d 42 43 6c 55 57 35 49 6e 5a 34 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 63 36 36 33 64 61 62 33 38 33 30 30 38 62 37 30 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                            Data Ascii: BND 3 CON\WNS 0 197MS-CV: 7EHTkmBClUW5InZ4.3Context: c663dab383008b70<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                            2024-10-02 03:21:01 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                            Data Ascii: 202 1 CON 58
                            2024-10-02 03:21:01 UTC58INData Raw: 4d 53 2d 43 56 3a 20 65 51 2f 68 33 48 41 69 67 30 53 62 51 70 72 72 61 42 50 46 62 51 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                            Data Ascii: MS-CV: eQ/h3HAig0SbQprraBPFbQ.0Payload parsing failed.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            3192.168.2.649726184.28.90.27443
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:21:04 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
                            Connection: Keep-Alive
                            Accept: */*
                            Accept-Encoding: identity
                            User-Agent: Microsoft BITS/7.8
                            Host: fs.microsoft.com
                            2024-10-02 03:21:05 UTC467INHTTP/1.1 200 OK
                            Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                            Content-Type: application/octet-stream
                            ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                            Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                            Server: ECAcc (lpl/EF06)
                            X-CID: 11
                            X-Ms-ApiVersion: Distribute 1.2
                            X-Ms-Region: prod-neu-z1
                            Cache-Control: public, max-age=134686
                            Date: Wed, 02 Oct 2024 03:21:04 GMT
                            Connection: close
                            X-CID: 2


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            4192.168.2.649728184.28.90.27443
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:21:06 UTC239OUTGET /fs/windows/config.json HTTP/1.1
                            Connection: Keep-Alive
                            Accept: */*
                            Accept-Encoding: identity
                            If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
                            Range: bytes=0-2147483646
                            User-Agent: Microsoft BITS/7.8
                            Host: fs.microsoft.com
                            2024-10-02 03:21:06 UTC515INHTTP/1.1 200 OK
                            ApiVersion: Distribute 1.1
                            Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                            Content-Type: application/octet-stream
                            ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                            Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                            Server: ECAcc (lpl/EF06)
                            X-CID: 11
                            X-Ms-ApiVersion: Distribute 1.2
                            X-Ms-Region: prod-weu-z1
                            Cache-Control: public, max-age=134628
                            Date: Wed, 02 Oct 2024 03:21:06 GMT
                            Content-Length: 55
                            Connection: close
                            X-CID: 2
                            2024-10-02 03:21:06 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
                            Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            5192.168.2.649742142.250.74.2064431588C:\Program Files\Google\Chrome\Application\chrome.exe
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:21:09 UTC1212OUTGET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=1216272960&timestamp=1727839267352 HTTP/1.1
                            Host: accounts.youtube.com
                            Connection: keep-alive
                            sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                            sec-ch-ua-mobile: ?0
                            sec-ch-ua-full-version: "117.0.5938.134"
                            sec-ch-ua-arch: "x86"
                            sec-ch-ua-platform: "Windows"
                            sec-ch-ua-platform-version: "10.0.0"
                            sec-ch-ua-model: ""
                            sec-ch-ua-bitness: "64"
                            sec-ch-ua-wow64: ?0
                            sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                            Upgrade-Insecure-Requests: 1
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                            X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlKHLAQj6mM0BCIWgzQEI3L3NAQiPys0BCLnKzQEI6dLNAQjo1c0BCMvWzQEIqNjNAQj5wNQVGLrSzQEY642lFw==
                            Sec-Fetch-Site: cross-site
                            Sec-Fetch-Mode: navigate
                            Sec-Fetch-Dest: iframe
                            Referer: https://accounts.google.com/
                            Accept-Encoding: gzip, deflate, br
                            Accept-Language: en-US,en;q=0.9
                            2024-10-02 03:21:09 UTC1969INHTTP/1.1 200 OK
                            Content-Type: text/html; charset=utf-8
                            X-Frame-Options: ALLOW-FROM https://accounts.google.com
                            Content-Security-Policy: frame-ancestors https://accounts.google.com
                            Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport
                            Content-Security-Policy: script-src 'report-sample' 'nonce-lPMInosjx6I9BP_xhbV17w' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport;worker-src 'self'
                            Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport/allowlist
                            Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                            Pragma: no-cache
                            Expires: Mon, 01 Jan 1990 00:00:00 GMT
                            Date: Wed, 02 Oct 2024 03:21:09 GMT
                            Cross-Origin-Resource-Policy: cross-origin
                            Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                            Cross-Origin-Opener-Policy: same-origin
                            Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                            reporting-endpoints: default="/_/AccountsDomainCookiesCheckConnectionHttp/web-reports?context=eJzjstDikmLw0pBikPj6kkkNiJ3SZ7AGAHHSv_OsBUB8ufsS63UgVu25xGoMxEUSV1gbgFiIh2Ppj0_b2QQ2PNz1glFJLym_MD4zJTWvJLOkMiU_NzEzLzk_Pzsztbg4tagstSjeyMDIxMDSyEjPwCK-wAAA_-wuIQ"
                            Server: ESF
                            X-XSS-Protection: 0
                            X-Content-Type-Options: nosniff
                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                            Accept-Ranges: none
                            Vary: Accept-Encoding
                            Connection: close
                            Transfer-Encoding: chunked
                            2024-10-02 03:21:09 UTC1969INData Raw: 37 36 31 39 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 20 6e 6f 6e 63 65 3d 22 6c 50 4d 49 6e 6f 73 6a 78 36 49 39 42 50 5f 78 68 62 56 31 37 77 22 3e 22 75 73 65 20 73 74 72 69 63 74 22 3b 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 3d 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 7c 7c 7b 7d 3b 28 66 75 6e 63 74 69 6f 6e 28 5f 29 7b 76 61 72 20 77 69 6e 64 6f 77 3d 74 68 69 73 3b 0a 74 72 79 7b 0a 5f 2e 5f 46 5f 74 6f 67 67 6c 65 73 5f 69 6e 69 74 69 61 6c 69 7a 65 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 28 74 79 70 65 6f
                            Data Ascii: 7619<html><head><script nonce="lPMInosjx6I9BP_xhbV17w">"use strict";this.default_AccountsDomaincookiesCheckconnectionJs=this.default_AccountsDomaincookiesCheckconnectionJs||{};(function(_){var window=this;try{_._F_toggles_initialize=function(a){(typeo
                            2024-10-02 03:21:09 UTC1969INData Raw: 54 72 69 64 65 6e 74 5c 2f 28 5c 64 2e 5c 64 29 2f 2e 65 78 65 63 28 62 29 2c 0a 63 5b 31 5d 3d 3d 22 37 2e 30 22 29 69 66 28 62 26 26 62 5b 31 5d 29 73 77 69 74 63 68 28 62 5b 31 5d 29 7b 63 61 73 65 20 22 34 2e 30 22 3a 61 3d 22 38 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 35 2e 30 22 3a 61 3d 22 39 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 36 2e 30 22 3a 61 3d 22 31 30 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 37 2e 30 22 3a 61 3d 22 31 31 2e 30 22 7d 65 6c 73 65 20 61 3d 22 37 2e 30 22 3b 65 6c 73 65 20 61 3d 63 5b 31 5d 3b 62 3d 61 7d 65 6c 73 65 20 62 3d 22 22 3b 72 65 74 75 72 6e 20 62 7d 76 61 72 20 64 3d 52 65 67 45 78 70 28 22 28 5b 41 2d 5a 5d 5b 5c 5c 77 20 5d 2b 29 2f 28 5b 5e 5c 5c 73 5d 2b 29 5c 5c 73 2a 28 3f 3a 5c 5c 28
                            Data Ascii: Trident\/(\d.\d)/.exec(b),c[1]=="7.0")if(b&&b[1])switch(b[1]){case "4.0":a="8.0";break;case "5.0":a="9.0";break;case "6.0":a="10.0";break;case "7.0":a="11.0"}else a="7.0";else a=c[1];b=a}else b="";return b}var d=RegExp("([A-Z][\\w ]+)/([^\\s]+)\\s*(?:\\(
                            2024-10-02 03:21:09 UTC1969INData Raw: 74 63 68 28 74 79 70 65 6f 66 20 61 29 7b 63 61 73 65 20 22 6e 75 6d 62 65 72 22 3a 72 65 74 75 72 6e 20 69 73 46 69 6e 69 74 65 28 61 29 3f 61 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 69 67 69 6e 74 22 3a 72 65 74 75 72 6e 28 41 61 3f 0a 61 3e 3d 42 61 26 26 61 3c 3d 43 61 3a 61 5b 30 5d 3d 3d 3d 22 2d 22 3f 75 61 28 61 2c 44 61 29 3a 75 61 28 61 2c 45 61 29 29 3f 4e 75 6d 62 65 72 28 61 29 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 72 65 74 75 72 6e 20 61 3f 31 3a 30 3b 63 61 73 65 20 22 6f 62 6a 65 63 74 22 3a 69 66 28 61 29 69 66 28 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 61 29 29 7b 69 66 28 43 28 61 29 29 72 65 74 75 72 6e 7d 65 6c 73 65 20 69 66 28 46 61 26 26 61 21 3d 6e 75 6c 6c 26 26 61 20 69 6e
                            Data Ascii: tch(typeof a){case "number":return isFinite(a)?a:String(a);case "bigint":return(Aa?a>=Ba&&a<=Ca:a[0]==="-"?ua(a,Da):ua(a,Ea))?Number(a):String(a);case "boolean":return a?1:0;case "object":if(a)if(Array.isArray(a)){if(C(a))return}else if(Fa&&a!=null&&a in
                            2024-10-02 03:21:09 UTC1969INData Raw: 7b 76 61 72 20 62 3b 69 66 28 61 26 26 28 62 3d 51 61 29 21 3d 6e 75 6c 6c 26 26 62 2e 68 61 73 28 61 29 26 26 28 62 3d 61 2e 43 29 29 66 6f 72 28 76 61 72 20 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 62 5b 63 5d 3b 69 66 28 63 3d 3d 3d 62 2e 6c 65 6e 67 74 68 2d 31 26 26 41 28 64 29 29 66 6f 72 28 76 61 72 20 65 20 69 6e 20 64 29 7b 76 61 72 20 66 3d 64 5b 65 5d 3b 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 66 29 26 26 0a 52 61 28 66 2c 61 29 7d 65 6c 73 65 20 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 64 29 26 26 52 61 28 64 2c 61 29 7d 61 3d 45 3f 61 2e 43 3a 4d 61 28 61 2e 43 2c 50 61 2c 76 6f 69 64 20 30 2c 76 6f 69 64 20 30 2c 21 31 29 3b 65 3d 21 45 3b 69 66 28 62 3d 61 2e 6c 65 6e 67 74 68 29 7b 64 3d 61 5b 62 2d
                            Data Ascii: {var b;if(a&&(b=Qa)!=null&&b.has(a)&&(b=a.C))for(var c=0;c<b.length;c++){var d=b[c];if(c===b.length-1&&A(d))for(var e in d){var f=d[e];Array.isArray(f)&&Ra(f,a)}else Array.isArray(d)&&Ra(d,a)}a=E?a.C:Ma(a.C,Pa,void 0,void 0,!1);e=!E;if(b=a.length){d=a[b-
                            2024-10-02 03:21:09 UTC1969INData Raw: 6f 6c 2e 69 74 65 72 61 74 6f 72 22 2c 66 75 6e 63 74 69 6f 6e 28 61 29 7b 69 66 28 61 29 72 65 74 75 72 6e 20 61 3b 61 3d 53 79 6d 62 6f 6c 28 22 63 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 22 41 72 72 61 79 20 49 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 43 6c 61 6d 70 65 64 41 72 72 61 79 20 49 6e 74 31 36 41 72 72 61 79 20 55 69 6e 74 31 36 41 72 72 61 79 20 49 6e 74 33 32 41 72 72 61 79 20 55 69 6e 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 36 34 41 72 72 61 79 22 2e 73 70 6c 69 74 28 22 20 22 29 2c 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 57 61 5b 62 5b 63 5d 5d 3b 74 79 70 65 6f 66 20 64 3d 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 26 26 74 79 70 65
                            Data Ascii: ol.iterator",function(a){if(a)return a;a=Symbol("c");for(var b="Array Int8Array Uint8Array Uint8ClampedArray Int16Array Uint16Array Int32Array Uint32Array Float32Array Float64Array".split(" "),c=0;c<b.length;c++){var d=Wa[b[c]];typeof d==="function"&&type
                            2024-10-02 03:21:09 UTC1969INData Raw: 29 3b 65 28 22 66 72 65 65 7a 65 22 29 3b 65 28 22 70 72 65 76 65 6e 74 45 78 74 65 6e 73 69 6f 6e 73 22 29 3b 65 28 22 73 65 61 6c 22 29 3b 76 61 72 20 68 3d 30 2c 67 3d 66 75 6e 63 74 69 6f 6e 28 6b 29 7b 74 68 69 73 2e 67 3d 28 68 2b 3d 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2b 31 29 2e 74 6f 53 74 72 69 6e 67 28 29 3b 69 66 28 6b 29 7b 6b 3d 48 28 6b 29 3b 66 6f 72 28 76 61 72 20 6c 3b 21 28 6c 3d 6b 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6c 3d 6c 2e 76 61 6c 75 65 2c 74 68 69 73 2e 73 65 74 28 6c 5b 30 5d 2c 6c 5b 31 5d 29 7d 7d 3b 67 2e 70 72 6f 74 6f 74 79 70 65 2e 73 65 74 3d 66 75 6e 63 74 69 6f 6e 28 6b 2c 6c 29 7b 69 66 28 21 63 28 6b 29 29 74 68 72 6f 77 20 45 72 72 6f 72 28 22 69 22 29 3b 64 28 6b 29 3b 69 66 28 21 49 28 6b 2c 66 29 29
                            Data Ascii: );e("freeze");e("preventExtensions");e("seal");var h=0,g=function(k){this.g=(h+=Math.random()+1).toString();if(k){k=H(k);for(var l;!(l=k.next()).done;)l=l.value,this.set(l[0],l[1])}};g.prototype.set=function(k,l){if(!c(k))throw Error("i");d(k);if(!I(k,f))
                            2024-10-02 03:21:09 UTC1969INData Raw: 75 72 6e 20 67 2e 76 61 6c 75 65 7d 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 2e 66 6f 72 45 61 63 68 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 66 6f 72 28 76 61 72 20 6c 3d 74 68 69 73 2e 65 6e 74 72 69 65 73 28 29 2c 6d 3b 21 28 6d 3d 6c 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6d 3d 0a 6d 2e 76 61 6c 75 65 2c 67 2e 63 61 6c 6c 28 6b 2c 6d 5b 31 5d 2c 6d 5b 30 5d 2c 74 68 69 73 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 5b 53 79 6d 62 6f 6c 2e 69 74 65 72 61 74 6f 72 5d 3d 63 2e 70 72 6f 74 6f 74 79 70 65 2e 65 6e 74 72 69 65 73 3b 76 61 72 20 64 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 76 61 72 20 6c 3d 6b 26 26 74 79 70 65 6f 66 20 6b 3b 6c 3d 3d 22 6f 62 6a 65 63 74 22 7c 7c 6c 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 3f 62 2e 68 61 73 28 6b 29
                            Data Ascii: urn g.value})};c.prototype.forEach=function(g,k){for(var l=this.entries(),m;!(m=l.next()).done;)m=m.value,g.call(k,m[1],m[0],this)};c.prototype[Symbol.iterator]=c.prototype.entries;var d=function(g,k){var l=k&&typeof k;l=="object"||l=="function"?b.has(k)
                            2024-10-02 03:21:09 UTC1969INData Raw: 6f 6e 28 61 29 7b 72 65 74 75 72 6e 20 61 3f 61 3a 66 75 6e 63 74 69 6f 6e 28 62 29 7b 72 65 74 75 72 6e 20 74 79 70 65 6f 66 20 62 3d 3d 3d 22 6e 75 6d 62 65 72 22 26 26 69 73 4e 61 4e 28 62 29 7d 7d 29 3b 76 61 72 20 66 62 3d 66 62 7c 7c 7b 7d 2c 71 3d 74 68 69 73 7c 7c 73 65 6c 66 2c 67 62 3d 71 2e 5f 46 5f 74 6f 67 67 6c 65 73 7c 7c 5b 5d 2c 68 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 61 3d 61 2e 73 70 6c 69 74 28 22 2e 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 71 2c 63 3d 30 3b 63 3c 61 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 69 66 28 62 3d 62 5b 61 5b 63 5d 5d 2c 62 3d 3d 6e 75 6c 6c 29 72 65 74 75 72 6e 20 6e 75 6c 6c 3b 72 65 74 75 72 6e 20 62 7d 2c 69 62 3d 22 63 6c 6f 73 75 72 65 5f 75 69 64 5f 22 2b 28 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2a 31 45
                            Data Ascii: on(a){return a?a:function(b){return typeof b==="number"&&isNaN(b)}});var fb=fb||{},q=this||self,gb=q._F_toggles||[],hb=function(a){a=a.split(".");for(var b=q,c=0;c<a.length;c++)if(b=b[a[c]],b==null)return null;return b},ib="closure_uid_"+(Math.random()*1E
                            2024-10-02 03:21:09 UTC1969INData Raw: 74 65 78 74 5f 5f 39 38 34 33 38 32 3d 7b 7d 29 3b 61 2e 5f 5f 63 6c 6f 73 75 72 65 5f 5f 65 72 72 6f 72 5f 5f 63 6f 6e 74 65 78 74 5f 5f 39 38 34 33 38 32 2e 73 65 76 65 72 69 74 79 3d 62 7d 3b 76 61 72 20 71 62 3d 66 75 6e 63 74 69 6f 6e 28 61 2c 62 2c 63 29 7b 63 3d 63 7c 7c 71 3b 76 61 72 20 64 3d 63 2e 6f 6e 65 72 72 6f 72 2c 65 3d 21 21 62 3b 63 2e 6f 6e 65 72 72 6f 72 3d 66 75 6e 63 74 69 6f 6e 28 66 2c 68 2c 67 2c 6b 2c 6c 29 7b 64 26 26 64 28 66 2c 68 2c 67 2c 6b 2c 6c 29 3b 61 28 7b 6d 65 73 73 61 67 65 3a 66 2c 66 69 6c 65 4e 61 6d 65 3a 68 2c 6c 69 6e 65 3a 67 2c 6c 69 6e 65 4e 75 6d 62 65 72 3a 67 2c 63 61 3a 6b 2c 65 72 72 6f 72 3a 6c 7d 29 3b 72 65 74 75 72 6e 20 65 7d 7d 2c 74 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 76 61 72 20 62 3d 68
                            Data Ascii: text__984382={});a.__closure__error__context__984382.severity=b};var qb=function(a,b,c){c=c||q;var d=c.onerror,e=!!b;c.onerror=function(f,h,g,k,l){d&&d(f,h,g,k,l);a({message:f,fileName:h,line:g,lineNumber:g,ca:k,error:l});return e}},tb=function(a){var b=h
                            2024-10-02 03:21:09 UTC1969INData Raw: 22 6e 75 6d 62 65 72 22 3a 66 3d 53 74 72 69 6e 67 28 66 29 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 66 3d 66 3f 22 74 72 75 65 22 3a 22 66 61 6c 73 65 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 66 75 6e 63 74 69 6f 6e 22 3a 66 3d 28 66 3d 73 62 28 66 29 29 3f 66 3a 22 5b 66 6e 5d 22 3b 62 72 65 61 6b 3b 64 65 66 61 75 6c 74 3a 66 3d 0a 74 79 70 65 6f 66 20 66 7d 66 2e 6c 65 6e 67 74 68 3e 34 30 26 26 28 66 3d 66 2e 73 6c 69 63 65 28 30 2c 34 30 29 2b 22 2e 2e 2e 22 29 3b 63 2e 70 75 73 68 28 66 29 7d 62 2e 70 75 73 68 28 61 29 3b 63 2e 70 75 73 68 28 22 29 5c 6e 22 29 3b 74 72 79 7b 63 2e 70 75 73 68 28 77 62 28 61 2e 63 61 6c 6c 65 72 2c 62 29 29 7d 63 61 74 63 68 28 68 29 7b 63 2e 70 75 73 68 28 22 5b 65 78 63 65 70 74 69 6f 6e
                            Data Ascii: "number":f=String(f);break;case "boolean":f=f?"true":"false";break;case "function":f=(f=sb(f))?f:"[fn]";break;default:f=typeof f}f.length>40&&(f=f.slice(0,40)+"...");c.push(f)}b.push(a);c.push(")\n");try{c.push(wb(a.caller,b))}catch(h){c.push("[exception


                            Session IDSource IPSource PortDestination IPDestination Port
                            6192.168.2.64974340.115.3.253443
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:21:09 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 2b 43 65 65 53 2b 68 50 79 45 71 77 70 55 44 32 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 34 64 38 66 65 30 39 63 62 35 64 34 37 63 38 64 0d 0a 0d 0a
                            Data Ascii: CNT 1 CON 305MS-CV: +CeeS+hPyEqwpUD2.1Context: 4d8fe09cb5d47c8d
                            2024-10-02 03:21:09 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                            Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                            2024-10-02 03:21:09 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 2b 43 65 65 53 2b 68 50 79 45 71 77 70 55 44 32 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 34 64 38 66 65 30 39 63 62 35 64 34 37 63 38 64 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 62 49 64 52 72 6a 6e 62 75 76 56 6b 53 7a 33 56 4c 71 52 63 4c 4c 39 73 4f 38 46 6e 4c 6f 47 49 45 33 6e 52 79 66 39 34 55 4a 63 32 2f 62 65 30 75 34 6b 6d 66 30 6c 47 5a 4d 58 2b 35 59 55 48 45 78 62 4c 6f 59 6d 65 50 78 44 7a 4a 55 2b 57 34 54 42 57 68 2f 2f 56 57 72 35 71 48 67 65 6b 33 6d 57 37 6e 6a 45 34 54 6c 62 50 77
                            Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: +CeeS+hPyEqwpUD2.2Context: 4d8fe09cb5d47c8d<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAbIdRrjnbuvVkSz3VLqRcLL9sO8FnLoGIE3nRyf94UJc2/be0u4kmf0lGZMX+5YUHExbLoYmePxDzJU+W4TBWh//VWr5qHgek3mW7njE4TlbPw
                            2024-10-02 03:21:09 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 2b 43 65 65 53 2b 68 50 79 45 71 77 70 55 44 32 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 34 64 38 66 65 30 39 63 62 35 64 34 37 63 38 64 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                            Data Ascii: BND 3 CON\WNS 0 197MS-CV: +CeeS+hPyEqwpUD2.3Context: 4d8fe09cb5d47c8d<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                            2024-10-02 03:21:09 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                            Data Ascii: 202 1 CON 58
                            2024-10-02 03:21:09 UTC58INData Raw: 4d 53 2d 43 56 3a 20 54 33 41 38 31 6c 47 48 71 30 4b 36 54 4f 44 6b 70 48 71 62 38 51 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                            Data Ascii: MS-CV: T3A81lGHq0K6TODkpHqb8Q.0Payload parsing failed.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            7192.168.2.649747142.250.185.1744431588C:\Program Files\Google\Chrome\Application\chrome.exe
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:21:10 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                            Host: play.google.com
                            Connection: keep-alive
                            Accept: */*
                            Access-Control-Request-Method: POST
                            Access-Control-Request-Headers: x-goog-authuser
                            Origin: https://accounts.google.com
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                            Sec-Fetch-Mode: cors
                            Sec-Fetch-Site: same-site
                            Sec-Fetch-Dest: empty
                            Referer: https://accounts.google.com/
                            Accept-Encoding: gzip, deflate, br
                            Accept-Language: en-US,en;q=0.9
                            2024-10-02 03:21:10 UTC520INHTTP/1.1 200 OK
                            Access-Control-Allow-Origin: https://accounts.google.com
                            Access-Control-Allow-Methods: GET, POST, OPTIONS
                            Access-Control-Max-Age: 86400
                            Access-Control-Allow-Credentials: true
                            Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                            Content-Type: text/plain; charset=UTF-8
                            Date: Wed, 02 Oct 2024 03:21:10 GMT
                            Server: Playlog
                            Content-Length: 0
                            X-XSS-Protection: 0
                            X-Frame-Options: SAMEORIGIN
                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                            Connection: close


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            8192.168.2.649748142.250.185.1744431588C:\Program Files\Google\Chrome\Application\chrome.exe
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:21:10 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                            Host: play.google.com
                            Connection: keep-alive
                            Accept: */*
                            Access-Control-Request-Method: POST
                            Access-Control-Request-Headers: x-goog-authuser
                            Origin: https://accounts.google.com
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                            Sec-Fetch-Mode: cors
                            Sec-Fetch-Site: same-site
                            Sec-Fetch-Dest: empty
                            Referer: https://accounts.google.com/
                            Accept-Encoding: gzip, deflate, br
                            Accept-Language: en-US,en;q=0.9
                            2024-10-02 03:21:11 UTC520INHTTP/1.1 200 OK
                            Access-Control-Allow-Origin: https://accounts.google.com
                            Access-Control-Allow-Methods: GET, POST, OPTIONS
                            Access-Control-Max-Age: 86400
                            Access-Control-Allow-Credentials: true
                            Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                            Content-Type: text/plain; charset=UTF-8
                            Date: Wed, 02 Oct 2024 03:21:10 GMT
                            Server: Playlog
                            Content-Length: 0
                            X-XSS-Protection: 0
                            X-Frame-Options: SAMEORIGIN
                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                            Connection: close


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            9192.168.2.649722142.250.184.2284431588C:\Program Files\Google\Chrome\Application\chrome.exe
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:21:11 UTC1013OUTGET /favicon.ico HTTP/1.1
                            Host: www.google.com
                            Connection: keep-alive
                            sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                            sec-ch-ua-mobile: ?0
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                            sec-ch-ua-arch: "x86"
                            sec-ch-ua-full-version: "117.0.5938.134"
                            sec-ch-ua-platform-version: "10.0.0"
                            sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                            sec-ch-ua-bitness: "64"
                            sec-ch-ua-model: ""
                            sec-ch-ua-wow64: ?0
                            sec-ch-ua-platform: "Windows"
                            Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
                            X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlKHLAQj6mM0BCIWgzQEI3L3NAQiPys0BCLnKzQEI6dLNAQjo1c0BCMvWzQEIqNjNAQj5wNQVGLrSzQEY642lFw==
                            Sec-Fetch-Site: same-site
                            Sec-Fetch-Mode: no-cors
                            Sec-Fetch-Dest: image
                            Referer: https://accounts.google.com/
                            Accept-Encoding: gzip, deflate, br
                            Accept-Language: en-US,en;q=0.9
                            2024-10-02 03:21:11 UTC706INHTTP/1.1 200 OK
                            Accept-Ranges: bytes
                            Cross-Origin-Resource-Policy: cross-origin
                            Cross-Origin-Opener-Policy-Report-Only: same-origin; report-to="static-on-bigtable"
                            Report-To: {"group":"static-on-bigtable","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/static-on-bigtable"}]}
                            Content-Length: 5430
                            X-Content-Type-Options: nosniff
                            Server: sffe
                            X-XSS-Protection: 0
                            Date: Wed, 02 Oct 2024 00:12:30 GMT
                            Expires: Thu, 10 Oct 2024 00:12:30 GMT
                            Cache-Control: public, max-age=691200
                            Last-Modified: Tue, 22 Oct 2019 18:30:00 GMT
                            Content-Type: image/x-icon
                            Vary: Accept-Encoding
                            Age: 11321
                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                            Connection: close
                            2024-10-02 03:21:11 UTC684INData Raw: 00 00 01 00 02 00 10 10 00 00 01 00 20 00 68 04 00 00 26 00 00 00 20 20 00 00 01 00 20 00 a8 10 00 00 8e 04 00 00 28 00 00 00 10 00 00 00 20 00 00 00 01 00 20 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 30 fd fd fd 96 fd fd fd d8 fd fd fd f9 fd fd fd f9 fd fd fd d7 fd fd fd 94 fe fe fe 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd 99 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 95 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd c1 ff ff ff ff fa fd f9 ff b4 d9 a7 ff 76 ba 5d ff 58 ab 3a ff 58 aa 3a ff 72 b8 59 ff ac d5 9d ff f8 fb f6 ff ff
                            Data Ascii: h& ( 0.v]X:X:rY
                            2024-10-02 03:21:11 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d8 fd fd fd 99 ff ff ff ff 92 cf fb ff 37 52 ec ff 38 46 ea ff d0 d4 fa ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 96 fe fe fe 32 ff ff ff ff f9 f9 fe ff 56 62 ed ff 35 43 ea ff 3b 49 eb ff 95 9c f4 ff cf d2 fa ff d1 d4 fa ff 96 9d f4 ff 52 5e ed ff e1 e3 fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 30 00 00 00 00 fd fd fd 9d ff ff ff ff e8 ea fd ff 58 63 ee ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 6c 76 f0 ff ff ff ff ff ff ff ff ff fd fd fd 98 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd c3 ff ff ff ff f9 f9 fe ff a5 ac f6 ff 5d 69 ee ff 3c
                            Data Ascii: 7R8F2Vb5C;IR^0Xc5C5C5C5C5C5Clv]i<
                            2024-10-02 03:21:11 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d0 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fd fd fd 8b ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff b1 d8 a3 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 60 a5 35 ff ca 8e 3e ff f9 c1 9f ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 87 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 25 fd fd fd fb ff ff ff ff ff ff ff ff ff ff ff ff c2 e0 b7 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 6e b6 54 ff 9f ce 8d ff b7 da aa ff b8 db ab ff a5 d2 95 ff 7b bc 64 ff 54 a8 35 ff 53 a8 34 ff 77 a0 37 ff e3 89 41 ff f4 85 42 ff f4 85 42
                            Data Ascii: S4S4S4S4S4S4S4S4S4S4S4S4S4S4`5>%S4S4S4S4S4S4nT{dT5S4w7ABB
                            2024-10-02 03:21:11 UTC1390INData Raw: 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff fb d5 bf ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd ea fd fd fd cb ff ff ff ff ff ff ff ff ff ff ff ff 46 cd fc ff 05 bc fb ff 05 bc fb ff 05 bc fb ff 21 ae f9 ff fb fb ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd c8 fd fd fd 9c ff ff ff ff ff ff ff ff ff ff ff ff 86 df fd ff 05 bc fb ff 05 bc fb ff 15 93 f5 ff 34 49 eb ff b3 b8 f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                            Data Ascii: BBBBBBBF!4I
                            2024-10-02 03:21:11 UTC576INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d2 fe fe fe 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd 8d fd fd fd fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd fb fd fd fd 8b fe fe fe 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 27 fd fd fd 9f fd fd fd f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                            Data Ascii: $'


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            10192.168.2.649751142.250.185.1744431588C:\Program Files\Google\Chrome\Application\chrome.exe
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:21:11 UTC1120OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                            Host: play.google.com
                            Connection: keep-alive
                            Content-Length: 519
                            sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                            sec-ch-ua-mobile: ?0
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                            sec-ch-ua-arch: "x86"
                            Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                            sec-ch-ua-full-version: "117.0.5938.134"
                            sec-ch-ua-platform-version: "10.0.0"
                            X-Goog-AuthUser: 0
                            sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                            sec-ch-ua-bitness: "64"
                            sec-ch-ua-model: ""
                            sec-ch-ua-wow64: ?0
                            sec-ch-ua-platform: "Windows"
                            Accept: */*
                            Origin: https://accounts.google.com
                            X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlKHLAQj6mM0BCIWgzQEI3L3NAQiPys0BCLnKzQEI6dLNAQjo1c0BCMvWzQEIqNjNAQj5wNQVGLrSzQEY642lFw==
                            Sec-Fetch-Site: same-site
                            Sec-Fetch-Mode: cors
                            Sec-Fetch-Dest: empty
                            Referer: https://accounts.google.com/
                            Accept-Encoding: gzip, deflate, br
                            Accept-Language: en-US,en;q=0.9
                            2024-10-02 03:21:11 UTC519OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 33 39 32 36 38 37 37 32 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                            Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1727839268772",null,null,null
                            2024-10-02 03:21:11 UTC933INHTTP/1.1 200 OK
                            Access-Control-Allow-Origin: https://accounts.google.com
                            Cross-Origin-Resource-Policy: cross-origin
                            Access-Control-Allow-Credentials: true
                            Access-Control-Allow-Headers: X-Playlog-Web
                            Set-Cookie: NID=517=lJSBfzpVCMTWjb-m9b6gRTU4IN2MYtmyd6Ko7hKxAIj1Eqy2k5SXxRSVaSXVPo4A-2x5WUs5o2oBS4ipJFiw7GRkLKlo1PYMevn1eK0sRn5xCReADMoov-kD79PBTnTee2FYSnG8so7DntBYQfOwaeCHrMBQZnnStKUVIcceJAdKr-WESoo; expires=Thu, 03-Apr-2025 03:21:11 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                            P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                            Content-Type: text/plain; charset=UTF-8
                            Date: Wed, 02 Oct 2024 03:21:11 GMT
                            Server: Playlog
                            Cache-Control: private
                            X-XSS-Protection: 0
                            X-Frame-Options: SAMEORIGIN
                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                            Accept-Ranges: none
                            Vary: Accept-Encoding
                            Expires: Wed, 02 Oct 2024 03:21:11 GMT
                            Connection: close
                            Transfer-Encoding: chunked
                            2024-10-02 03:21:11 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                            Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                            2024-10-02 03:21:11 UTC5INData Raw: 30 0d 0a 0d 0a
                            Data Ascii: 0


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            11192.168.2.649753142.250.185.1744431588C:\Program Files\Google\Chrome\Application\chrome.exe
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:21:11 UTC1120OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                            Host: play.google.com
                            Connection: keep-alive
                            Content-Length: 519
                            sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                            sec-ch-ua-mobile: ?0
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                            sec-ch-ua-arch: "x86"
                            Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                            sec-ch-ua-full-version: "117.0.5938.134"
                            sec-ch-ua-platform-version: "10.0.0"
                            X-Goog-AuthUser: 0
                            sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                            sec-ch-ua-bitness: "64"
                            sec-ch-ua-model: ""
                            sec-ch-ua-wow64: ?0
                            sec-ch-ua-platform: "Windows"
                            Accept: */*
                            Origin: https://accounts.google.com
                            X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlKHLAQj6mM0BCIWgzQEI3L3NAQiPys0BCLnKzQEI6dLNAQjo1c0BCMvWzQEIqNjNAQj5wNQVGLrSzQEY642lFw==
                            Sec-Fetch-Site: same-site
                            Sec-Fetch-Mode: cors
                            Sec-Fetch-Dest: empty
                            Referer: https://accounts.google.com/
                            Accept-Encoding: gzip, deflate, br
                            Accept-Language: en-US,en;q=0.9
                            2024-10-02 03:21:11 UTC519OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 33 39 32 36 38 38 35 31 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                            Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1727839268851",null,null,null
                            2024-10-02 03:21:11 UTC932INHTTP/1.1 200 OK
                            Access-Control-Allow-Origin: https://accounts.google.com
                            Cross-Origin-Resource-Policy: cross-origin
                            Access-Control-Allow-Credentials: true
                            Access-Control-Allow-Headers: X-Playlog-Web
                            Set-Cookie: NID=517=GSSfFomyHJQpznPosJ3g90o63RDzvvO2Uc4trY1HbgzjOAOCqmJhWHjleREkPGcp-KuXXnGYkv_eOlLHGKgxwz12agqesgBYfHzk9TUqdIk7jz5s42S-QzfTb_yStgnHpiUSFID22J43-lg_cxm5-AU_ROMtcsqpflTC8Ak594X94_C3hQ; expires=Thu, 03-Apr-2025 03:21:11 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                            P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                            Content-Type: text/plain; charset=UTF-8
                            Date: Wed, 02 Oct 2024 03:21:11 GMT
                            Server: Playlog
                            Cache-Control: private
                            X-XSS-Protection: 0
                            X-Frame-Options: SAMEORIGIN
                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                            Accept-Ranges: none
                            Vary: Accept-Encoding
                            Expires: Wed, 02 Oct 2024 03:21:11 GMT
                            Connection: close
                            Transfer-Encoding: chunked
                            2024-10-02 03:21:11 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                            Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                            2024-10-02 03:21:11 UTC5INData Raw: 30 0d 0a 0d 0a
                            Data Ascii: 0


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            12192.168.2.64975752.165.165.26443
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:21:13 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=ZuwdNuSvWpCmchb&MD=Vrk6OwWM HTTP/1.1
                            Connection: Keep-Alive
                            Accept: */*
                            User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                            Host: slscr.update.microsoft.com
                            2024-10-02 03:21:13 UTC560INHTTP/1.1 200 OK
                            Cache-Control: no-cache
                            Pragma: no-cache
                            Content-Type: application/octet-stream
                            Expires: -1
                            Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                            ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                            MS-CorrelationId: fd8dc15a-c57f-478b-892a-7cd816b66c78
                            MS-RequestId: 1b54a8ea-4231-4a7e-9fb6-dcad419b2b29
                            MS-CV: mNgbb2jk8Uacmmp0.0
                            X-Microsoft-SLSClientCache: 2880
                            Content-Disposition: attachment; filename=environment.cab
                            X-Content-Type-Options: nosniff
                            Date: Wed, 02 Oct 2024 03:21:13 GMT
                            Connection: close
                            Content-Length: 24490
                            2024-10-02 03:21:13 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                            Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                            2024-10-02 03:21:13 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                            Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                            Session IDSource IPSource PortDestination IPDestination Port
                            13192.168.2.649761173.222.162.64443
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:21:14 UTC2256OUTPOST /threshold/xls.aspx HTTP/1.1
                            Origin: https://www.bing.com
                            Referer: https://www.bing.com/AS/API/WindowsCortanaPane/V2/Init
                            Accept: */*
                            Accept-Language: en-CH
                            Content-type: text/xml
                            X-Agent-DeviceId: 01000A410900C4F3
                            X-BM-CBT: 1696488253
                            X-BM-DateFormat: dd/MM/yyyy
                            X-BM-DeviceDimensions: 784x984
                            X-BM-DeviceDimensionsLogical: 784x984
                            X-BM-DeviceScale: 100
                            X-BM-DTZ: 120
                            X-BM-Market: CH
                            X-BM-Theme: 000000;0078d7
                            X-BM-WindowsFlights: FX:117B9872,FX:119E26AD,FX:11C0E96C,FX:11C6E5C2,FX:11C7EB6A,FX:11C9408A,FX:11C940DB,FX:11CB9A9F,FX:11CB9AC1,FX:11CC111C,FX:11D5BFCD,FX:11DF5B12,FX:11DF5B75,FX:1240931B,FX:124B38D0,FX:127FC878,FX:1283FFE8,FX:12840617,FX:128979F9,FX:128EBD7E,FX:129135BB,FX:129E053F,FX:12A74DB5,FX:12AB734D,FX:12B8450E,FX:12BD6E73,FX:12C3331B,FX:12C7D66E
                            X-Device-ClientSession: 1D6F504B5A5A465DBDB84F31C63A581D
                            X-Device-isOptin: false
                            X-Device-MachineId: {92C86F7C-DB2B-4F6A-95AD-98B4A2AE008A}
                            X-Device-OSSKU: 48
                            X-Device-Touch: false
                            X-DeviceID: 01000A410900C4F3
                            X-MSEdge-ExternalExp: d-thshld39,d-thshld42,d-thshldspcl40,msbdsborgv2co,msbwdsbi920cf,optfsth3,premsbdsbchtupcf,wsbfixcachec,wsbqfasmsall_c,wsbqfminiserp_c,wsbref-c
                            X-MSEdge-ExternalExpType: JointCoord
                            X-PositionerType: Desktop
                            X-Search-AppId: Microsoft.Windows.Cortana_cw5n1h2txyewy!CortanaUI
                            X-Search-CortanaAvailableCapabilities: None
                            X-Search-SafeSearch: Moderate
                            X-Search-TimeZone: Bias=-60; DaylightBias=-60; TimeZoneKeyName=W. Europe Standard Time
                            X-UserAgeClass: Unknown
                            Accept-Encoding: gzip, deflate, br
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Cortana 1.14.7.19041; 10.0.0.0.19045.2006) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19045
                            Host: www.bing.com
                            Content-Length: 516
                            Connection: Keep-Alive
                            Cache-Control: no-cache
                            Cookie: SRCHUID=V=2&GUID=CE2BE0509FF742BD822F50D98AD10391&dmnchg=1; SRCHD=AF=NOFORM; SRCHUSR=DOB=20231005; SRCHHPGUSR=SRCHLANG=en&HV=1696488191&IPMH=5767d621&IPMID=1696488252989&LUT=1696487541024; CortanaAppUID=2020E25DAB158E420BA06F1C8DEF7959; MUID=81C61E09498D41CC97CDBBA354824ED1; _SS=SID=1D9FAF807E686D422B86BC217FC66C71&CPID=1696488253968&AC=1&CPH=071f2185; _EDGE_S=SID=1D9FAF807E686D422B86BC217FC66C71; MUIDB=81C61E09498D41CC97CDBBA354824ED1
                            2024-10-02 03:21:14 UTC1OUTData Raw: 3c
                            Data Ascii: <
                            2024-10-02 03:21:14 UTC515OUTData Raw: 43 6c 69 65 6e 74 49 6e 73 74 52 65 71 75 65 73 74 3e 3c 43 49 44 3e 38 31 43 36 31 45 30 39 34 39 38 44 34 31 43 43 39 37 43 44 42 42 41 33 35 34 38 32 34 45 44 31 3c 2f 43 49 44 3e 3c 45 76 65 6e 74 73 3e 3c 45 3e 3c 54 3e 45 76 65 6e 74 2e 43 6c 69 65 6e 74 49 6e 73 74 3c 2f 54 3e 3c 49 47 3e 33 35 31 41 41 38 32 41 45 39 30 43 34 36 36 39 39 46 35 42 31 46 45 33 34 32 42 45 37 45 31 30 3c 2f 49 47 3e 3c 44 3e 3c 21 5b 43 44 41 54 41 5b 7b 22 43 75 72 55 72 6c 22 3a 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 62 69 6e 67 2e 63 6f 6d 2f 41 53 2f 41 50 49 2f 57 69 6e 64 6f 77 73 43 6f 72 74 61 6e 61 50 61 6e 65 2f 56 32 2f 49 6e 69 74 22 2c 22 50 69 76 6f 74 22 3a 22 51 46 22 2c 22 54 22 3a 22 43 49 2e 42 6f 78 4d 6f 64 65 6c 22 2c 22 46 49 44 22 3a 22 43 49
                            Data Ascii: ClientInstRequest><CID>81C61E09498D41CC97CDBBA354824ED1</CID><Events><E><T>Event.ClientInst</T><IG>351AA82AE90C46699F5B1FE342BE7E10</IG><D><![CDATA[{"CurUrl":"https://www.bing.com/AS/API/WindowsCortanaPane/V2/Init","Pivot":"QF","T":"CI.BoxModel","FID":"CI
                            2024-10-02 03:21:14 UTC479INHTTP/1.1 204 No Content
                            Access-Control-Allow-Origin: *
                            Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                            X-MSEdge-Ref: Ref A: 7B72140FF3F344E99F084BC5E55F9F04 Ref B: LAX311000111017 Ref C: 2024-10-02T03:21:14Z
                            Date: Wed, 02 Oct 2024 03:21:14 GMT
                            Connection: close
                            Alt-Svc: h3=":443"; ma=93600
                            X-CDN-TraceID: 0.2ea6dc17.1727839274.75583b1


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            14192.168.2.649764142.250.185.1744431588C:\Program Files\Google\Chrome\Application\chrome.exe
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:21:18 UTC1294OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                            Host: play.google.com
                            Connection: keep-alive
                            Content-Length: 1221
                            sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                            sec-ch-ua-mobile: ?0
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                            sec-ch-ua-arch: "x86"
                            Content-Type: text/plain;charset=UTF-8
                            sec-ch-ua-full-version: "117.0.5938.134"
                            sec-ch-ua-platform-version: "10.0.0"
                            X-Goog-AuthUser: 0
                            sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                            sec-ch-ua-bitness: "64"
                            sec-ch-ua-model: ""
                            sec-ch-ua-wow64: ?0
                            sec-ch-ua-platform: "Windows"
                            Accept: */*
                            Origin: https://accounts.google.com
                            X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlKHLAQj6mM0BCIWgzQEI3L3NAQiPys0BCLnKzQEI6dLNAQjo1c0BCMvWzQEIqNjNAQj5wNQVGLrSzQEY642lFw==
                            Sec-Fetch-Site: same-site
                            Sec-Fetch-Mode: cors
                            Sec-Fetch-Dest: empty
                            Referer: https://accounts.google.com/
                            Accept-Encoding: gzip, deflate, br
                            Accept-Language: en-US,en;q=0.9
                            Cookie: NID=517=GSSfFomyHJQpznPosJ3g90o63RDzvvO2Uc4trY1HbgzjOAOCqmJhWHjleREkPGcp-KuXXnGYkv_eOlLHGKgxwz12agqesgBYfHzk9TUqdIk7jz5s42S-QzfTb_yStgnHpiUSFID22J43-lg_cxm5-AU_ROMtcsqpflTC8Ak594X94_C3hQ
                            2024-10-02 03:21:18 UTC1221OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 34 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 35 35 38 2c 5b 5b 22 31 37 32 37 38 33 39 32 36 36 30 30 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c
                            Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,null,null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[4,0,0,0,0]]],558,[["1727839266000",null,null,null,
                            2024-10-02 03:21:18 UTC940INHTTP/1.1 200 OK
                            Access-Control-Allow-Origin: https://accounts.google.com
                            Cross-Origin-Resource-Policy: cross-origin
                            Access-Control-Allow-Credentials: true
                            Access-Control-Allow-Headers: X-Playlog-Web
                            Set-Cookie: NID=517=U7xOzxfg_BV8C7wxwIVVM3v0PuwqpE7hzOLG0LIn0jD2CaIuuI2lEuDSr1mBW5RmusecNKYD4I1mACisKhGYTd0ATnu3Ch-98TYLkugZT1vhrednMgCa2MCBm1gHKVa0efBIJ7EZMdpp7gYHHLr0An_veFC02Y2syAgFGEhDQ2ESFfSykN91rbiXoQ; expires=Thu, 03-Apr-2025 03:21:18 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                            P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                            Content-Type: text/plain; charset=UTF-8
                            Date: Wed, 02 Oct 2024 03:21:18 GMT
                            Server: Playlog
                            Cache-Control: private
                            X-XSS-Protection: 0
                            X-Frame-Options: SAMEORIGIN
                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                            Accept-Ranges: none
                            Vary: Accept-Encoding
                            Expires: Wed, 02 Oct 2024 03:21:18 GMT
                            Connection: close
                            Transfer-Encoding: chunked
                            2024-10-02 03:21:18 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                            Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                            2024-10-02 03:21:18 UTC5INData Raw: 30 0d 0a 0d 0a
                            Data Ascii: 0


                            Session IDSource IPSource PortDestination IPDestination Port
                            15192.168.2.64976540.115.3.253443
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:21:21 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 6a 33 4b 68 56 61 48 39 77 55 32 6e 6e 57 6f 6e 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 36 65 35 33 34 31 37 34 37 30 35 37 30 36 36 0d 0a 0d 0a
                            Data Ascii: CNT 1 CON 305MS-CV: j3KhVaH9wU2nnWon.1Context: a6e5341747057066
                            2024-10-02 03:21:21 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                            Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                            2024-10-02 03:21:21 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 6a 33 4b 68 56 61 48 39 77 55 32 6e 6e 57 6f 6e 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 36 65 35 33 34 31 37 34 37 30 35 37 30 36 36 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 62 49 64 52 72 6a 6e 62 75 76 56 6b 53 7a 33 56 4c 71 52 63 4c 4c 39 73 4f 38 46 6e 4c 6f 47 49 45 33 6e 52 79 66 39 34 55 4a 63 32 2f 62 65 30 75 34 6b 6d 66 30 6c 47 5a 4d 58 2b 35 59 55 48 45 78 62 4c 6f 59 6d 65 50 78 44 7a 4a 55 2b 57 34 54 42 57 68 2f 2f 56 57 72 35 71 48 67 65 6b 33 6d 57 37 6e 6a 45 34 54 6c 62 50 77
                            Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: j3KhVaH9wU2nnWon.2Context: a6e5341747057066<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAbIdRrjnbuvVkSz3VLqRcLL9sO8FnLoGIE3nRyf94UJc2/be0u4kmf0lGZMX+5YUHExbLoYmePxDzJU+W4TBWh//VWr5qHgek3mW7njE4TlbPw
                            2024-10-02 03:21:21 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 6a 33 4b 68 56 61 48 39 77 55 32 6e 6e 57 6f 6e 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 36 65 35 33 34 31 37 34 37 30 35 37 30 36 36 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                            Data Ascii: BND 3 CON\WNS 0 197MS-CV: j3KhVaH9wU2nnWon.3Context: a6e5341747057066<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                            2024-10-02 03:21:21 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                            Data Ascii: 202 1 CON 58
                            2024-10-02 03:21:21 UTC58INData Raw: 4d 53 2d 43 56 3a 20 4f 76 4a 65 79 6b 33 2f 79 55 2b 59 48 43 69 38 62 72 77 6c 6a 67 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                            Data Ascii: MS-CV: OvJeyk3/yU+YHCi8brwljg.0Payload parsing failed.


                            Session IDSource IPSource PortDestination IPDestination Port
                            16192.168.2.64976640.115.3.253443
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:21:40 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 42 31 61 63 51 79 53 72 2f 45 4b 34 62 49 45 4d 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 63 61 65 37 37 34 30 38 33 32 64 34 33 62 65 38 0d 0a 0d 0a
                            Data Ascii: CNT 1 CON 305MS-CV: B1acQySr/EK4bIEM.1Context: cae7740832d43be8
                            2024-10-02 03:21:40 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                            Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                            2024-10-02 03:21:40 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 42 31 61 63 51 79 53 72 2f 45 4b 34 62 49 45 4d 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 63 61 65 37 37 34 30 38 33 32 64 34 33 62 65 38 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 62 49 64 52 72 6a 6e 62 75 76 56 6b 53 7a 33 56 4c 71 52 63 4c 4c 39 73 4f 38 46 6e 4c 6f 47 49 45 33 6e 52 79 66 39 34 55 4a 63 32 2f 62 65 30 75 34 6b 6d 66 30 6c 47 5a 4d 58 2b 35 59 55 48 45 78 62 4c 6f 59 6d 65 50 78 44 7a 4a 55 2b 57 34 54 42 57 68 2f 2f 56 57 72 35 71 48 67 65 6b 33 6d 57 37 6e 6a 45 34 54 6c 62 50 77
                            Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: B1acQySr/EK4bIEM.2Context: cae7740832d43be8<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAbIdRrjnbuvVkSz3VLqRcLL9sO8FnLoGIE3nRyf94UJc2/be0u4kmf0lGZMX+5YUHExbLoYmePxDzJU+W4TBWh//VWr5qHgek3mW7njE4TlbPw
                            2024-10-02 03:21:40 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 42 31 61 63 51 79 53 72 2f 45 4b 34 62 49 45 4d 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 63 61 65 37 37 34 30 38 33 32 64 34 33 62 65 38 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                            Data Ascii: BND 3 CON\WNS 0 197MS-CV: B1acQySr/EK4bIEM.3Context: cae7740832d43be8<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                            2024-10-02 03:21:40 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                            Data Ascii: 202 1 CON 58
                            2024-10-02 03:21:40 UTC58INData Raw: 4d 53 2d 43 56 3a 20 31 52 79 6e 68 50 57 47 46 30 57 35 6f 56 50 61 49 53 31 48 48 77 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                            Data Ascii: MS-CV: 1RynhPWGF0W5oVPaIS1HHw.0Payload parsing failed.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            17192.168.2.649767142.250.185.1744431588C:\Program Files\Google\Chrome\Application\chrome.exe
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:21:40 UTC1285OUTPOST /log?hasfast=true&authuser=0&format=json HTTP/1.1
                            Host: play.google.com
                            Connection: keep-alive
                            Content-Length: 1043
                            sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                            sec-ch-ua-mobile: ?0
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                            sec-ch-ua-arch: "x86"
                            sec-ch-ua-full-version: "117.0.5938.134"
                            Content-Type: text/plain;charset=UTF-8
                            sec-ch-ua-platform-version: "10.0.0"
                            sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                            sec-ch-ua-bitness: "64"
                            sec-ch-ua-model: ""
                            sec-ch-ua-wow64: ?0
                            sec-ch-ua-platform: "Windows"
                            Accept: */*
                            Origin: https://accounts.google.com
                            X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlKHLAQj6mM0BCIWgzQEI3L3NAQiPys0BCLnKzQEI6dLNAQjo1c0BCMvWzQEIqNjNAQj5wNQVGLrSzQEY642lFw==
                            Sec-Fetch-Site: same-site
                            Sec-Fetch-Mode: no-cors
                            Sec-Fetch-Dest: empty
                            Referer: https://accounts.google.com/
                            Accept-Encoding: gzip, deflate, br
                            Accept-Language: en-US,en;q=0.9
                            Cookie: NID=517=U7xOzxfg_BV8C7wxwIVVM3v0PuwqpE7hzOLG0LIn0jD2CaIuuI2lEuDSr1mBW5RmusecNKYD4I1mACisKhGYTd0ATnu3Ch-98TYLkugZT1vhrednMgCa2MCBm1gHKVa0efBIJ7EZMdpp7gYHHLr0An_veFC02Y2syAgFGEhDQ2ESFfSykN91rbiXoQ
                            2024-10-02 03:21:40 UTC1043OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 62 6f 71 5f 69 64 65 6e 74 69 74 79 66 72 6f 6e 74 65 6e 64 61 75 74 68 75 69 73 65 72 76 65 72 5f 32 30 32 34 30 39 32 39 2e 30 37 5f 70 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 33 2c 30 2c 30
                            Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"boq_identityfrontendauthuiserver_20240929.07_p0",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[3,0,0
                            2024-10-02 03:21:40 UTC523INHTTP/1.1 200 OK
                            Access-Control-Allow-Origin: https://accounts.google.com
                            Cross-Origin-Resource-Policy: cross-origin
                            Access-Control-Allow-Credentials: true
                            Access-Control-Allow-Headers: X-Playlog-Web
                            Content-Type: text/plain; charset=UTF-8
                            Date: Wed, 02 Oct 2024 03:21:40 GMT
                            Server: Playlog
                            Cache-Control: private
                            X-XSS-Protection: 0
                            X-Frame-Options: SAMEORIGIN
                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                            Accept-Ranges: none
                            Vary: Accept-Encoding
                            Connection: close
                            Transfer-Encoding: chunked
                            2024-10-02 03:21:40 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                            Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                            2024-10-02 03:21:40 UTC5INData Raw: 30 0d 0a 0d 0a
                            Data Ascii: 0


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            18192.168.2.649768142.250.185.1744431588C:\Program Files\Google\Chrome\Application\chrome.exe
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:21:43 UTC1325OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                            Host: play.google.com
                            Connection: keep-alive
                            Content-Length: 1288
                            sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                            sec-ch-ua-mobile: ?0
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                            sec-ch-ua-arch: "x86"
                            Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                            sec-ch-ua-full-version: "117.0.5938.134"
                            sec-ch-ua-platform-version: "10.0.0"
                            X-Goog-AuthUser: 0
                            sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                            sec-ch-ua-bitness: "64"
                            sec-ch-ua-model: ""
                            sec-ch-ua-wow64: ?0
                            sec-ch-ua-platform: "Windows"
                            Accept: */*
                            Origin: https://accounts.google.com
                            X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlKHLAQj6mM0BCIWgzQEI3L3NAQiPys0BCLnKzQEI6dLNAQjo1c0BCMvWzQEIqNjNAQj5wNQVGLrSzQEY642lFw==
                            Sec-Fetch-Site: same-site
                            Sec-Fetch-Mode: cors
                            Sec-Fetch-Dest: empty
                            Referer: https://accounts.google.com/
                            Accept-Encoding: gzip, deflate, br
                            Accept-Language: en-US,en;q=0.9
                            Cookie: NID=517=U7xOzxfg_BV8C7wxwIVVM3v0PuwqpE7hzOLG0LIn0jD2CaIuuI2lEuDSr1mBW5RmusecNKYD4I1mACisKhGYTd0ATnu3Ch-98TYLkugZT1vhrednMgCa2MCBm1gHKVa0efBIJ7EZMdpp7gYHHLr0An_veFC02Y2syAgFGEhDQ2ESFfSykN91rbiXoQ
                            2024-10-02 03:21:43 UTC1288OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 33 39 33 30 31 35 34 37 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                            Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1727839301547",null,null,null
                            2024-10-02 03:21:43 UTC523INHTTP/1.1 200 OK
                            Access-Control-Allow-Origin: https://accounts.google.com
                            Cross-Origin-Resource-Policy: cross-origin
                            Access-Control-Allow-Credentials: true
                            Access-Control-Allow-Headers: X-Playlog-Web
                            Content-Type: text/plain; charset=UTF-8
                            Date: Wed, 02 Oct 2024 03:21:43 GMT
                            Server: Playlog
                            Cache-Control: private
                            X-XSS-Protection: 0
                            X-Frame-Options: SAMEORIGIN
                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                            Accept-Ranges: none
                            Vary: Accept-Encoding
                            Connection: close
                            Transfer-Encoding: chunked
                            2024-10-02 03:21:43 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                            Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                            2024-10-02 03:21:43 UTC5INData Raw: 30 0d 0a 0d 0a
                            Data Ascii: 0


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            19192.168.2.649769142.250.185.1744431588C:\Program Files\Google\Chrome\Application\chrome.exe
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:21:43 UTC1325OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                            Host: play.google.com
                            Connection: keep-alive
                            Content-Length: 1365
                            sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                            sec-ch-ua-mobile: ?0
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                            sec-ch-ua-arch: "x86"
                            Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                            sec-ch-ua-full-version: "117.0.5938.134"
                            sec-ch-ua-platform-version: "10.0.0"
                            X-Goog-AuthUser: 0
                            sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                            sec-ch-ua-bitness: "64"
                            sec-ch-ua-model: ""
                            sec-ch-ua-wow64: ?0
                            sec-ch-ua-platform: "Windows"
                            Accept: */*
                            Origin: https://accounts.google.com
                            X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlKHLAQj6mM0BCIWgzQEI3L3NAQiPys0BCLnKzQEI6dLNAQjo1c0BCMvWzQEIqNjNAQj5wNQVGLrSzQEY642lFw==
                            Sec-Fetch-Site: same-site
                            Sec-Fetch-Mode: cors
                            Sec-Fetch-Dest: empty
                            Referer: https://accounts.google.com/
                            Accept-Encoding: gzip, deflate, br
                            Accept-Language: en-US,en;q=0.9
                            Cookie: NID=517=U7xOzxfg_BV8C7wxwIVVM3v0PuwqpE7hzOLG0LIn0jD2CaIuuI2lEuDSr1mBW5RmusecNKYD4I1mACisKhGYTd0ATnu3Ch-98TYLkugZT1vhrednMgCa2MCBm1gHKVa0efBIJ7EZMdpp7gYHHLr0An_veFC02Y2syAgFGEhDQ2ESFfSykN91rbiXoQ
                            2024-10-02 03:21:43 UTC1365OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 33 39 33 30 31 37 34 38 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                            Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1727839301748",null,null,null
                            2024-10-02 03:21:43 UTC523INHTTP/1.1 200 OK
                            Access-Control-Allow-Origin: https://accounts.google.com
                            Cross-Origin-Resource-Policy: cross-origin
                            Access-Control-Allow-Credentials: true
                            Access-Control-Allow-Headers: X-Playlog-Web
                            Content-Type: text/plain; charset=UTF-8
                            Date: Wed, 02 Oct 2024 03:21:43 GMT
                            Server: Playlog
                            Cache-Control: private
                            X-XSS-Protection: 0
                            X-Frame-Options: SAMEORIGIN
                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                            Accept-Ranges: none
                            Vary: Accept-Encoding
                            Connection: close
                            Transfer-Encoding: chunked
                            2024-10-02 03:21:43 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                            Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                            2024-10-02 03:21:43 UTC5INData Raw: 30 0d 0a 0d 0a
                            Data Ascii: 0


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            20192.168.2.64977052.165.165.26443
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:21:50 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=ZuwdNuSvWpCmchb&MD=Vrk6OwWM HTTP/1.1
                            Connection: Keep-Alive
                            Accept: */*
                            User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                            Host: slscr.update.microsoft.com
                            2024-10-02 03:21:51 UTC560INHTTP/1.1 200 OK
                            Cache-Control: no-cache
                            Pragma: no-cache
                            Content-Type: application/octet-stream
                            Expires: -1
                            Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                            ETag: "vic+p1MiJJ+/WMnK08jaWnCBGDfvkGRzPk9f8ZadQHg=_1440"
                            MS-CorrelationId: b0a7b85a-bee5-4b37-97a9-c6e3cd004537
                            MS-RequestId: 096051a8-98c8-47b0-9c2e-591bbcadb305
                            MS-CV: LebiUvHzwkqo2jrQ.0
                            X-Microsoft-SLSClientCache: 1440
                            Content-Disposition: attachment; filename=environment.cab
                            X-Content-Type-Options: nosniff
                            Date: Wed, 02 Oct 2024 03:21:50 GMT
                            Connection: close
                            Content-Length: 30005
                            2024-10-02 03:21:51 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 8d 2b 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 5b 49 00 00 14 00 00 00 00 00 10 00 8d 2b 00 00 a8 49 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 72 4d 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 fe f6 51 be 21 2b 72 4d 43 4b ed 7c 05 58 54 eb da f6 14 43 49 37 0a 02 d2 b9 86 0e 41 52 a4 1b 24 a5 bb 43 24 44 18 94 90 92 52 41 3a 05 09 95 ee 54 b0 00 91 2e e9 12 10 04 11 c9 6f 10 b7 a2 67 9f bd cf 3e ff b7 ff b3 bf 73 ed e1 9a 99 f5 c6 7a d7 bb de f5 3e cf fd 3c f7 dc 17 4a 1a 52 e7 41 a8 97 1e 14 f4 e5 25 7d f4 05 82 82 c1 20 30 08 06 ba c3 05 02 11 7f a9 c1 ff d2 87 5c 1e f4 ed 65 8e 7a 1f f6 0a 40 03 1d 7b f9 83 2c 1c 2f db b8 3a 39 3a 58 38 ba 73 5e
                            Data Ascii: MSCF+D[I+IdrMenvironment.cabQ!+rMCK|XTCI7AR$C$DRA:T.og>sz><JRA%} 0\ez@{,/:9:X8s^
                            2024-10-02 03:21:51 UTC14181INData Raw: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 26 30 24 06 03 55 04 03 13 1d 4d 69 63 72 6f 73 6f 66 74 20 54 69 6d 65 2d 53 74 61 6d 70 20 50 43 41 20 32 30 31 30 30 1e 17 0d 32 33 31 30 31 32 31 39 30 37 32 35 5a 17 0d 32 35 30 31 31 30 31 39 30 37 32 35 5a 30 81 d2 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 2d 30 2b 06 03 55 04 0b 13 24 4d 69 63 72 6f
                            Data Ascii: UUS10UWashington10URedmond10UMicrosoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100231012190725Z250110190725Z010UUS10UWashington10URedmond10UMicrosoft Corporation1-0+U$Micro


                            Session IDSource IPSource PortDestination IPDestination Port
                            21192.168.2.64977340.115.3.253443
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:22:04 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 6a 50 52 50 73 31 78 44 62 6b 47 4c 6d 7a 51 44 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 64 34 30 30 31 64 34 39 64 31 33 38 35 64 62 38 0d 0a 0d 0a
                            Data Ascii: CNT 1 CON 305MS-CV: jPRPs1xDbkGLmzQD.1Context: d4001d49d1385db8
                            2024-10-02 03:22:04 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                            Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                            2024-10-02 03:22:04 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 6a 50 52 50 73 31 78 44 62 6b 47 4c 6d 7a 51 44 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 64 34 30 30 31 64 34 39 64 31 33 38 35 64 62 38 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 62 49 64 52 72 6a 6e 62 75 76 56 6b 53 7a 33 56 4c 71 52 63 4c 4c 39 73 4f 38 46 6e 4c 6f 47 49 45 33 6e 52 79 66 39 34 55 4a 63 32 2f 62 65 30 75 34 6b 6d 66 30 6c 47 5a 4d 58 2b 35 59 55 48 45 78 62 4c 6f 59 6d 65 50 78 44 7a 4a 55 2b 57 34 54 42 57 68 2f 2f 56 57 72 35 71 48 67 65 6b 33 6d 57 37 6e 6a 45 34 54 6c 62 50 77
                            Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: jPRPs1xDbkGLmzQD.2Context: d4001d49d1385db8<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAbIdRrjnbuvVkSz3VLqRcLL9sO8FnLoGIE3nRyf94UJc2/be0u4kmf0lGZMX+5YUHExbLoYmePxDzJU+W4TBWh//VWr5qHgek3mW7njE4TlbPw
                            2024-10-02 03:22:04 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 6a 50 52 50 73 31 78 44 62 6b 47 4c 6d 7a 51 44 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 64 34 30 30 31 64 34 39 64 31 33 38 35 64 62 38 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                            Data Ascii: BND 3 CON\WNS 0 197MS-CV: jPRPs1xDbkGLmzQD.3Context: d4001d49d1385db8<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                            2024-10-02 03:22:05 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                            Data Ascii: 202 1 CON 58
                            2024-10-02 03:22:05 UTC58INData Raw: 4d 53 2d 43 56 3a 20 5a 52 51 73 39 47 35 46 6d 55 71 36 47 48 37 38 6c 52 65 49 71 77 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                            Data Ascii: MS-CV: ZRQs9G5FmUq6GH78lReIqw.0Payload parsing failed.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            22192.168.2.649775142.250.184.2384431588C:\Program Files\Google\Chrome\Application\chrome.exe
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:22:13 UTC1325OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                            Host: play.google.com
                            Connection: keep-alive
                            Content-Length: 1164
                            sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                            sec-ch-ua-mobile: ?0
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                            sec-ch-ua-arch: "x86"
                            Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                            sec-ch-ua-full-version: "117.0.5938.134"
                            sec-ch-ua-platform-version: "10.0.0"
                            X-Goog-AuthUser: 0
                            sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                            sec-ch-ua-bitness: "64"
                            sec-ch-ua-model: ""
                            sec-ch-ua-wow64: ?0
                            sec-ch-ua-platform: "Windows"
                            Accept: */*
                            Origin: https://accounts.google.com
                            X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlKHLAQj6mM0BCIWgzQEI3L3NAQiPys0BCLnKzQEI6dLNAQjo1c0BCMvWzQEIqNjNAQj5wNQVGLrSzQEY642lFw==
                            Sec-Fetch-Site: same-site
                            Sec-Fetch-Mode: cors
                            Sec-Fetch-Dest: empty
                            Referer: https://accounts.google.com/
                            Accept-Encoding: gzip, deflate, br
                            Accept-Language: en-US,en;q=0.9
                            Cookie: NID=517=U7xOzxfg_BV8C7wxwIVVM3v0PuwqpE7hzOLG0LIn0jD2CaIuuI2lEuDSr1mBW5RmusecNKYD4I1mACisKhGYTd0ATnu3Ch-98TYLkugZT1vhrednMgCa2MCBm1gHKVa0efBIJ7EZMdpp7gYHHLr0An_veFC02Y2syAgFGEhDQ2ESFfSykN91rbiXoQ
                            2024-10-02 03:22:13 UTC1164OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 33 39 33 33 31 39 31 33 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                            Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1727839331913",null,null,null
                            2024-10-02 03:22:14 UTC523INHTTP/1.1 200 OK
                            Access-Control-Allow-Origin: https://accounts.google.com
                            Cross-Origin-Resource-Policy: cross-origin
                            Access-Control-Allow-Credentials: true
                            Access-Control-Allow-Headers: X-Playlog-Web
                            Content-Type: text/plain; charset=UTF-8
                            Date: Wed, 02 Oct 2024 03:22:13 GMT
                            Server: Playlog
                            Cache-Control: private
                            X-XSS-Protection: 0
                            X-Frame-Options: SAMEORIGIN
                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                            Accept-Ranges: none
                            Vary: Accept-Encoding
                            Connection: close
                            Transfer-Encoding: chunked
                            2024-10-02 03:22:14 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                            Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                            2024-10-02 03:22:14 UTC5INData Raw: 30 0d 0a 0d 0a
                            Data Ascii: 0


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            23192.168.2.649777142.250.184.2384431588C:\Program Files\Google\Chrome\Application\chrome.exe
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:22:15 UTC1325OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                            Host: play.google.com
                            Connection: keep-alive
                            Content-Length: 1291
                            sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                            sec-ch-ua-mobile: ?0
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                            sec-ch-ua-arch: "x86"
                            Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                            sec-ch-ua-full-version: "117.0.5938.134"
                            sec-ch-ua-platform-version: "10.0.0"
                            X-Goog-AuthUser: 0
                            sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                            sec-ch-ua-bitness: "64"
                            sec-ch-ua-model: ""
                            sec-ch-ua-wow64: ?0
                            sec-ch-ua-platform: "Windows"
                            Accept: */*
                            Origin: https://accounts.google.com
                            X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlKHLAQj6mM0BCIWgzQEI3L3NAQiPys0BCLnKzQEI6dLNAQjo1c0BCMvWzQEIqNjNAQj5wNQVGLrSzQEY642lFw==
                            Sec-Fetch-Site: same-site
                            Sec-Fetch-Mode: cors
                            Sec-Fetch-Dest: empty
                            Referer: https://accounts.google.com/
                            Accept-Encoding: gzip, deflate, br
                            Accept-Language: en-US,en;q=0.9
                            Cookie: NID=517=U7xOzxfg_BV8C7wxwIVVM3v0PuwqpE7hzOLG0LIn0jD2CaIuuI2lEuDSr1mBW5RmusecNKYD4I1mACisKhGYTd0ATnu3Ch-98TYLkugZT1vhrednMgCa2MCBm1gHKVa0efBIJ7EZMdpp7gYHHLr0An_veFC02Y2syAgFGEhDQ2ESFfSykN91rbiXoQ
                            2024-10-02 03:22:15 UTC1291OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 33 39 33 33 33 37 38 36 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                            Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1727839333786",null,null,null
                            2024-10-02 03:22:16 UTC523INHTTP/1.1 200 OK
                            Access-Control-Allow-Origin: https://accounts.google.com
                            Cross-Origin-Resource-Policy: cross-origin
                            Access-Control-Allow-Credentials: true
                            Access-Control-Allow-Headers: X-Playlog-Web
                            Content-Type: text/plain; charset=UTF-8
                            Date: Wed, 02 Oct 2024 03:22:15 GMT
                            Server: Playlog
                            Cache-Control: private
                            X-XSS-Protection: 0
                            X-Frame-Options: SAMEORIGIN
                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                            Accept-Ranges: none
                            Vary: Accept-Encoding
                            Connection: close
                            Transfer-Encoding: chunked
                            2024-10-02 03:22:16 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                            Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                            2024-10-02 03:22:16 UTC5INData Raw: 30 0d 0a 0d 0a
                            Data Ascii: 0


                            Session IDSource IPSource PortDestination IPDestination Port
                            24192.168.2.64977940.115.3.253443
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:22:39 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 75 72 7a 48 67 4e 47 4e 61 55 2b 4b 44 47 46 52 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 34 64 34 30 37 34 63 30 36 39 34 39 35 32 64 0d 0a 0d 0a
                            Data Ascii: CNT 1 CON 305MS-CV: urzHgNGNaU+KDGFR.1Context: a4d4074c0694952d
                            2024-10-02 03:22:39 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                            Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                            2024-10-02 03:22:39 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 75 72 7a 48 67 4e 47 4e 61 55 2b 4b 44 47 46 52 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 34 64 34 30 37 34 63 30 36 39 34 39 35 32 64 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 62 49 64 52 72 6a 6e 62 75 76 56 6b 53 7a 33 56 4c 71 52 63 4c 4c 39 73 4f 38 46 6e 4c 6f 47 49 45 33 6e 52 79 66 39 34 55 4a 63 32 2f 62 65 30 75 34 6b 6d 66 30 6c 47 5a 4d 58 2b 35 59 55 48 45 78 62 4c 6f 59 6d 65 50 78 44 7a 4a 55 2b 57 34 54 42 57 68 2f 2f 56 57 72 35 71 48 67 65 6b 33 6d 57 37 6e 6a 45 34 54 6c 62 50 77
                            Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: urzHgNGNaU+KDGFR.2Context: a4d4074c0694952d<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAbIdRrjnbuvVkSz3VLqRcLL9sO8FnLoGIE3nRyf94UJc2/be0u4kmf0lGZMX+5YUHExbLoYmePxDzJU+W4TBWh//VWr5qHgek3mW7njE4TlbPw
                            2024-10-02 03:22:39 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 75 72 7a 48 67 4e 47 4e 61 55 2b 4b 44 47 46 52 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 34 64 34 30 37 34 63 30 36 39 34 39 35 32 64 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                            Data Ascii: BND 3 CON\WNS 0 197MS-CV: urzHgNGNaU+KDGFR.3Context: a4d4074c0694952d<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                            2024-10-02 03:22:39 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                            Data Ascii: 202 1 CON 58
                            2024-10-02 03:22:39 UTC58INData Raw: 4d 53 2d 43 56 3a 20 70 61 43 4d 59 52 4c 4e 4c 6b 71 52 4c 6f 4f 33 5a 30 78 6e 71 51 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                            Data Ascii: MS-CV: paCMYRLNLkqRLoO3Z0xnqQ.0Payload parsing failed.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            25192.168.2.649780142.250.184.2384431588C:\Program Files\Google\Chrome\Application\chrome.exe
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:22:45 UTC1325OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                            Host: play.google.com
                            Connection: keep-alive
                            Content-Length: 1564
                            sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                            sec-ch-ua-mobile: ?0
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                            sec-ch-ua-arch: "x86"
                            Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                            sec-ch-ua-full-version: "117.0.5938.134"
                            sec-ch-ua-platform-version: "10.0.0"
                            X-Goog-AuthUser: 0
                            sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                            sec-ch-ua-bitness: "64"
                            sec-ch-ua-model: ""
                            sec-ch-ua-wow64: ?0
                            sec-ch-ua-platform: "Windows"
                            Accept: */*
                            Origin: https://accounts.google.com
                            X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlKHLAQj6mM0BCIWgzQEI3L3NAQiPys0BCLnKzQEI6dLNAQjo1c0BCMvWzQEIqNjNAQj5wNQVGLrSzQEY642lFw==
                            Sec-Fetch-Site: same-site
                            Sec-Fetch-Mode: cors
                            Sec-Fetch-Dest: empty
                            Referer: https://accounts.google.com/
                            Accept-Encoding: gzip, deflate, br
                            Accept-Language: en-US,en;q=0.9
                            Cookie: NID=517=U7xOzxfg_BV8C7wxwIVVM3v0PuwqpE7hzOLG0LIn0jD2CaIuuI2lEuDSr1mBW5RmusecNKYD4I1mACisKhGYTd0ATnu3Ch-98TYLkugZT1vhrednMgCa2MCBm1gHKVa0efBIJ7EZMdpp7gYHHLr0An_veFC02Y2syAgFGEhDQ2ESFfSykN91rbiXoQ
                            2024-10-02 03:22:45 UTC1564OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 33 39 33 36 34 30 32 31 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                            Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1727839364021",null,null,null
                            2024-10-02 03:22:46 UTC523INHTTP/1.1 200 OK
                            Access-Control-Allow-Origin: https://accounts.google.com
                            Cross-Origin-Resource-Policy: cross-origin
                            Access-Control-Allow-Credentials: true
                            Access-Control-Allow-Headers: X-Playlog-Web
                            Content-Type: text/plain; charset=UTF-8
                            Date: Wed, 02 Oct 2024 03:22:46 GMT
                            Server: Playlog
                            Cache-Control: private
                            X-XSS-Protection: 0
                            X-Frame-Options: SAMEORIGIN
                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                            Accept-Ranges: none
                            Vary: Accept-Encoding
                            Connection: close
                            Transfer-Encoding: chunked
                            2024-10-02 03:22:46 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                            Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                            2024-10-02 03:22:46 UTC5INData Raw: 30 0d 0a 0d 0a
                            Data Ascii: 0


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            26192.168.2.649781142.250.184.2384431588C:\Program Files\Google\Chrome\Application\chrome.exe
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:22:46 UTC1325OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                            Host: play.google.com
                            Connection: keep-alive
                            Content-Length: 1160
                            sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                            sec-ch-ua-mobile: ?0
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                            sec-ch-ua-arch: "x86"
                            Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                            sec-ch-ua-full-version: "117.0.5938.134"
                            sec-ch-ua-platform-version: "10.0.0"
                            X-Goog-AuthUser: 0
                            sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                            sec-ch-ua-bitness: "64"
                            sec-ch-ua-model: ""
                            sec-ch-ua-wow64: ?0
                            sec-ch-ua-platform: "Windows"
                            Accept: */*
                            Origin: https://accounts.google.com
                            X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlKHLAQj6mM0BCIWgzQEI3L3NAQiPys0BCLnKzQEI6dLNAQjo1c0BCMvWzQEIqNjNAQj5wNQVGLrSzQEY642lFw==
                            Sec-Fetch-Site: same-site
                            Sec-Fetch-Mode: cors
                            Sec-Fetch-Dest: empty
                            Referer: https://accounts.google.com/
                            Accept-Encoding: gzip, deflate, br
                            Accept-Language: en-US,en;q=0.9
                            Cookie: NID=517=U7xOzxfg_BV8C7wxwIVVM3v0PuwqpE7hzOLG0LIn0jD2CaIuuI2lEuDSr1mBW5RmusecNKYD4I1mACisKhGYTd0ATnu3Ch-98TYLkugZT1vhrednMgCa2MCBm1gHKVa0efBIJ7EZMdpp7gYHHLr0An_veFC02Y2syAgFGEhDQ2ESFfSykN91rbiXoQ
                            2024-10-02 03:22:46 UTC1160OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 33 39 33 36 34 31 34 34 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                            Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1727839364144",null,null,null
                            2024-10-02 03:22:46 UTC523INHTTP/1.1 200 OK
                            Access-Control-Allow-Origin: https://accounts.google.com
                            Cross-Origin-Resource-Policy: cross-origin
                            Access-Control-Allow-Credentials: true
                            Access-Control-Allow-Headers: X-Playlog-Web
                            Content-Type: text/plain; charset=UTF-8
                            Date: Wed, 02 Oct 2024 03:22:46 GMT
                            Server: Playlog
                            Cache-Control: private
                            X-XSS-Protection: 0
                            X-Frame-Options: SAMEORIGIN
                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                            Accept-Ranges: none
                            Vary: Accept-Encoding
                            Connection: close
                            Transfer-Encoding: chunked
                            2024-10-02 03:22:46 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                            Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                            2024-10-02 03:22:46 UTC5INData Raw: 30 0d 0a 0d 0a
                            Data Ascii: 0


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:23:20:54
                            Start date:01/10/2024
                            Path:C:\Users\user\Desktop\file.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\file.exe"
                            Imagebase:0x7b0000
                            File size:918'528 bytes
                            MD5 hash:6F2531641192FCA92CB3F1DE7713C3AD
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:1
                            Start time:23:20:54
                            Start date:01/10/2024
                            Path:C:\Windows\SysWOW64\taskkill.exe
                            Wow64 process (32bit):true
                            Commandline:taskkill /F /IM chrome.exe /T
                            Imagebase:0x1f0000
                            File size:74'240 bytes
                            MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:true

                            Target ID:2
                            Start time:23:20:54
                            Start date:01/10/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff66e660000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:4
                            Start time:23:20:56
                            Start date:01/10/2024
                            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
                            Imagebase:0x7ff684c40000
                            File size:3'242'272 bytes
                            MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:false

                            Target ID:6
                            Start time:23:20:57
                            Start date:01/10/2024
                            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=2132,i,4500856115818636558,18326832539678006832,262144 /prefetch:8
                            Imagebase:0x7ff684c40000
                            File size:3'242'272 bytes
                            MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:false

                            Target ID:8
                            Start time:23:21:08
                            Start date:01/10/2024
                            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5140 --field-trial-handle=2132,i,4500856115818636558,18326832539678006832,262144 /prefetch:8
                            Imagebase:0x7ff684c40000
                            File size:3'242'272 bytes
                            MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:false

                            Target ID:9
                            Start time:23:21:08
                            Start date:01/10/2024
                            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=2132,i,4500856115818636558,18326832539678006832,262144 /prefetch:8
                            Imagebase:0x7ff684c40000
                            File size:3'242'272 bytes
                            MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:2%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:5.1%
                              Total number of Nodes:1560
                              Total number of Limit Nodes:61
                              execution_graph 94934 7b105b 94939 7b344d 94934->94939 94936 7b106a 94970 7d00a3 29 API calls __onexit 94936->94970 94938 7b1074 94940 7b345d __wsopen_s 94939->94940 94971 7ba961 94940->94971 94944 7b351c 94983 7b3357 94944->94983 94951 7ba961 22 API calls 94952 7b354d 94951->94952 95004 7ba6c3 94952->95004 94955 7f3176 RegQueryValueExW 94956 7f320c RegCloseKey 94955->94956 94957 7f3193 94955->94957 94959 7b3578 94956->94959 94969 7f321e _wcslen 94956->94969 95010 7cfe0b 94957->95010 94959->94936 94960 7f31ac 95020 7b5722 94960->95020 94961 7b4c6d 22 API calls 94961->94969 94964 7f31d4 95023 7b6b57 94964->95023 94966 7f31ee ISource 94966->94956 94968 7b515f 22 API calls 94968->94969 94969->94959 94969->94961 94969->94968 95035 7b9cb3 94969->95035 94970->94938 94972 7cfe0b 22 API calls 94971->94972 94973 7ba976 94972->94973 95041 7cfddb 94973->95041 94975 7b3513 94976 7b3a5a 94975->94976 95063 7f1f50 94976->95063 94979 7b9cb3 22 API calls 94980 7b3a8d 94979->94980 95065 7b3aa2 94980->95065 94982 7b3a97 94982->94944 94984 7f1f50 __wsopen_s 94983->94984 94985 7b3364 GetFullPathNameW 94984->94985 94986 7b3386 94985->94986 94987 7b6b57 22 API calls 94986->94987 94988 7b33a4 94987->94988 94989 7b33c6 94988->94989 94990 7f30bb 94989->94990 94991 7b33dd 94989->94991 94992 7cfddb 22 API calls 94990->94992 95089 7b33ee 94991->95089 94995 7f30c5 _wcslen 94992->94995 94994 7b33e8 94998 7b515f 94994->94998 94996 7cfe0b 22 API calls 94995->94996 94997 7f30fe __fread_nolock 94996->94997 94999 7b516e 94998->94999 95003 7b518f __fread_nolock 94998->95003 95001 7cfe0b 22 API calls 94999->95001 95000 7cfddb 22 API calls 95002 7b3544 95000->95002 95001->95003 95002->94951 95003->95000 95005 7ba6dd 95004->95005 95006 7b3556 RegOpenKeyExW 95004->95006 95007 7cfddb 22 API calls 95005->95007 95006->94955 95006->94959 95008 7ba6e7 95007->95008 95009 7cfe0b 22 API calls 95008->95009 95009->95006 95014 7cfddb 95010->95014 95011 7dea0c ___std_exception_copy 21 API calls 95011->95014 95012 7cfdfa 95012->94960 95014->95011 95014->95012 95016 7cfdfc 95014->95016 95104 7d4ead 7 API calls 2 library calls 95014->95104 95015 7d066d 95106 7d32a4 RaiseException 95015->95106 95016->95015 95105 7d32a4 RaiseException 95016->95105 95019 7d068a 95019->94960 95021 7cfddb 22 API calls 95020->95021 95022 7b5734 RegQueryValueExW 95021->95022 95022->94964 95022->94966 95024 7b6b67 _wcslen 95023->95024 95025 7f4ba1 95023->95025 95028 7b6b7d 95024->95028 95029 7b6ba2 95024->95029 95026 7b93b2 22 API calls 95025->95026 95027 7f4baa 95026->95027 95027->95027 95107 7b6f34 22 API calls 95028->95107 95031 7cfddb 22 API calls 95029->95031 95033 7b6bae 95031->95033 95032 7b6b85 __fread_nolock 95032->94966 95034 7cfe0b 22 API calls 95033->95034 95034->95032 95036 7b9cc2 _wcslen 95035->95036 95037 7cfe0b 22 API calls 95036->95037 95038 7b9cea __fread_nolock 95037->95038 95039 7cfddb 22 API calls 95038->95039 95040 7b9d00 95039->95040 95040->94969 95044 7cfde0 95041->95044 95043 7cfdfa 95043->94975 95044->95043 95046 7cfdfc 95044->95046 95051 7dea0c 95044->95051 95058 7d4ead 7 API calls 2 library calls 95044->95058 95047 7d066d 95046->95047 95059 7d32a4 RaiseException 95046->95059 95060 7d32a4 RaiseException 95047->95060 95050 7d068a 95050->94975 95056 7e3820 FindHandlerForForeignException 95051->95056 95052 7e385e 95062 7df2d9 20 API calls __dosmaperr 95052->95062 95054 7e3849 RtlAllocateHeap 95055 7e385c 95054->95055 95054->95056 95055->95044 95056->95052 95056->95054 95061 7d4ead 7 API calls 2 library calls 95056->95061 95058->95044 95059->95047 95060->95050 95061->95056 95062->95055 95064 7b3a67 GetModuleFileNameW 95063->95064 95064->94979 95066 7f1f50 __wsopen_s 95065->95066 95067 7b3aaf GetFullPathNameW 95066->95067 95068 7b3ae9 95067->95068 95069 7b3ace 95067->95069 95071 7ba6c3 22 API calls 95068->95071 95070 7b6b57 22 API calls 95069->95070 95072 7b3ada 95070->95072 95071->95072 95075 7b37a0 95072->95075 95076 7b37ae 95075->95076 95079 7b93b2 95076->95079 95078 7b37c2 95078->94982 95080 7b93c0 95079->95080 95082 7b93c9 __fread_nolock 95079->95082 95080->95082 95083 7baec9 95080->95083 95082->95078 95084 7baedc 95083->95084 95088 7baed9 __fread_nolock 95083->95088 95085 7cfddb 22 API calls 95084->95085 95086 7baee7 95085->95086 95087 7cfe0b 22 API calls 95086->95087 95087->95088 95088->95082 95090 7b33fe _wcslen 95089->95090 95091 7f311d 95090->95091 95092 7b3411 95090->95092 95094 7cfddb 22 API calls 95091->95094 95099 7ba587 95092->95099 95096 7f3127 95094->95096 95095 7b341e __fread_nolock 95095->94994 95097 7cfe0b 22 API calls 95096->95097 95098 7f3157 __fread_nolock 95097->95098 95100 7ba59d 95099->95100 95103 7ba598 __fread_nolock 95099->95103 95101 7ff80f 95100->95101 95102 7cfe0b 22 API calls 95100->95102 95102->95103 95103->95095 95104->95014 95105->95015 95106->95019 95107->95032 95108 802a00 95123 7bd7b0 ISource 95108->95123 95109 7bdb11 PeekMessageW 95109->95123 95110 7bd807 GetInputState 95110->95109 95110->95123 95112 801cbe TranslateAcceleratorW 95112->95123 95113 7bdb8f PeekMessageW 95113->95123 95114 7bdb73 TranslateMessage DispatchMessageW 95114->95113 95115 7bda04 timeGetTime 95115->95123 95116 7bdbaf Sleep 95116->95123 95117 802b74 Sleep 95130 802a51 95117->95130 95119 801dda timeGetTime 95268 7ce300 23 API calls 95119->95268 95123->95109 95123->95110 95123->95112 95123->95113 95123->95114 95123->95115 95123->95116 95123->95117 95123->95119 95125 7bd9d5 95123->95125 95123->95130 95140 7bdd50 95123->95140 95147 7c1310 95123->95147 95203 7bbf40 95123->95203 95261 7cedf6 95123->95261 95266 7bdfd0 348 API calls 3 library calls 95123->95266 95267 7ce551 timeGetTime 95123->95267 95269 823a2a 23 API calls 95123->95269 95270 7bec40 95123->95270 95294 82359c 82 API calls __wsopen_s 95123->95294 95124 802c0b GetExitCodeProcess 95128 802c21 WaitForSingleObject 95124->95128 95129 802c37 CloseHandle 95124->95129 95126 8429bf GetForegroundWindow 95126->95130 95128->95123 95128->95129 95129->95130 95130->95123 95130->95124 95130->95125 95130->95126 95131 802ca9 Sleep 95130->95131 95295 835658 23 API calls 95130->95295 95296 81e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 95130->95296 95297 7ce551 timeGetTime 95130->95297 95298 81d4dc 47 API calls 95130->95298 95131->95123 95141 7bdd6f 95140->95141 95142 7bdd83 95140->95142 95299 7bd260 95141->95299 95331 82359c 82 API calls __wsopen_s 95142->95331 95144 7bdd7a 95144->95123 95146 802f75 95146->95146 95148 7c1376 95147->95148 95149 7c17b0 95147->95149 95151 806331 95148->95151 95152 7c1390 95148->95152 95390 7d0242 5 API calls __Init_thread_wait 95149->95390 95395 83709c 348 API calls 95151->95395 95339 7c1940 95152->95339 95154 7c17ba 95158 7b9cb3 22 API calls 95154->95158 95163 7c17fb 95154->95163 95156 80633d 95156->95123 95160 7c17d4 95158->95160 95159 7c1940 9 API calls 95161 7c13b6 95159->95161 95391 7d01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95160->95391 95161->95163 95164 7c13ec 95161->95164 95162 806346 95396 82359c 82 API calls __wsopen_s 95162->95396 95163->95162 95165 7c182c 95163->95165 95164->95162 95187 7c1408 __fread_nolock 95164->95187 95392 7baceb 23 API calls ISource 95165->95392 95169 7c1839 95393 7cd217 348 API calls 95169->95393 95171 80636e 95397 82359c 82 API calls __wsopen_s 95171->95397 95172 7c152f 95174 7c153c 95172->95174 95175 8063d1 95172->95175 95177 7c1940 9 API calls 95174->95177 95399 835745 54 API calls _wcslen 95175->95399 95179 7c1549 95177->95179 95178 7cfddb 22 API calls 95178->95187 95182 8064fa 95179->95182 95184 7c1940 9 API calls 95179->95184 95180 7c1872 95394 7cfaeb 23 API calls 95180->95394 95181 7cfe0b 22 API calls 95181->95187 95191 806369 95182->95191 95401 82359c 82 API calls __wsopen_s 95182->95401 95189 7c1563 95184->95189 95186 7bec40 348 API calls 95186->95187 95187->95169 95187->95171 95187->95172 95187->95178 95187->95181 95187->95186 95188 8063b2 95187->95188 95187->95191 95398 82359c 82 API calls __wsopen_s 95188->95398 95189->95182 95194 7c15c7 ISource 95189->95194 95400 7ba8c7 22 API calls __fread_nolock 95189->95400 95191->95123 95193 7c1940 9 API calls 95193->95194 95194->95180 95194->95182 95194->95191 95194->95193 95196 7c167b ISource 95194->95196 95349 83ab67 95194->95349 95352 7cf645 95194->95352 95359 825c5a 95194->95359 95364 83abf7 95194->95364 95369 83a67c CreateToolhelp32Snapshot Process32FirstW 95194->95369 95195 7c171d 95195->95123 95196->95195 95389 7cce17 22 API calls ISource 95196->95389 95665 7badf0 95203->95665 95205 7bbf9d 95206 7bbfa9 95205->95206 95207 8004b6 95205->95207 95209 7bc01e 95206->95209 95210 8004c6 95206->95210 95684 82359c 82 API calls __wsopen_s 95207->95684 95670 7bac91 95209->95670 95685 82359c 82 API calls __wsopen_s 95210->95685 95213 8004f5 95226 80055a 95213->95226 95686 7cd217 348 API calls 95213->95686 95214 7bc7da 95220 7cfe0b 22 API calls 95214->95220 95216 817120 22 API calls 95217 7bc039 ISource __fread_nolock 95216->95217 95217->95213 95217->95214 95217->95216 95224 7bec40 348 API calls 95217->95224 95225 7bc808 __fread_nolock 95217->95225 95217->95226 95227 80091a 95217->95227 95229 7baf8a 22 API calls 95217->95229 95232 8008a5 95217->95232 95236 800591 95217->95236 95237 8008f6 95217->95237 95242 7bbbe0 40 API calls 95217->95242 95245 7bc237 95217->95245 95246 7cfddb 22 API calls 95217->95246 95249 7bc603 95217->95249 95250 7cfe0b 22 API calls 95217->95250 95255 8009bf 95217->95255 95674 7bad81 95217->95674 95689 817099 22 API calls __fread_nolock 95217->95689 95690 835745 54 API calls _wcslen 95217->95690 95691 7caa42 22 API calls ISource 95217->95691 95692 81f05c 40 API calls 95217->95692 95693 7ba993 41 API calls 95217->95693 95694 7baceb 23 API calls ISource 95217->95694 95220->95225 95224->95217 95228 7cfe0b 22 API calls 95225->95228 95226->95249 95687 82359c 82 API calls __wsopen_s 95226->95687 95697 823209 23 API calls 95227->95697 95259 7bc350 ISource __fread_nolock 95228->95259 95229->95217 95233 7bec40 348 API calls 95232->95233 95235 8008cf 95233->95235 95235->95249 95695 7ba81b 41 API calls 95235->95695 95688 82359c 82 API calls __wsopen_s 95236->95688 95696 82359c 82 API calls __wsopen_s 95237->95696 95242->95217 95244 7bc253 95247 800976 95244->95247 95253 7bc297 ISource 95244->95253 95245->95244 95698 7ba8c7 22 API calls __fread_nolock 95245->95698 95246->95217 95699 7baceb 23 API calls ISource 95247->95699 95249->95123 95250->95217 95253->95255 95681 7baceb 23 API calls ISource 95253->95681 95255->95249 95700 82359c 82 API calls __wsopen_s 95255->95700 95256 7bc335 95256->95255 95257 7bc342 95256->95257 95682 7ba704 22 API calls ISource 95257->95682 95260 7bc3ac 95259->95260 95683 7cce17 22 API calls ISource 95259->95683 95260->95123 95262 7cee09 95261->95262 95263 7cee12 95261->95263 95262->95123 95263->95262 95264 7cee36 IsDialogMessageW 95263->95264 95265 80efaf GetClassLongW 95263->95265 95264->95262 95264->95263 95265->95263 95265->95264 95266->95123 95267->95123 95268->95123 95269->95123 95273 7bec76 ISource 95270->95273 95271 7d0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95271->95273 95272 804beb 95717 82359c 82 API calls __wsopen_s 95272->95717 95273->95271 95273->95272 95274 7cfddb 22 API calls 95273->95274 95275 7bfef7 95273->95275 95278 804600 95273->95278 95279 7bed9d ISource 95273->95279 95280 804b0b 95273->95280 95281 7ba8c7 22 API calls 95273->95281 95287 7bfbe3 95273->95287 95288 7ba961 22 API calls 95273->95288 95290 7d00a3 29 API calls pre_c_initialization 95273->95290 95292 7d01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95273->95292 95293 7bf3ae ISource 95273->95293 95710 7c01e0 348 API calls 2 library calls 95273->95710 95711 7c06a0 41 API calls ISource 95273->95711 95274->95273 95275->95279 95713 7ba8c7 22 API calls __fread_nolock 95275->95713 95278->95279 95712 7ba8c7 22 API calls __fread_nolock 95278->95712 95279->95123 95715 82359c 82 API calls __wsopen_s 95280->95715 95281->95273 95287->95279 95289 804bdc 95287->95289 95287->95293 95288->95273 95716 82359c 82 API calls __wsopen_s 95289->95716 95290->95273 95292->95273 95293->95279 95714 82359c 82 API calls __wsopen_s 95293->95714 95294->95123 95295->95130 95296->95130 95297->95130 95298->95130 95300 7bec40 348 API calls 95299->95300 95320 7bd29d 95300->95320 95301 801bc4 95338 82359c 82 API calls __wsopen_s 95301->95338 95303 7bd30b ISource 95303->95144 95304 7bd3c3 95306 7bd3ce 95304->95306 95307 7bd6d5 95304->95307 95305 7bd5ff 95309 801bb5 95305->95309 95310 7bd614 95305->95310 95308 7cfddb 22 API calls 95306->95308 95307->95303 95315 7cfe0b 22 API calls 95307->95315 95318 7bd3d5 __fread_nolock 95308->95318 95337 835705 23 API calls 95309->95337 95313 7cfddb 22 API calls 95310->95313 95311 7bd4b8 95316 7cfe0b 22 API calls 95311->95316 95324 7bd46a 95313->95324 95314 7cfddb 22 API calls 95314->95320 95315->95318 95326 7bd429 ISource __fread_nolock 95316->95326 95317 7cfddb 22 API calls 95319 7bd3f6 95317->95319 95318->95317 95318->95319 95319->95326 95332 7bbec0 348 API calls 95319->95332 95320->95301 95320->95303 95320->95304 95320->95307 95320->95311 95320->95314 95320->95326 95322 801ba4 95336 82359c 82 API calls __wsopen_s 95322->95336 95324->95144 95326->95305 95326->95322 95326->95324 95327 801b7f 95326->95327 95329 801b5d 95326->95329 95333 7b1f6f 348 API calls 95326->95333 95335 82359c 82 API calls __wsopen_s 95327->95335 95334 82359c 82 API calls __wsopen_s 95329->95334 95331->95146 95332->95326 95333->95326 95334->95324 95335->95324 95336->95324 95337->95301 95338->95303 95340 7c195d 95339->95340 95341 7c1981 95339->95341 95348 7c13a0 95340->95348 95404 7d0242 5 API calls __Init_thread_wait 95340->95404 95402 7d0242 5 API calls __Init_thread_wait 95341->95402 95344 7c198b 95344->95340 95403 7d01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95344->95403 95345 7c8727 95345->95348 95405 7d01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95345->95405 95348->95159 95406 83aff9 95349->95406 95353 7bb567 39 API calls 95352->95353 95354 7cf659 95353->95354 95355 80f2dc Sleep 95354->95355 95356 7cf661 timeGetTime 95354->95356 95357 7bb567 39 API calls 95356->95357 95358 7cf677 95357->95358 95358->95194 95360 7b7510 53 API calls 95359->95360 95361 825c6d 95360->95361 95561 81dbbe lstrlenW 95361->95561 95363 825c77 95363->95194 95365 83aff9 217 API calls 95364->95365 95367 83ac0c 95365->95367 95366 83ac54 95366->95194 95367->95366 95566 7baceb 23 API calls ISource 95367->95566 95373 83a6c3 95369->95373 95370 7ba961 22 API calls 95370->95373 95371 7b9cb3 22 API calls 95371->95373 95373->95370 95373->95371 95376 7b7510 53 API calls 95373->95376 95378 83a796 Process32NextW 95373->95378 95567 7b525f 95373->95567 95609 7b6350 95373->95609 95624 7cce60 41 API calls 95373->95624 95625 83b574 22 API calls __fread_nolock 95373->95625 95376->95373 95378->95373 95379 83a7aa CloseHandle 95378->95379 95618 7b63eb 95379->95618 95383 83a7cd 95627 7c04f0 22 API calls 95383->95627 95385 83a87d 95385->95194 95387 7c04f0 22 API calls 95388 83a7d9 95387->95388 95388->95385 95388->95387 95628 7b62b5 22 API calls 95388->95628 95389->95196 95390->95154 95391->95163 95392->95169 95393->95180 95394->95180 95395->95156 95396->95191 95397->95191 95398->95191 95399->95189 95400->95194 95401->95191 95402->95344 95403->95340 95404->95345 95405->95348 95407 83b01d ___scrt_fastfail 95406->95407 95408 83b094 95407->95408 95409 83b058 95407->95409 95411 7bb567 39 API calls 95408->95411 95416 83b08b 95408->95416 95527 7bb567 95409->95527 95415 83b0a5 95411->95415 95412 83b063 95412->95416 95419 7bb567 39 API calls 95412->95419 95413 83b0ed 95497 7b7510 95413->95497 95418 7bb567 39 API calls 95415->95418 95416->95413 95420 7bb567 39 API calls 95416->95420 95418->95416 95422 83b078 95419->95422 95420->95413 95424 7bb567 39 API calls 95422->95424 95423 83b115 95425 83b1d8 95423->95425 95426 83b11f 95423->95426 95424->95416 95428 83b20a GetCurrentDirectoryW 95425->95428 95429 7b7510 53 API calls 95425->95429 95427 7b7510 53 API calls 95426->95427 95430 83b130 95427->95430 95431 7cfe0b 22 API calls 95428->95431 95432 83b1ef 95429->95432 95433 7b7620 22 API calls 95430->95433 95434 83b22f GetCurrentDirectoryW 95431->95434 95435 7b7620 22 API calls 95432->95435 95436 83b13a 95433->95436 95437 83b23c 95434->95437 95438 83b1f9 _wcslen 95435->95438 95439 7b7510 53 API calls 95436->95439 95441 83b275 95437->95441 95532 7b9c6e 22 API calls 95437->95532 95438->95428 95438->95441 95440 83b14b 95439->95440 95442 7b7620 22 API calls 95440->95442 95446 83b287 95441->95446 95447 83b28b 95441->95447 95444 83b155 95442->95444 95448 7b7510 53 API calls 95444->95448 95445 83b255 95533 7b9c6e 22 API calls 95445->95533 95456 83b39a CreateProcessW 95446->95456 95457 83b2f8 95446->95457 95535 8207c0 10 API calls 95447->95535 95450 83b166 95448->95450 95453 7b7620 22 API calls 95450->95453 95451 83b265 95534 7b9c6e 22 API calls 95451->95534 95459 83b170 95453->95459 95455 83b294 95536 8206e6 10 API calls 95455->95536 95496 83b32f _wcslen 95456->95496 95538 8111c8 39 API calls 95457->95538 95462 83b1a6 GetSystemDirectoryW 95459->95462 95466 7b7510 53 API calls 95459->95466 95461 83b2fd 95464 83b323 95461->95464 95465 83b32a 95461->95465 95468 7cfe0b 22 API calls 95462->95468 95463 83b2aa 95537 8205a7 8 API calls 95463->95537 95539 811201 128 API calls 2 library calls 95464->95539 95540 8114ce 6 API calls 95465->95540 95470 83b187 95466->95470 95473 83b1cb GetSystemDirectoryW 95468->95473 95475 7b7620 22 API calls 95470->95475 95472 83b2d0 95472->95446 95473->95437 95474 83b328 95474->95496 95478 83b191 _wcslen 95475->95478 95476 83b3d6 GetLastError 95486 83b41a 95476->95486 95477 83b42f CloseHandle 95479 83b43f 95477->95479 95487 83b49a 95477->95487 95478->95437 95478->95462 95481 83b451 95479->95481 95482 83b446 CloseHandle 95479->95482 95484 83b463 95481->95484 95485 83b458 CloseHandle 95481->95485 95482->95481 95483 83b4a6 95483->95486 95488 83b475 95484->95488 95489 83b46a CloseHandle 95484->95489 95485->95484 95524 820175 95486->95524 95487->95483 95493 83b4d2 CloseHandle 95487->95493 95541 8209d9 34 API calls 95488->95541 95489->95488 95492 83b486 95542 83b536 25 API calls 95492->95542 95493->95486 95496->95476 95496->95477 95498 7b7522 95497->95498 95499 7b7525 95497->95499 95520 7b7620 95498->95520 95500 7b755b 95499->95500 95501 7b752d 95499->95501 95503 7f50f6 95500->95503 95506 7b756d 95500->95506 95511 7f500f 95500->95511 95543 7d51c6 26 API calls 95501->95543 95546 7d5183 26 API calls 95503->95546 95504 7b753d 95510 7cfddb 22 API calls 95504->95510 95544 7cfb21 51 API calls 95506->95544 95507 7f510e 95507->95507 95512 7b7547 95510->95512 95513 7f5088 95511->95513 95515 7cfe0b 22 API calls 95511->95515 95514 7b9cb3 22 API calls 95512->95514 95545 7cfb21 51 API calls 95513->95545 95514->95498 95516 7f5058 95515->95516 95517 7cfddb 22 API calls 95516->95517 95518 7f507f 95517->95518 95519 7b9cb3 22 API calls 95518->95519 95519->95513 95521 7b762a _wcslen 95520->95521 95522 7cfe0b 22 API calls 95521->95522 95523 7b763f 95522->95523 95523->95423 95547 82030f 95524->95547 95528 7bb578 95527->95528 95529 7bb57f 95527->95529 95528->95529 95560 7d62d1 39 API calls _strftime 95528->95560 95529->95412 95531 7bb5c2 95531->95412 95532->95445 95533->95451 95534->95441 95535->95455 95536->95463 95537->95472 95538->95461 95539->95474 95540->95496 95541->95492 95542->95487 95543->95504 95544->95504 95545->95503 95546->95507 95548 820321 CloseHandle 95547->95548 95549 820329 95547->95549 95548->95549 95550 820336 95549->95550 95551 82032e CloseHandle 95549->95551 95552 820343 95550->95552 95553 82033b CloseHandle 95550->95553 95551->95550 95554 820350 95552->95554 95555 820348 CloseHandle 95552->95555 95553->95552 95556 820355 CloseHandle 95554->95556 95557 82035d 95554->95557 95555->95554 95556->95557 95558 820362 CloseHandle 95557->95558 95559 82017d 95557->95559 95558->95559 95559->95194 95560->95531 95562 81dc06 95561->95562 95563 81dbdc GetFileAttributesW 95561->95563 95562->95363 95563->95562 95564 81dbe8 FindFirstFileW 95563->95564 95564->95562 95565 81dbf9 FindClose 95564->95565 95565->95562 95566->95366 95568 7ba961 22 API calls 95567->95568 95569 7b5275 95568->95569 95570 7ba961 22 API calls 95569->95570 95571 7b527d 95570->95571 95572 7ba961 22 API calls 95571->95572 95573 7b5285 95572->95573 95574 7ba961 22 API calls 95573->95574 95575 7b528d 95574->95575 95576 7f3df5 95575->95576 95577 7b52c1 95575->95577 95647 7ba8c7 22 API calls __fread_nolock 95576->95647 95579 7b6d25 22 API calls 95577->95579 95581 7b52cf 95579->95581 95580 7f3dfe 95582 7ba6c3 22 API calls 95580->95582 95583 7b93b2 22 API calls 95581->95583 95587 7b5304 95582->95587 95584 7b52d9 95583->95584 95585 7b6d25 22 API calls 95584->95585 95584->95587 95590 7b52fa 95585->95590 95586 7b5349 95629 7b6d25 95586->95629 95587->95586 95588 7b5325 95587->95588 95605 7f3e20 95587->95605 95588->95586 95642 7b4c6d 95588->95642 95592 7b93b2 22 API calls 95590->95592 95591 7b535a 95593 7b5370 95591->95593 95645 7ba8c7 22 API calls __fread_nolock 95591->95645 95592->95587 95595 7b5384 95593->95595 95646 7ba8c7 22 API calls __fread_nolock 95593->95646 95599 7b538f 95595->95599 95649 7ba8c7 22 API calls __fread_nolock 95595->95649 95597 7b6b57 22 API calls 95606 7f3ee0 95597->95606 95607 7b539a 95599->95607 95650 7ba8c7 22 API calls __fread_nolock 95599->95650 95601 7b6d25 22 API calls 95601->95586 95604 7b4c6d 22 API calls 95604->95606 95605->95597 95606->95586 95606->95604 95648 7b49bd 22 API calls __fread_nolock 95606->95648 95607->95373 95610 7b6362 95609->95610 95611 7f4a51 95609->95611 95652 7b6373 95610->95652 95662 7b4a88 22 API calls __fread_nolock 95611->95662 95614 7b636e 95614->95373 95615 7f4a5b 95616 7f4a67 95615->95616 95663 7ba8c7 22 API calls __fread_nolock 95615->95663 95619 7b63f3 95618->95619 95620 7cfddb 22 API calls 95619->95620 95621 7b6401 95620->95621 95664 7b6a26 22 API calls 95621->95664 95623 7b6409 95626 7b6a50 22 API calls 95623->95626 95624->95373 95625->95373 95626->95383 95627->95388 95628->95388 95630 7b6d91 95629->95630 95631 7b6d34 95629->95631 95632 7b93b2 22 API calls 95630->95632 95631->95630 95633 7b6d3f 95631->95633 95638 7b6d62 __fread_nolock 95632->95638 95634 7b6d5a 95633->95634 95635 7f4c9d 95633->95635 95651 7b6f34 22 API calls 95634->95651 95636 7cfddb 22 API calls 95635->95636 95639 7f4ca7 95636->95639 95638->95591 95640 7cfe0b 22 API calls 95639->95640 95641 7f4cda 95640->95641 95643 7baec9 22 API calls 95642->95643 95644 7b4c78 95643->95644 95644->95586 95644->95601 95645->95593 95646->95595 95647->95580 95648->95606 95649->95599 95650->95607 95651->95638 95653 7b63b6 __fread_nolock 95652->95653 95654 7b6382 95652->95654 95653->95614 95654->95653 95655 7f4a82 95654->95655 95656 7b63a9 95654->95656 95658 7cfddb 22 API calls 95655->95658 95657 7ba587 22 API calls 95656->95657 95657->95653 95659 7f4a91 95658->95659 95660 7cfe0b 22 API calls 95659->95660 95661 7f4ac5 __fread_nolock 95660->95661 95662->95615 95663->95616 95664->95623 95666 7bae01 95665->95666 95669 7bae1c ISource 95665->95669 95667 7baec9 22 API calls 95666->95667 95668 7bae09 CharUpperBuffW 95667->95668 95668->95669 95669->95205 95671 7bacae 95670->95671 95672 7bacd1 95671->95672 95701 82359c 82 API calls __wsopen_s 95671->95701 95672->95217 95675 7ffadb 95674->95675 95676 7bad92 95674->95676 95677 7cfddb 22 API calls 95676->95677 95678 7bad99 95677->95678 95702 7badcd 95678->95702 95681->95256 95682->95259 95683->95259 95684->95210 95685->95249 95686->95226 95687->95249 95688->95249 95689->95217 95690->95217 95691->95217 95692->95217 95693->95217 95694->95217 95695->95237 95696->95249 95697->95245 95698->95244 95699->95255 95700->95249 95701->95672 95706 7baddd 95702->95706 95703 7badb6 95703->95217 95704 7cfddb 22 API calls 95704->95706 95705 7ba961 22 API calls 95705->95706 95706->95703 95706->95704 95706->95705 95707 7badcd 22 API calls 95706->95707 95709 7ba8c7 22 API calls __fread_nolock 95706->95709 95707->95706 95709->95706 95710->95273 95711->95273 95712->95279 95713->95279 95714->95279 95715->95279 95716->95272 95717->95279 95718 7b1098 95723 7b42de 95718->95723 95722 7b10a7 95724 7ba961 22 API calls 95723->95724 95725 7b42f5 GetVersionExW 95724->95725 95726 7b6b57 22 API calls 95725->95726 95727 7b4342 95726->95727 95728 7b93b2 22 API calls 95727->95728 95739 7b4378 95727->95739 95729 7b436c 95728->95729 95731 7b37a0 22 API calls 95729->95731 95730 7b441b GetCurrentProcess IsWow64Process 95732 7b4437 95730->95732 95731->95739 95733 7b444f LoadLibraryA 95732->95733 95734 7f3824 GetSystemInfo 95732->95734 95735 7b449c GetSystemInfo 95733->95735 95736 7b4460 GetProcAddress 95733->95736 95738 7b4476 95735->95738 95736->95735 95737 7b4470 GetNativeSystemInfo 95736->95737 95737->95738 95741 7b447a FreeLibrary 95738->95741 95742 7b109d 95738->95742 95739->95730 95740 7f37df 95739->95740 95741->95742 95743 7d00a3 29 API calls __onexit 95742->95743 95743->95722 95744 7bf7bf 95745 7bf7d3 95744->95745 95746 7bfcb6 95744->95746 95748 7bfcc2 95745->95748 95749 7cfddb 22 API calls 95745->95749 95781 7baceb 23 API calls ISource 95746->95781 95782 7baceb 23 API calls ISource 95748->95782 95751 7bf7e5 95749->95751 95751->95748 95752 7bf83e 95751->95752 95753 7bfd3d 95751->95753 95755 7c1310 348 API calls 95752->95755 95769 7bed9d ISource 95752->95769 95783 821155 22 API calls 95753->95783 95761 7bec76 ISource 95755->95761 95756 804beb 95789 82359c 82 API calls __wsopen_s 95756->95789 95757 7cfddb 22 API calls 95757->95761 95758 7bfef7 95758->95769 95785 7ba8c7 22 API calls __fread_nolock 95758->95785 95760 7bf3ae ISource 95760->95769 95786 82359c 82 API calls __wsopen_s 95760->95786 95761->95756 95761->95757 95761->95758 95761->95760 95763 804600 95761->95763 95764 804b0b 95761->95764 95761->95769 95771 7d0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95761->95771 95772 7ba8c7 22 API calls 95761->95772 95773 7bfbe3 95761->95773 95774 7ba961 22 API calls 95761->95774 95777 7d00a3 29 API calls pre_c_initialization 95761->95777 95778 7d01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95761->95778 95779 7c01e0 348 API calls 2 library calls 95761->95779 95780 7c06a0 41 API calls ISource 95761->95780 95763->95769 95784 7ba8c7 22 API calls __fread_nolock 95763->95784 95787 82359c 82 API calls __wsopen_s 95764->95787 95771->95761 95772->95761 95773->95760 95773->95769 95775 804bdc 95773->95775 95774->95761 95788 82359c 82 API calls __wsopen_s 95775->95788 95777->95761 95778->95761 95779->95761 95780->95761 95781->95748 95782->95753 95783->95769 95784->95769 95785->95769 95786->95769 95787->95769 95788->95756 95789->95769 95790 7d03fb 95791 7d0407 BuildCatchObjectHelperInternal 95790->95791 95819 7cfeb1 95791->95819 95793 7d040e 95794 7d0561 95793->95794 95797 7d0438 95793->95797 95849 7d083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 95794->95849 95796 7d0568 95842 7d4e52 95796->95842 95808 7d0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 95797->95808 95830 7e247d 95797->95830 95804 7d0457 95806 7d04d8 95838 7d0959 95806->95838 95808->95806 95845 7d4e1a 38 API calls 3 library calls 95808->95845 95810 7d04de 95811 7d04f3 95810->95811 95846 7d0992 GetModuleHandleW 95811->95846 95813 7d04fa 95813->95796 95814 7d04fe 95813->95814 95815 7d0507 95814->95815 95847 7d4df5 28 API calls _abort 95814->95847 95848 7d0040 13 API calls 2 library calls 95815->95848 95818 7d050f 95818->95804 95820 7cfeba 95819->95820 95851 7d0698 IsProcessorFeaturePresent 95820->95851 95822 7cfec6 95852 7d2c94 10 API calls 3 library calls 95822->95852 95824 7cfecb 95825 7cfecf 95824->95825 95853 7e2317 95824->95853 95825->95793 95828 7cfee6 95828->95793 95833 7e2494 95830->95833 95831 7d0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 95832 7d0451 95831->95832 95832->95804 95834 7e2421 95832->95834 95833->95831 95837 7e2450 95834->95837 95835 7d0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 95836 7e2479 95835->95836 95836->95808 95837->95835 95928 7d2340 95838->95928 95841 7d097f 95841->95810 95930 7d4bcf 95842->95930 95845->95806 95846->95813 95847->95815 95848->95818 95849->95796 95851->95822 95852->95824 95857 7ed1f6 95853->95857 95856 7d2cbd 8 API calls 3 library calls 95856->95825 95860 7ed213 95857->95860 95861 7ed20f 95857->95861 95859 7cfed8 95859->95828 95859->95856 95860->95861 95863 7e4bfb 95860->95863 95875 7d0a8c 95861->95875 95864 7e4c07 BuildCatchObjectHelperInternal 95863->95864 95882 7e2f5e EnterCriticalSection 95864->95882 95866 7e4c0e 95883 7e50af 95866->95883 95868 7e4c1d 95874 7e4c2c 95868->95874 95896 7e4a8f 29 API calls 95868->95896 95871 7e4c3d __fread_nolock 95871->95860 95872 7e4c27 95897 7e4b45 GetStdHandle GetFileType 95872->95897 95898 7e4c48 LeaveCriticalSection _abort 95874->95898 95876 7d0a95 95875->95876 95877 7d0a97 IsProcessorFeaturePresent 95875->95877 95876->95859 95879 7d0c5d 95877->95879 95927 7d0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 95879->95927 95881 7d0d40 95881->95859 95882->95866 95884 7e50bb BuildCatchObjectHelperInternal 95883->95884 95885 7e50df 95884->95885 95886 7e50c8 95884->95886 95899 7e2f5e EnterCriticalSection 95885->95899 95907 7df2d9 20 API calls __dosmaperr 95886->95907 95889 7e50cd 95908 7e27ec 26 API calls __fread_nolock 95889->95908 95891 7e50d7 __fread_nolock 95891->95868 95892 7e5117 95909 7e513e LeaveCriticalSection _abort 95892->95909 95893 7e50eb 95893->95892 95900 7e5000 95893->95900 95896->95872 95897->95874 95898->95871 95899->95893 95910 7e4c7d 95900->95910 95902 7e501f 95918 7e29c8 95902->95918 95903 7e5012 95903->95902 95917 7e3405 11 API calls 2 library calls 95903->95917 95906 7e5071 95906->95893 95907->95889 95908->95891 95909->95891 95915 7e4c8a FindHandlerForForeignException 95910->95915 95911 7e4cca 95925 7df2d9 20 API calls __dosmaperr 95911->95925 95912 7e4cb5 RtlAllocateHeap 95913 7e4cc8 95912->95913 95912->95915 95913->95903 95915->95911 95915->95912 95924 7d4ead 7 API calls 2 library calls 95915->95924 95917->95903 95919 7e29d3 RtlFreeHeap 95918->95919 95920 7e29fc __dosmaperr 95918->95920 95919->95920 95921 7e29e8 95919->95921 95920->95906 95926 7df2d9 20 API calls __dosmaperr 95921->95926 95923 7e29ee GetLastError 95923->95920 95924->95915 95925->95913 95926->95923 95927->95881 95929 7d096c GetStartupInfoW 95928->95929 95929->95841 95931 7d4bdb FindHandlerForForeignException 95930->95931 95932 7d4bf4 95931->95932 95933 7d4be2 95931->95933 95954 7e2f5e EnterCriticalSection 95932->95954 95969 7d4d29 GetModuleHandleW 95933->95969 95936 7d4be7 95936->95932 95970 7d4d6d GetModuleHandleExW 95936->95970 95939 7d4bfb 95951 7d4c99 95939->95951 95953 7d4c70 95939->95953 95955 7e21a8 95939->95955 95942 7d4cb6 95961 7d4ce8 95942->95961 95943 7d4ce2 95978 7f1d29 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 95943->95978 95944 7d4c88 95946 7e2421 _abort 5 API calls 95944->95946 95945 7e2421 _abort 5 API calls 95945->95944 95946->95951 95958 7d4cd9 95951->95958 95953->95944 95953->95945 95954->95939 95979 7e1ee1 95955->95979 95998 7e2fa6 LeaveCriticalSection 95958->95998 95960 7d4cb2 95960->95942 95960->95943 95999 7e360c 95961->95999 95964 7d4d16 95967 7d4d6d _abort 8 API calls 95964->95967 95965 7d4cf6 GetPEB 95965->95964 95966 7d4d06 GetCurrentProcess TerminateProcess 95965->95966 95966->95964 95968 7d4d1e ExitProcess 95967->95968 95969->95936 95971 7d4dba 95970->95971 95972 7d4d97 GetProcAddress 95970->95972 95973 7d4dc9 95971->95973 95974 7d4dc0 FreeLibrary 95971->95974 95975 7d4dac 95972->95975 95976 7d0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 95973->95976 95974->95973 95975->95971 95977 7d4bf3 95976->95977 95977->95932 95982 7e1e90 95979->95982 95981 7e1f05 95981->95953 95983 7e1e9c BuildCatchObjectHelperInternal 95982->95983 95990 7e2f5e EnterCriticalSection 95983->95990 95985 7e1eaa 95991 7e1f31 95985->95991 95989 7e1ec8 __fread_nolock 95989->95981 95990->95985 95992 7e1f51 95991->95992 95995 7e1f59 95991->95995 95993 7d0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 95992->95993 95994 7e1eb7 95993->95994 95997 7e1ed5 LeaveCriticalSection _abort 95994->95997 95995->95992 95996 7e29c8 _free 20 API calls 95995->95996 95996->95992 95997->95989 95998->95960 96000 7e3627 95999->96000 96001 7e3631 95999->96001 96003 7d0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 96000->96003 96006 7e2fd7 5 API calls 2 library calls 96001->96006 96004 7d4cf2 96003->96004 96004->95964 96004->95965 96005 7e3648 96005->96000 96006->96005 96007 7bdddc 96010 7bb710 96007->96010 96011 7bb72b 96010->96011 96012 800146 96011->96012 96013 8000f8 96011->96013 96020 7bb750 96011->96020 96052 8358a2 348 API calls 2 library calls 96012->96052 96016 800102 96013->96016 96018 80010f 96013->96018 96013->96020 96050 835d33 348 API calls 96016->96050 96037 7bba20 96018->96037 96051 8361d0 348 API calls 2 library calls 96018->96051 96025 7cd336 40 API calls 96020->96025 96028 800322 96020->96028 96032 7bba4e 96020->96032 96036 7bbbe0 40 API calls 96020->96036 96020->96037 96038 7bec40 348 API calls 96020->96038 96041 7ba81b 41 API calls 96020->96041 96042 7cd2f0 40 API calls 96020->96042 96043 7ca01b 348 API calls 96020->96043 96044 7d0242 5 API calls __Init_thread_wait 96020->96044 96045 7cedcd 22 API calls 96020->96045 96046 7d00a3 29 API calls __onexit 96020->96046 96047 7d01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96020->96047 96048 7cee53 82 API calls 96020->96048 96049 7ce5ca 348 API calls 96020->96049 96053 7baceb 23 API calls ISource 96020->96053 96054 80f6bf 23 API calls 96020->96054 96055 7ba8c7 22 API calls __fread_nolock 96020->96055 96024 8003d9 96024->96024 96025->96020 96056 835c0c 82 API calls 96028->96056 96036->96020 96037->96032 96057 82359c 82 API calls __wsopen_s 96037->96057 96038->96020 96041->96020 96042->96020 96043->96020 96044->96020 96045->96020 96046->96020 96047->96020 96048->96020 96049->96020 96050->96018 96051->96037 96052->96020 96053->96020 96054->96020 96055->96020 96056->96037 96057->96024 96058 7b1033 96063 7b4c91 96058->96063 96062 7b1042 96064 7ba961 22 API calls 96063->96064 96065 7b4cff 96064->96065 96071 7b3af0 96065->96071 96068 7b4d9c 96069 7b1038 96068->96069 96074 7b51f7 22 API calls __fread_nolock 96068->96074 96070 7d00a3 29 API calls __onexit 96069->96070 96070->96062 96075 7b3b1c 96071->96075 96074->96068 96076 7b3b0f 96075->96076 96077 7b3b29 96075->96077 96076->96068 96077->96076 96078 7b3b30 RegOpenKeyExW 96077->96078 96078->96076 96079 7b3b4a RegQueryValueExW 96078->96079 96080 7b3b6b 96079->96080 96081 7b3b80 RegCloseKey 96079->96081 96080->96081 96081->96076 96082 7b2e37 96083 7ba961 22 API calls 96082->96083 96084 7b2e4d 96083->96084 96161 7b4ae3 96084->96161 96086 7b2e6b 96087 7b3a5a 24 API calls 96086->96087 96088 7b2e7f 96087->96088 96089 7b9cb3 22 API calls 96088->96089 96090 7b2e8c 96089->96090 96175 7b4ecb 96090->96175 96093 7b2ead 96197 7ba8c7 22 API calls __fread_nolock 96093->96197 96094 7f2cb0 96214 822cf9 80 API calls ___std_exception_copy 96094->96214 96096 7f2cc3 96097 7f2ccf 96096->96097 96215 7b4f39 96096->96215 96102 7b4f39 68 API calls 96097->96102 96100 7b2ec3 96198 7b6f88 22 API calls 96100->96198 96105 7f2ce5 96102->96105 96103 7b2ecf 96104 7b9cb3 22 API calls 96103->96104 96106 7b2edc 96104->96106 96221 7b3084 22 API calls 96105->96221 96199 7ba81b 41 API calls 96106->96199 96108 7b2eec 96111 7b9cb3 22 API calls 96108->96111 96110 7f2d02 96222 7b3084 22 API calls 96110->96222 96113 7b2f12 96111->96113 96200 7ba81b 41 API calls 96113->96200 96114 7f2d1e 96116 7b3a5a 24 API calls 96114->96116 96117 7f2d44 96116->96117 96223 7b3084 22 API calls 96117->96223 96118 7b2f21 96121 7ba961 22 API calls 96118->96121 96120 7f2d50 96224 7ba8c7 22 API calls __fread_nolock 96120->96224 96123 7b2f3f 96121->96123 96201 7b3084 22 API calls 96123->96201 96125 7f2d5e 96225 7b3084 22 API calls 96125->96225 96126 7b2f4b 96202 7d4a28 40 API calls 3 library calls 96126->96202 96129 7f2d6d 96226 7ba8c7 22 API calls __fread_nolock 96129->96226 96130 7b2f59 96130->96105 96131 7b2f63 96130->96131 96203 7d4a28 40 API calls 3 library calls 96131->96203 96134 7f2d83 96227 7b3084 22 API calls 96134->96227 96135 7b2f6e 96135->96110 96137 7b2f78 96135->96137 96204 7d4a28 40 API calls 3 library calls 96137->96204 96138 7f2d90 96140 7b2f83 96140->96114 96141 7b2f8d 96140->96141 96205 7d4a28 40 API calls 3 library calls 96141->96205 96143 7b2f98 96144 7b2fdc 96143->96144 96206 7b3084 22 API calls 96143->96206 96144->96129 96145 7b2fe8 96144->96145 96145->96138 96148 7b63eb 22 API calls 96145->96148 96147 7b2fbf 96207 7ba8c7 22 API calls __fread_nolock 96147->96207 96150 7b2ff8 96148->96150 96209 7b6a50 22 API calls 96150->96209 96151 7b2fcd 96208 7b3084 22 API calls 96151->96208 96154 7b3006 96210 7b70b0 23 API calls 96154->96210 96158 7b3021 96159 7b3065 96158->96159 96211 7b6f88 22 API calls 96158->96211 96212 7b70b0 23 API calls 96158->96212 96213 7b3084 22 API calls 96158->96213 96162 7b4af0 __wsopen_s 96161->96162 96163 7b6b57 22 API calls 96162->96163 96164 7b4b22 96162->96164 96163->96164 96165 7b4c6d 22 API calls 96164->96165 96167 7b4b58 96164->96167 96165->96164 96166 7b4c6d 22 API calls 96166->96167 96167->96166 96169 7b4c29 96167->96169 96171 7b9cb3 22 API calls 96167->96171 96174 7b515f 22 API calls 96167->96174 96168 7b9cb3 22 API calls 96172 7b4c52 96168->96172 96169->96168 96170 7b4c5e 96169->96170 96170->96086 96171->96167 96173 7b515f 22 API calls 96172->96173 96173->96170 96174->96167 96228 7b4e90 LoadLibraryA 96175->96228 96180 7f3ccf 96182 7b4f39 68 API calls 96180->96182 96181 7b4ef6 LoadLibraryExW 96236 7b4e59 LoadLibraryA 96181->96236 96184 7f3cd6 96182->96184 96186 7b4e59 3 API calls 96184->96186 96188 7f3cde 96186->96188 96258 7b50f5 40 API calls __fread_nolock 96188->96258 96189 7b4f20 96189->96188 96190 7b4f2c 96189->96190 96192 7b4f39 68 API calls 96190->96192 96194 7b2ea5 96192->96194 96193 7f3cf5 96259 8228fe 27 API calls 96193->96259 96194->96093 96194->96094 96196 7f3d05 96197->96100 96198->96103 96199->96108 96200->96118 96201->96126 96202->96130 96203->96135 96204->96140 96205->96143 96206->96147 96207->96151 96208->96144 96209->96154 96210->96158 96211->96158 96212->96158 96213->96158 96214->96096 96216 7b4f43 96215->96216 96218 7b4f4a 96215->96218 96323 7de678 96216->96323 96219 7b4f6a FreeLibrary 96218->96219 96220 7b4f59 96218->96220 96219->96220 96220->96097 96221->96110 96222->96114 96223->96120 96224->96125 96225->96129 96226->96134 96227->96138 96229 7b4ea8 GetProcAddress 96228->96229 96230 7b4ec6 96228->96230 96231 7b4eb8 96229->96231 96233 7de5eb 96230->96233 96231->96230 96232 7b4ebf FreeLibrary 96231->96232 96232->96230 96260 7de52a 96233->96260 96235 7b4eea 96235->96180 96235->96181 96237 7b4e6e GetProcAddress 96236->96237 96238 7b4e8d 96236->96238 96239 7b4e7e 96237->96239 96241 7b4f80 96238->96241 96239->96238 96240 7b4e86 FreeLibrary 96239->96240 96240->96238 96242 7cfe0b 22 API calls 96241->96242 96243 7b4f95 96242->96243 96244 7b5722 22 API calls 96243->96244 96245 7b4fa1 __fread_nolock 96244->96245 96246 7f3d1d 96245->96246 96247 7b50a5 96245->96247 96257 7b4fdc 96245->96257 96320 82304d 74 API calls 96246->96320 96312 7b42a2 CreateStreamOnHGlobal 96247->96312 96250 7f3d22 96321 7b511f 64 API calls 96250->96321 96253 7f3d45 96322 7b50f5 40 API calls __fread_nolock 96253->96322 96256 7b506e ISource 96256->96189 96257->96250 96257->96256 96318 7b50f5 40 API calls __fread_nolock 96257->96318 96319 7b511f 64 API calls 96257->96319 96258->96193 96259->96196 96263 7de536 BuildCatchObjectHelperInternal 96260->96263 96261 7de544 96285 7df2d9 20 API calls __dosmaperr 96261->96285 96263->96261 96265 7de574 96263->96265 96264 7de549 96286 7e27ec 26 API calls __fread_nolock 96264->96286 96267 7de579 96265->96267 96268 7de586 96265->96268 96287 7df2d9 20 API calls __dosmaperr 96267->96287 96277 7e8061 96268->96277 96271 7de58f 96272 7de595 96271->96272 96273 7de5a2 96271->96273 96288 7df2d9 20 API calls __dosmaperr 96272->96288 96289 7de5d4 LeaveCriticalSection __fread_nolock 96273->96289 96276 7de554 __fread_nolock 96276->96235 96278 7e806d BuildCatchObjectHelperInternal 96277->96278 96290 7e2f5e EnterCriticalSection 96278->96290 96280 7e807b 96291 7e80fb 96280->96291 96284 7e80ac __fread_nolock 96284->96271 96285->96264 96286->96276 96287->96276 96288->96276 96289->96276 96290->96280 96292 7e811e 96291->96292 96293 7e8177 96292->96293 96300 7e8088 96292->96300 96307 7d918d EnterCriticalSection 96292->96307 96308 7d91a1 LeaveCriticalSection 96292->96308 96294 7e4c7d FindHandlerForForeignException 20 API calls 96293->96294 96295 7e8180 96294->96295 96297 7e29c8 _free 20 API calls 96295->96297 96298 7e8189 96297->96298 96298->96300 96309 7e3405 11 API calls 2 library calls 96298->96309 96304 7e80b7 96300->96304 96301 7e81a8 96310 7d918d EnterCriticalSection 96301->96310 96311 7e2fa6 LeaveCriticalSection 96304->96311 96306 7e80be 96306->96284 96307->96292 96308->96292 96309->96301 96310->96300 96311->96306 96313 7b42d9 96312->96313 96314 7b42bc FindResourceExW 96312->96314 96313->96257 96314->96313 96315 7f35ba LoadResource 96314->96315 96315->96313 96316 7f35cf SizeofResource 96315->96316 96316->96313 96317 7f35e3 LockResource 96316->96317 96317->96313 96318->96257 96319->96257 96320->96250 96321->96253 96322->96256 96324 7de684 BuildCatchObjectHelperInternal 96323->96324 96325 7de6aa 96324->96325 96326 7de695 96324->96326 96335 7de6a5 __fread_nolock 96325->96335 96336 7d918d EnterCriticalSection 96325->96336 96353 7df2d9 20 API calls __dosmaperr 96326->96353 96329 7de69a 96354 7e27ec 26 API calls __fread_nolock 96329->96354 96330 7de6c6 96337 7de602 96330->96337 96333 7de6d1 96355 7de6ee LeaveCriticalSection __fread_nolock 96333->96355 96335->96218 96336->96330 96338 7de60f 96337->96338 96339 7de624 96337->96339 96388 7df2d9 20 API calls __dosmaperr 96338->96388 96346 7de61f 96339->96346 96356 7ddc0b 96339->96356 96341 7de614 96389 7e27ec 26 API calls __fread_nolock 96341->96389 96346->96333 96349 7de646 96373 7e862f 96349->96373 96352 7e29c8 _free 20 API calls 96352->96346 96353->96329 96354->96335 96355->96335 96357 7ddc23 96356->96357 96361 7ddc1f 96356->96361 96358 7dd955 __fread_nolock 26 API calls 96357->96358 96357->96361 96359 7ddc43 96358->96359 96390 7e59be 62 API calls 4 library calls 96359->96390 96362 7e4d7a 96361->96362 96363 7de640 96362->96363 96364 7e4d90 96362->96364 96366 7dd955 96363->96366 96364->96363 96365 7e29c8 _free 20 API calls 96364->96365 96365->96363 96367 7dd976 96366->96367 96368 7dd961 96366->96368 96367->96349 96391 7df2d9 20 API calls __dosmaperr 96368->96391 96370 7dd966 96392 7e27ec 26 API calls __fread_nolock 96370->96392 96372 7dd971 96372->96349 96374 7e863e 96373->96374 96375 7e8653 96373->96375 96396 7df2c6 20 API calls __dosmaperr 96374->96396 96377 7e868e 96375->96377 96380 7e867a 96375->96380 96398 7df2c6 20 API calls __dosmaperr 96377->96398 96379 7e8643 96397 7df2d9 20 API calls __dosmaperr 96379->96397 96393 7e8607 96380->96393 96381 7e8693 96399 7df2d9 20 API calls __dosmaperr 96381->96399 96385 7de64c 96385->96346 96385->96352 96386 7e869b 96400 7e27ec 26 API calls __fread_nolock 96386->96400 96388->96341 96389->96346 96390->96361 96391->96370 96392->96372 96401 7e8585 96393->96401 96395 7e862b 96395->96385 96396->96379 96397->96385 96398->96381 96399->96386 96400->96385 96402 7e8591 BuildCatchObjectHelperInternal 96401->96402 96412 7e5147 EnterCriticalSection 96402->96412 96404 7e859f 96405 7e85c6 96404->96405 96406 7e85d1 96404->96406 96413 7e86ae 96405->96413 96428 7df2d9 20 API calls __dosmaperr 96406->96428 96409 7e85cc 96429 7e85fb LeaveCriticalSection __wsopen_s 96409->96429 96411 7e85ee __fread_nolock 96411->96395 96412->96404 96430 7e53c4 96413->96430 96415 7e86c4 96443 7e5333 21 API calls 2 library calls 96415->96443 96416 7e86be 96416->96415 96417 7e86f6 96416->96417 96419 7e53c4 __wsopen_s 26 API calls 96416->96419 96417->96415 96420 7e53c4 __wsopen_s 26 API calls 96417->96420 96422 7e86ed 96419->96422 96423 7e8702 CloseHandle 96420->96423 96421 7e871c 96424 7e873e 96421->96424 96444 7df2a3 20 API calls __dosmaperr 96421->96444 96425 7e53c4 __wsopen_s 26 API calls 96422->96425 96423->96415 96426 7e870e GetLastError 96423->96426 96424->96409 96425->96417 96426->96415 96428->96409 96429->96411 96431 7e53d1 96430->96431 96434 7e53e6 96430->96434 96445 7df2c6 20 API calls __dosmaperr 96431->96445 96433 7e53d6 96446 7df2d9 20 API calls __dosmaperr 96433->96446 96437 7e540b 96434->96437 96447 7df2c6 20 API calls __dosmaperr 96434->96447 96437->96416 96438 7e5416 96448 7df2d9 20 API calls __dosmaperr 96438->96448 96439 7e53de 96439->96416 96441 7e541e 96449 7e27ec 26 API calls __fread_nolock 96441->96449 96443->96421 96444->96424 96445->96433 96446->96439 96447->96438 96448->96441 96449->96439 96450 7b3156 96453 7b3170 96450->96453 96454 7b3187 96453->96454 96455 7b31eb 96454->96455 96456 7b318c 96454->96456 96493 7b31e9 96454->96493 96458 7f2dfb 96455->96458 96459 7b31f1 96455->96459 96460 7b3199 96456->96460 96461 7b3265 PostQuitMessage 96456->96461 96457 7b31d0 DefWindowProcW 96495 7b316a 96457->96495 96512 7b18e2 10 API calls 96458->96512 96464 7b31f8 96459->96464 96465 7b321d SetTimer RegisterWindowMessageW 96459->96465 96462 7f2e7c 96460->96462 96463 7b31a4 96460->96463 96461->96495 96525 81bf30 34 API calls ___scrt_fastfail 96462->96525 96468 7b31ae 96463->96468 96469 7f2e68 96463->96469 96472 7f2d9c 96464->96472 96473 7b3201 KillTimer 96464->96473 96470 7b3246 CreatePopupMenu 96465->96470 96465->96495 96467 7f2e1c 96513 7ce499 42 API calls 96467->96513 96475 7f2e4d 96468->96475 96476 7b31b9 96468->96476 96502 81c161 96469->96502 96470->96495 96478 7f2dd7 MoveWindow 96472->96478 96479 7f2da1 96472->96479 96498 7b30f2 96473->96498 96475->96457 96524 810ad7 22 API calls 96475->96524 96482 7b3253 96476->96482 96487 7b31c4 96476->96487 96477 7f2e8e 96477->96457 96477->96495 96478->96495 96483 7f2da7 96479->96483 96484 7f2dc6 SetFocus 96479->96484 96510 7b326f 44 API calls ___scrt_fastfail 96482->96510 96483->96487 96488 7f2db0 96483->96488 96484->96495 96487->96457 96494 7b30f2 Shell_NotifyIconW 96487->96494 96511 7b18e2 10 API calls 96488->96511 96491 7b3263 96491->96495 96493->96457 96496 7f2e41 96494->96496 96514 7b3837 96496->96514 96499 7b3154 96498->96499 96500 7b3104 ___scrt_fastfail 96498->96500 96509 7b3c50 DeleteObject DestroyWindow 96499->96509 96501 7b3123 Shell_NotifyIconW 96500->96501 96501->96499 96503 81c276 96502->96503 96504 81c179 ___scrt_fastfail 96502->96504 96503->96495 96526 7b3923 96504->96526 96506 81c25f KillTimer SetTimer 96506->96503 96507 81c1a0 96507->96506 96508 81c251 Shell_NotifyIconW 96507->96508 96508->96506 96509->96495 96510->96491 96511->96495 96512->96467 96513->96487 96515 7b3862 ___scrt_fastfail 96514->96515 96554 7b4212 96515->96554 96518 7b38e8 96520 7f3386 Shell_NotifyIconW 96518->96520 96521 7b3906 Shell_NotifyIconW 96518->96521 96522 7b3923 24 API calls 96521->96522 96523 7b391c 96522->96523 96523->96493 96524->96493 96525->96477 96527 7b393f 96526->96527 96528 7b3a13 96526->96528 96548 7b6270 96527->96548 96528->96507 96531 7b395a 96533 7b6b57 22 API calls 96531->96533 96532 7f3393 LoadStringW 96534 7f33ad 96532->96534 96535 7b396f 96533->96535 96542 7b3994 ___scrt_fastfail 96534->96542 96553 7ba8c7 22 API calls __fread_nolock 96534->96553 96536 7f33c9 96535->96536 96537 7b397c 96535->96537 96538 7b6350 22 API calls 96536->96538 96537->96534 96540 7b3986 96537->96540 96543 7f33d7 96538->96543 96541 7b6350 22 API calls 96540->96541 96541->96542 96545 7b39f9 Shell_NotifyIconW 96542->96545 96543->96542 96544 7b33c6 22 API calls 96543->96544 96546 7f33f9 96544->96546 96545->96528 96547 7b33c6 22 API calls 96546->96547 96547->96542 96549 7cfe0b 22 API calls 96548->96549 96550 7b6295 96549->96550 96551 7cfddb 22 API calls 96550->96551 96552 7b394d 96551->96552 96552->96531 96552->96532 96553->96542 96555 7f35a4 96554->96555 96556 7b38b7 96554->96556 96555->96556 96557 7f35ad DestroyIcon 96555->96557 96556->96518 96558 81c874 42 API calls _strftime 96556->96558 96557->96556 96558->96518 96559 803f75 96570 7cceb1 96559->96570 96561 803f8b 96569 804006 96561->96569 96579 7ce300 23 API calls 96561->96579 96563 7bbf40 348 API calls 96564 804052 96563->96564 96567 804a88 96564->96567 96581 82359c 82 API calls __wsopen_s 96564->96581 96566 803fe6 96566->96564 96580 821abf 22 API calls 96566->96580 96569->96563 96571 7ccebf 96570->96571 96572 7cced2 96570->96572 96582 7baceb 23 API calls ISource 96571->96582 96574 7ccf05 96572->96574 96575 7cced7 96572->96575 96583 7baceb 23 API calls ISource 96574->96583 96576 7cfddb 22 API calls 96575->96576 96578 7ccec9 96576->96578 96578->96561 96579->96566 96580->96569 96581->96567 96582->96578 96583->96578 96584 7b1cad SystemParametersInfoW 96585 7b2de3 96586 7b2df0 __wsopen_s 96585->96586 96587 7b2e09 96586->96587 96588 7f2c2b ___scrt_fastfail 96586->96588 96589 7b3aa2 23 API calls 96587->96589 96590 7f2c47 GetOpenFileNameW 96588->96590 96591 7b2e12 96589->96591 96592 7f2c96 96590->96592 96601 7b2da5 96591->96601 96594 7b6b57 22 API calls 96592->96594 96596 7f2cab 96594->96596 96596->96596 96598 7b2e27 96619 7b44a8 96598->96619 96602 7f1f50 __wsopen_s 96601->96602 96603 7b2db2 GetLongPathNameW 96602->96603 96604 7b6b57 22 API calls 96603->96604 96605 7b2dda 96604->96605 96606 7b3598 96605->96606 96607 7ba961 22 API calls 96606->96607 96608 7b35aa 96607->96608 96609 7b3aa2 23 API calls 96608->96609 96610 7b35b5 96609->96610 96611 7f32eb 96610->96611 96612 7b35c0 96610->96612 96616 7f330d 96611->96616 96654 7cce60 41 API calls 96611->96654 96613 7b515f 22 API calls 96612->96613 96615 7b35cc 96613->96615 96648 7b35f3 96615->96648 96618 7b35df 96618->96598 96620 7b4ecb 94 API calls 96619->96620 96621 7b44cd 96620->96621 96622 7f3833 96621->96622 96623 7b4ecb 94 API calls 96621->96623 96656 822cf9 80 API calls ___std_exception_copy 96622->96656 96626 7b44e1 96623->96626 96625 7f3848 96627 7f384c 96625->96627 96628 7f3869 96625->96628 96626->96622 96629 7b44e9 96626->96629 96630 7b4f39 68 API calls 96627->96630 96631 7cfe0b 22 API calls 96628->96631 96632 7f3854 96629->96632 96633 7b44f5 96629->96633 96630->96632 96647 7f38ae 96631->96647 96657 81da5a 82 API calls 96632->96657 96655 7b940c 136 API calls 2 library calls 96633->96655 96636 7f3862 96636->96628 96637 7b2e31 96638 7f3a5f 96639 7b4f39 68 API calls 96638->96639 96663 81989b 82 API calls __wsopen_s 96638->96663 96639->96638 96644 7b9cb3 22 API calls 96644->96647 96647->96638 96647->96644 96658 81967e 22 API calls __fread_nolock 96647->96658 96659 8195ad 42 API calls _wcslen 96647->96659 96660 820b5a 22 API calls 96647->96660 96661 7ba4a1 22 API calls __fread_nolock 96647->96661 96662 7b3ff7 22 API calls 96647->96662 96649 7b3605 96648->96649 96653 7b3624 __fread_nolock 96648->96653 96651 7cfe0b 22 API calls 96649->96651 96650 7cfddb 22 API calls 96652 7b363b 96650->96652 96651->96653 96652->96618 96653->96650 96654->96611 96655->96637 96656->96625 96657->96636 96658->96647 96659->96647 96660->96647 96661->96647 96662->96647 96663->96638 96664 7f2ba5 96665 7f2baf 96664->96665 96666 7b2b25 96664->96666 96667 7b3a5a 24 API calls 96665->96667 96692 7b2b83 7 API calls 96666->96692 96669 7f2bb8 96667->96669 96672 7b9cb3 22 API calls 96669->96672 96674 7f2bc6 96672->96674 96673 7b2b2f 96678 7b3837 49 API calls 96673->96678 96679 7b2b44 96673->96679 96675 7f2bce 96674->96675 96676 7f2bf5 96674->96676 96677 7b33c6 22 API calls 96675->96677 96680 7b33c6 22 API calls 96676->96680 96681 7f2bd9 96677->96681 96678->96679 96684 7b2b5f 96679->96684 96687 7b30f2 Shell_NotifyIconW 96679->96687 96682 7f2bf1 GetForegroundWindow ShellExecuteW 96680->96682 96683 7b6350 22 API calls 96681->96683 96688 7f2c26 96682->96688 96686 7f2be7 96683->96686 96689 7b2b66 SetCurrentDirectoryW 96684->96689 96690 7b33c6 22 API calls 96686->96690 96687->96684 96688->96684 96691 7b2b7a 96689->96691 96690->96682 96696 7b2cd4 7 API calls 96692->96696 96694 7b2b2a 96695 7b2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 96694->96695 96695->96673 96696->96694 96697 7e8402 96702 7e81be 96697->96702 96700 7e842a 96707 7e81ef try_get_first_available_module 96702->96707 96704 7e83ee 96721 7e27ec 26 API calls __fread_nolock 96704->96721 96706 7e8343 96706->96700 96714 7f0984 96706->96714 96707->96707 96710 7e8338 96707->96710 96717 7d8e0b 40 API calls 2 library calls 96707->96717 96709 7e838c 96709->96710 96718 7d8e0b 40 API calls 2 library calls 96709->96718 96710->96706 96720 7df2d9 20 API calls __dosmaperr 96710->96720 96712 7e83ab 96712->96710 96719 7d8e0b 40 API calls 2 library calls 96712->96719 96722 7f0081 96714->96722 96716 7f099f 96716->96700 96717->96709 96718->96712 96719->96710 96720->96704 96721->96706 96725 7f008d BuildCatchObjectHelperInternal 96722->96725 96723 7f009b 96780 7df2d9 20 API calls __dosmaperr 96723->96780 96725->96723 96727 7f00d4 96725->96727 96726 7f00a0 96781 7e27ec 26 API calls __fread_nolock 96726->96781 96733 7f065b 96727->96733 96732 7f00aa __fread_nolock 96732->96716 96783 7f042f 96733->96783 96736 7f068d 96815 7df2c6 20 API calls __dosmaperr 96736->96815 96737 7f06a6 96801 7e5221 96737->96801 96740 7f0692 96816 7df2d9 20 API calls __dosmaperr 96740->96816 96741 7f06ab 96742 7f06cb 96741->96742 96743 7f06b4 96741->96743 96814 7f039a CreateFileW 96742->96814 96817 7df2c6 20 API calls __dosmaperr 96743->96817 96747 7f00f8 96782 7f0121 LeaveCriticalSection __wsopen_s 96747->96782 96748 7f06b9 96818 7df2d9 20 API calls __dosmaperr 96748->96818 96749 7f0781 GetFileType 96752 7f078c GetLastError 96749->96752 96753 7f07d3 96749->96753 96751 7f0756 GetLastError 96820 7df2a3 20 API calls __dosmaperr 96751->96820 96821 7df2a3 20 API calls __dosmaperr 96752->96821 96823 7e516a 21 API calls 2 library calls 96753->96823 96754 7f0704 96754->96749 96754->96751 96819 7f039a CreateFileW 96754->96819 96758 7f079a CloseHandle 96758->96740 96759 7f07c3 96758->96759 96822 7df2d9 20 API calls __dosmaperr 96759->96822 96761 7f0749 96761->96749 96761->96751 96763 7f07f4 96765 7f0840 96763->96765 96824 7f05ab 72 API calls 3 library calls 96763->96824 96764 7f07c8 96764->96740 96770 7f086d 96765->96770 96825 7f014d 72 API calls 4 library calls 96765->96825 96768 7f0866 96769 7f087e 96768->96769 96768->96770 96769->96747 96772 7f08fc CloseHandle 96769->96772 96771 7e86ae __wsopen_s 29 API calls 96770->96771 96771->96747 96826 7f039a CreateFileW 96772->96826 96774 7f0927 96775 7f095d 96774->96775 96776 7f0931 GetLastError 96774->96776 96775->96747 96827 7df2a3 20 API calls __dosmaperr 96776->96827 96778 7f093d 96828 7e5333 21 API calls 2 library calls 96778->96828 96780->96726 96781->96732 96782->96732 96784 7f046a 96783->96784 96785 7f0450 96783->96785 96829 7f03bf 96784->96829 96785->96784 96836 7df2d9 20 API calls __dosmaperr 96785->96836 96788 7f045f 96837 7e27ec 26 API calls __fread_nolock 96788->96837 96790 7f04a2 96791 7f04d1 96790->96791 96838 7df2d9 20 API calls __dosmaperr 96790->96838 96799 7f0524 96791->96799 96840 7dd70d 26 API calls 2 library calls 96791->96840 96794 7f051f 96796 7f059e 96794->96796 96794->96799 96795 7f04c6 96839 7e27ec 26 API calls __fread_nolock 96795->96839 96841 7e27fc 11 API calls _abort 96796->96841 96799->96736 96799->96737 96800 7f05aa 96802 7e522d BuildCatchObjectHelperInternal 96801->96802 96844 7e2f5e EnterCriticalSection 96802->96844 96804 7e5234 96805 7e5259 96804->96805 96810 7e52c7 EnterCriticalSection 96804->96810 96813 7e527b 96804->96813 96808 7e5000 __wsopen_s 21 API calls 96805->96808 96807 7e52a4 __fread_nolock 96807->96741 96809 7e525e 96808->96809 96809->96813 96848 7e5147 EnterCriticalSection 96809->96848 96811 7e52d4 LeaveCriticalSection 96810->96811 96810->96813 96811->96804 96845 7e532a 96813->96845 96814->96754 96815->96740 96816->96747 96817->96748 96818->96740 96819->96761 96820->96740 96821->96758 96822->96764 96823->96763 96824->96765 96825->96768 96826->96774 96827->96778 96828->96775 96831 7f03d7 96829->96831 96830 7f03f2 96830->96790 96831->96830 96842 7df2d9 20 API calls __dosmaperr 96831->96842 96833 7f0416 96843 7e27ec 26 API calls __fread_nolock 96833->96843 96835 7f0421 96835->96790 96836->96788 96837->96784 96838->96795 96839->96791 96840->96794 96841->96800 96842->96833 96843->96835 96844->96804 96849 7e2fa6 LeaveCriticalSection 96845->96849 96847 7e5331 96847->96807 96848->96813 96849->96847 96850 7f2402 96853 7b1410 96850->96853 96854 7b144f mciSendStringW 96853->96854 96855 7f24b8 DestroyWindow 96853->96855 96856 7b146b 96854->96856 96857 7b16c6 96854->96857 96868 7f24c4 96855->96868 96859 7b1479 96856->96859 96856->96868 96857->96856 96858 7b16d5 UnregisterHotKey 96857->96858 96858->96857 96886 7b182e 96859->96886 96862 7f2509 96867 7f252d 96862->96867 96869 7f251c FreeLibrary 96862->96869 96863 7f24d8 96863->96868 96892 7b6246 CloseHandle 96863->96892 96864 7f24e2 FindClose 96864->96868 96865 7b148e 96865->96867 96874 7b149c 96865->96874 96870 7f2541 VirtualFree 96867->96870 96877 7b1509 96867->96877 96868->96862 96868->96863 96868->96864 96869->96862 96870->96867 96871 7b14f8 CoUninitialize 96871->96877 96872 7f2589 96879 7f2598 ISource 96872->96879 96893 8232eb 6 API calls ISource 96872->96893 96873 7b1514 96876 7b1524 96873->96876 96874->96871 96890 7b1944 VirtualFreeEx CloseHandle 96876->96890 96877->96872 96877->96873 96882 7f2627 96879->96882 96894 8164d4 22 API calls ISource 96879->96894 96881 7b153a 96881->96879 96883 7b161f 96881->96883 96882->96882 96883->96882 96891 7b1876 CloseHandle InternetCloseHandle InternetCloseHandle WaitForSingleObject 96883->96891 96885 7b16c1 96887 7b183b 96886->96887 96888 7b1480 96887->96888 96895 81702a 22 API calls 96887->96895 96888->96862 96888->96865 96890->96881 96891->96885 96892->96863 96893->96872 96894->96879 96895->96887 96896 7b1044 96901 7b10f3 96896->96901 96898 7b104a 96937 7d00a3 29 API calls __onexit 96898->96937 96900 7b1054 96938 7b1398 96901->96938 96905 7b116a 96906 7ba961 22 API calls 96905->96906 96907 7b1174 96906->96907 96908 7ba961 22 API calls 96907->96908 96909 7b117e 96908->96909 96910 7ba961 22 API calls 96909->96910 96911 7b1188 96910->96911 96912 7ba961 22 API calls 96911->96912 96913 7b11c6 96912->96913 96914 7ba961 22 API calls 96913->96914 96915 7b1292 96914->96915 96948 7b171c 96915->96948 96919 7b12c4 96920 7ba961 22 API calls 96919->96920 96921 7b12ce 96920->96921 96922 7c1940 9 API calls 96921->96922 96923 7b12f9 96922->96923 96969 7b1aab 96923->96969 96925 7b1315 96926 7b1325 GetStdHandle 96925->96926 96927 7b137a 96926->96927 96928 7f2485 96926->96928 96932 7b1387 OleInitialize 96927->96932 96928->96927 96929 7f248e 96928->96929 96930 7cfddb 22 API calls 96929->96930 96931 7f2495 96930->96931 96976 82011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 96931->96976 96932->96898 96934 7f249e 96977 820944 CreateThread 96934->96977 96936 7f24aa CloseHandle 96936->96927 96937->96900 96978 7b13f1 96938->96978 96941 7b13f1 22 API calls 96942 7b13d0 96941->96942 96943 7ba961 22 API calls 96942->96943 96944 7b13dc 96943->96944 96945 7b6b57 22 API calls 96944->96945 96946 7b1129 96945->96946 96947 7b1bc3 6 API calls 96946->96947 96947->96905 96949 7ba961 22 API calls 96948->96949 96950 7b172c 96949->96950 96951 7ba961 22 API calls 96950->96951 96952 7b1734 96951->96952 96953 7ba961 22 API calls 96952->96953 96954 7b174f 96953->96954 96955 7cfddb 22 API calls 96954->96955 96956 7b129c 96955->96956 96957 7b1b4a 96956->96957 96958 7b1b58 96957->96958 96959 7ba961 22 API calls 96958->96959 96960 7b1b63 96959->96960 96961 7ba961 22 API calls 96960->96961 96962 7b1b6e 96961->96962 96963 7ba961 22 API calls 96962->96963 96964 7b1b79 96963->96964 96965 7ba961 22 API calls 96964->96965 96966 7b1b84 96965->96966 96967 7cfddb 22 API calls 96966->96967 96968 7b1b96 RegisterWindowMessageW 96967->96968 96968->96919 96970 7b1abb 96969->96970 96971 7f272d 96969->96971 96972 7cfddb 22 API calls 96970->96972 96985 823209 23 API calls 96971->96985 96974 7b1ac3 96972->96974 96974->96925 96975 7f2738 96976->96934 96977->96936 96986 82092a 28 API calls 96977->96986 96979 7ba961 22 API calls 96978->96979 96980 7b13fc 96979->96980 96981 7ba961 22 API calls 96980->96981 96982 7b1404 96981->96982 96983 7ba961 22 API calls 96982->96983 96984 7b13c6 96983->96984 96984->96941 96985->96975

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 394 7b42de-7b434d call 7ba961 GetVersionExW call 7b6b57 399 7f3617-7f362a 394->399 400 7b4353 394->400 402 7f362b-7f362f 399->402 401 7b4355-7b4357 400->401 403 7b435d-7b43bc call 7b93b2 call 7b37a0 401->403 404 7f3656 401->404 405 7f3632-7f363e 402->405 406 7f3631 402->406 422 7f37df-7f37e6 403->422 423 7b43c2-7b43c4 403->423 409 7f365d-7f3660 404->409 405->402 408 7f3640-7f3642 405->408 406->405 408->401 411 7f3648-7f364f 408->411 412 7b441b-7b4435 GetCurrentProcess IsWow64Process 409->412 413 7f3666-7f36a8 409->413 411->399 415 7f3651 411->415 418 7b4437 412->418 419 7b4494-7b449a 412->419 413->412 416 7f36ae-7f36b1 413->416 415->404 420 7f36db-7f36e5 416->420 421 7f36b3-7f36bd 416->421 424 7b443d-7b4449 418->424 419->424 428 7f36f8-7f3702 420->428 429 7f36e7-7f36f3 420->429 425 7f36bf-7f36c5 421->425 426 7f36ca-7f36d6 421->426 430 7f37e8 422->430 431 7f3806-7f3809 422->431 423->409 427 7b43ca-7b43dd 423->427 432 7b444f-7b445e LoadLibraryA 424->432 433 7f3824-7f3828 GetSystemInfo 424->433 425->412 426->412 436 7b43e3-7b43e5 427->436 437 7f3726-7f372f 427->437 439 7f3715-7f3721 428->439 440 7f3704-7f3710 428->440 429->412 438 7f37ee 430->438 441 7f380b-7f381a 431->441 442 7f37f4-7f37fc 431->442 434 7b449c-7b44a6 GetSystemInfo 432->434 435 7b4460-7b446e GetProcAddress 432->435 444 7b4476-7b4478 434->444 435->434 443 7b4470-7b4474 GetNativeSystemInfo 435->443 445 7b43eb-7b43ee 436->445 446 7f374d-7f3762 436->446 447 7f373c-7f3748 437->447 448 7f3731-7f3737 437->448 438->442 439->412 440->412 441->438 449 7f381c-7f3822 441->449 442->431 443->444 452 7b447a-7b447b FreeLibrary 444->452 453 7b4481-7b4493 444->453 454 7f3791-7f3794 445->454 455 7b43f4-7b440f 445->455 450 7f376f-7f377b 446->450 451 7f3764-7f376a 446->451 447->412 448->412 449->442 450->412 451->412 452->453 454->412 456 7f379a-7f37c1 454->456 457 7b4415 455->457 458 7f3780-7f378c 455->458 459 7f37ce-7f37da 456->459 460 7f37c3-7f37c9 456->460 457->412 458->412 459->412 460->412
                              APIs
                              • GetVersionExW.KERNEL32(?), ref: 007B430D
                                • Part of subcall function 007B6B57: _wcslen.LIBCMT ref: 007B6B6A
                              • GetCurrentProcess.KERNEL32(?,0084CB64,00000000,?,?), ref: 007B4422
                              • IsWow64Process.KERNEL32(00000000,?,?), ref: 007B4429
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 007B4454
                              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 007B4466
                              • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 007B4474
                              • FreeLibrary.KERNEL32(00000000,?,?), ref: 007B447B
                              • GetSystemInfo.KERNEL32(?,?,?), ref: 007B44A0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                              • String ID: GetNativeSystemInfo$kernel32.dll$|O
                              • API String ID: 3290436268-3101561225
                              • Opcode ID: 31c10f58583c204bf89f278d7d2773f985706a9e11b57451ca549c14679100e9
                              • Instruction ID: 61ec2583f1aaf40ba2d2d5b8f74cc5127ade140d97c6b80256baa2f274d974ae
                              • Opcode Fuzzy Hash: 31c10f58583c204bf89f278d7d2773f985706a9e11b57451ca549c14679100e9
                              • Instruction Fuzzy Hash: A7A1737690A2C4DFCF12D76D7C8D6E67FAC7B26740B184899D18193B23DE6C460ACB21

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 798 7b42a2-7b42ba CreateStreamOnHGlobal 799 7b42da-7b42dd 798->799 800 7b42bc-7b42d3 FindResourceExW 798->800 801 7b42d9 800->801 802 7f35ba-7f35c9 LoadResource 800->802 801->799 802->801 803 7f35cf-7f35dd SizeofResource 802->803 803->801 804 7f35e3-7f35ee LockResource 803->804 804->801 805 7f35f4-7f35fc 804->805 806 7f3600-7f3612 805->806 806->801
                              APIs
                              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,007B50AA,?,?,00000000,00000000), ref: 007B42B2
                              • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,007B50AA,?,?,00000000,00000000), ref: 007B42C9
                              • LoadResource.KERNEL32(?,00000000,?,?,007B50AA,?,?,00000000,00000000,?,?,?,?,?,?,007B4F20), ref: 007F35BE
                              • SizeofResource.KERNEL32(?,00000000,?,?,007B50AA,?,?,00000000,00000000,?,?,?,?,?,?,007B4F20), ref: 007F35D3
                              • LockResource.KERNEL32(007B50AA,?,?,007B50AA,?,?,00000000,00000000,?,?,?,?,?,?,007B4F20,?), ref: 007F35E6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                              • String ID: SCRIPT
                              • API String ID: 3051347437-3967369404
                              • Opcode ID: cf4bbba20324b258387833fd08b62981aea744ae5bb7e1d5baaf0f0c933de58b
                              • Instruction ID: 9dc274f03fe5e6c1ad48d25770722103672931bd6b9fee83b357adfcf5360853
                              • Opcode Fuzzy Hash: cf4bbba20324b258387833fd08b62981aea744ae5bb7e1d5baaf0f0c933de58b
                              • Instruction Fuzzy Hash: 41117C75201700BFEB218FA5DC49FA77BBDFBC6B51F104169B412D6260DBB1D800D620

                              Control-flow Graph

                              APIs
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 007B2B6B
                                • Part of subcall function 007B3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00881418,?,007B2E7F,?,?,?,00000000), ref: 007B3A78
                                • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                              • GetForegroundWindow.USER32(runas,?,?,?,?,?,00872224), ref: 007F2C10
                              • ShellExecuteW.SHELL32(00000000,?,?,00872224), ref: 007F2C17
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                              • String ID: runas
                              • API String ID: 448630720-4000483414
                              • Opcode ID: 2694e82f5ba4045dbc9d9f64798f5717c707d6bab01aa909cc4224f7c2f580bd
                              • Instruction ID: 7ac80b73e449079be8b94949505e84ee727149f2b9ca01b8cbae699e9eb4802c
                              • Opcode Fuzzy Hash: 2694e82f5ba4045dbc9d9f64798f5717c707d6bab01aa909cc4224f7c2f580bd
                              • Instruction Fuzzy Hash: 1611D571209305EAC704FF60D859BEEBBA9AB91700F44042DF256431A3DF2C898AC712

                              Control-flow Graph

                              APIs
                              • CreateToolhelp32Snapshot.KERNEL32 ref: 0083A6AC
                              • Process32FirstW.KERNEL32(00000000,?), ref: 0083A6BA
                                • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                              • Process32NextW.KERNEL32(00000000,?), ref: 0083A79C
                              • CloseHandle.KERNELBASE(00000000), ref: 0083A7AB
                                • Part of subcall function 007CCE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,007F3303,?), ref: 007CCE8A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                              • String ID:
                              • API String ID: 1991900642-0
                              • Opcode ID: 771bec8836e8bba46e3356aa3ea86fee588db9d9079da85440cb71f3a9eb1574
                              • Instruction ID: f8582203b07980ea2a3d63e398105691cbf7a9e247aae5b9f8a1441f5ff7c530
                              • Opcode Fuzzy Hash: 771bec8836e8bba46e3356aa3ea86fee588db9d9079da85440cb71f3a9eb1574
                              • Instruction Fuzzy Hash: 2E51F975508300AFD714EF24C88AAABBBE8FF89754F40892DF695D7251EB34D904CB92

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1024 81dbbe-81dbda lstrlenW 1025 81dc06 1024->1025 1026 81dbdc-81dbe6 GetFileAttributesW 1024->1026 1027 81dc09-81dc0d 1025->1027 1026->1027 1028 81dbe8-81dbf7 FindFirstFileW 1026->1028 1028->1025 1029 81dbf9-81dc04 FindClose 1028->1029 1029->1027
                              APIs
                              • lstrlenW.KERNEL32(?,007F5222), ref: 0081DBCE
                              • GetFileAttributesW.KERNELBASE(?), ref: 0081DBDD
                              • FindFirstFileW.KERNEL32(?,?), ref: 0081DBEE
                              • FindClose.KERNEL32(00000000), ref: 0081DBFA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: FileFind$AttributesCloseFirstlstrlen
                              • String ID:
                              • API String ID: 2695905019-0
                              • Opcode ID: 3d48c97496f11d05d3582c45ee4bc749237b0d9ad5c021e5b7f5f790f585a59f
                              • Instruction ID: 36c2b104dfb7976c156c182724837bb5210a72e3bfd13ab95c398a7b0f847fa2
                              • Opcode Fuzzy Hash: 3d48c97496f11d05d3582c45ee4bc749237b0d9ad5c021e5b7f5f790f585a59f
                              • Instruction Fuzzy Hash: BAF0A038811A245782206B78AC0D9EA376CFF02334B104B02F936C22E0FBF05994C6D5
                              APIs
                              • GetCurrentProcess.KERNEL32(007E28E9,?,007D4CBE,007E28E9,008788B8,0000000C,007D4E15,007E28E9,00000002,00000000,?,007E28E9), ref: 007D4D09
                              • TerminateProcess.KERNEL32(00000000,?,007D4CBE,007E28E9,008788B8,0000000C,007D4E15,007E28E9,00000002,00000000,?,007E28E9), ref: 007D4D10
                              • ExitProcess.KERNEL32 ref: 007D4D22
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Process$CurrentExitTerminate
                              • String ID:
                              • API String ID: 1703294689-0
                              • Opcode ID: dce429a0df2e16f58f25ba3119464e8b76d42070d0f0f1a3e67919aedbaa87bb
                              • Instruction ID: a2c2ab1ec915e69465f933999e2f24e945c0cb0d0ed57f2f6f8fe7142d9bc3c6
                              • Opcode Fuzzy Hash: dce429a0df2e16f58f25ba3119464e8b76d42070d0f0f1a3e67919aedbaa87bb
                              • Instruction Fuzzy Hash: 8CE0B635101588ABCF61AF64DD0DA583B7EFB46785B144015FD058B222CB39DD42CA90

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 83aff9-83b056 call 7d2340 3 83b094-83b098 0->3 4 83b058-83b06b call 7bb567 0->4 5 83b09a-83b0bb call 7bb567 * 2 3->5 6 83b0dd-83b0e0 3->6 14 83b0c8 4->14 15 83b06d-83b092 call 7bb567 * 2 4->15 29 83b0bf-83b0c4 5->29 10 83b0e2-83b0e5 6->10 11 83b0f5-83b119 call 7b7510 call 7b7620 6->11 16 83b0e8-83b0ed call 7bb567 10->16 31 83b1d8-83b1e0 11->31 32 83b11f-83b178 call 7b7510 call 7b7620 call 7b7510 call 7b7620 call 7b7510 call 7b7620 11->32 19 83b0cb-83b0cf 14->19 15->29 16->11 25 83b0d1-83b0d7 19->25 26 83b0d9-83b0db 19->26 25->16 26->6 26->11 29->6 33 83b0c6 29->33 36 83b1e2-83b1fd call 7b7510 call 7b7620 31->36 37 83b20a-83b238 GetCurrentDirectoryW call 7cfe0b GetCurrentDirectoryW 31->37 80 83b1a6-83b1d6 GetSystemDirectoryW call 7cfe0b GetSystemDirectoryW 32->80 81 83b17a-83b195 call 7b7510 call 7b7620 32->81 33->19 36->37 50 83b1ff-83b208 call 7d4963 36->50 46 83b23c 37->46 49 83b240-83b244 46->49 52 83b246-83b270 call 7b9c6e * 3 49->52 53 83b275-83b285 call 8200d9 49->53 50->37 50->53 52->53 62 83b287-83b289 53->62 63 83b28b-83b2e1 call 8207c0 call 8206e6 call 8205a7 53->63 68 83b2ee-83b2f2 62->68 63->68 99 83b2e3 63->99 73 83b39a-83b3be CreateProcessW 68->73 74 83b2f8-83b321 call 8111c8 68->74 78 83b3c1-83b3d4 call 7cfe14 * 2 73->78 84 83b323-83b328 call 811201 74->84 85 83b32a call 8114ce 74->85 101 83b3d6-83b3e8 78->101 102 83b42f-83b43d CloseHandle 78->102 80->46 81->80 107 83b197-83b1a0 call 7d4963 81->107 98 83b32f-83b33c call 7d4963 84->98 85->98 115 83b347-83b357 call 7d4963 98->115 116 83b33e-83b345 98->116 99->68 105 83b3ea 101->105 106 83b3ed-83b3fc 101->106 109 83b43f-83b444 102->109 110 83b49c 102->110 105->106 111 83b401-83b42a GetLastError call 7b630c call 7bcfa0 106->111 112 83b3fe 106->112 107->49 107->80 117 83b451-83b456 109->117 118 83b446-83b44c CloseHandle 109->118 113 83b4a0-83b4a4 110->113 127 83b4e5-83b4f6 call 820175 111->127 112->111 120 83b4b2-83b4bc 113->120 121 83b4a6-83b4b0 113->121 137 83b362-83b372 call 7d4963 115->137 138 83b359-83b360 115->138 116->115 116->116 124 83b463-83b468 117->124 125 83b458-83b45e CloseHandle 117->125 118->117 128 83b4c4-83b4e3 call 7bcfa0 CloseHandle 120->128 129 83b4be 120->129 121->127 131 83b475-83b49a call 8209d9 call 83b536 124->131 132 83b46a-83b470 CloseHandle 124->132 125->124 128->127 129->128 131->113 132->131 146 83b374-83b37b 137->146 147 83b37d-83b398 call 7cfe14 * 3 137->147 138->137 138->138 146->146 146->147 147->78
                              APIs
                              • _wcslen.LIBCMT ref: 0083B198
                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0083B1B0
                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0083B1D4
                              • _wcslen.LIBCMT ref: 0083B200
                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0083B214
                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0083B236
                              • _wcslen.LIBCMT ref: 0083B332
                                • Part of subcall function 008205A7: GetStdHandle.KERNEL32(000000F6), ref: 008205C6
                              • _wcslen.LIBCMT ref: 0083B34B
                              • _wcslen.LIBCMT ref: 0083B366
                              • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0083B3B6
                              • GetLastError.KERNEL32(00000000), ref: 0083B407
                              • CloseHandle.KERNEL32(?), ref: 0083B439
                              • CloseHandle.KERNEL32(00000000), ref: 0083B44A
                              • CloseHandle.KERNEL32(00000000), ref: 0083B45C
                              • CloseHandle.KERNEL32(00000000), ref: 0083B46E
                              • CloseHandle.KERNEL32(?), ref: 0083B4E3
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                              • String ID:
                              • API String ID: 2178637699-0
                              • Opcode ID: fb9857db3f2af7f6ce7bdb43f41309ea7d3dce4f43c0f08feee97bb1151c8b0b
                              • Instruction ID: bfba125c42c2d90b8d22faba33be38814aadcdcf8a012eabf3d6b031a481c1b6
                              • Opcode Fuzzy Hash: fb9857db3f2af7f6ce7bdb43f41309ea7d3dce4f43c0f08feee97bb1151c8b0b
                              • Instruction Fuzzy Hash: A9F17871608200DFC724EF24C895B6ABBE5FF85314F14855DF99A8B2A2DB35EC40CB92
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Sleep$InputStateTimetime
                              • String ID:
                              • API String ID: 2764417729-0
                              • Opcode ID: ff6cc84aaae278962bb99f34e2f71670894feca5fea9c72bcd27e599d5bc4b5b
                              • Instruction ID: 4125d85a3dc46137871eff63ddfb2b394bf8149a8ea515fa9fc83bf85e5de62c
                              • Opcode Fuzzy Hash: ff6cc84aaae278962bb99f34e2f71670894feca5fea9c72bcd27e599d5bc4b5b
                              • Instruction Fuzzy Hash: 6342F170608241DFDB78CF28C898BAABBA5FF45314F14855DE456C7291EBB8EC44CB92

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 007B2D07
                              • RegisterClassExW.USER32(00000030), ref: 007B2D31
                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 007B2D42
                              • InitCommonControlsEx.COMCTL32(?), ref: 007B2D5F
                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 007B2D6F
                              • LoadIconW.USER32(000000A9), ref: 007B2D85
                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 007B2D94
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                              • API String ID: 2914291525-1005189915
                              • Opcode ID: 5c9c7066c3ee1da42398b0de6f60ee8415a81a220b1ad89d780fe10640f7be95
                              • Instruction ID: 8879d03ee50ffe2237a71d7ec4411db2416d1c514cb5eaa59a6f2174bf05b97b
                              • Opcode Fuzzy Hash: 5c9c7066c3ee1da42398b0de6f60ee8415a81a220b1ad89d780fe10640f7be95
                              • Instruction Fuzzy Hash: F421BFB5912318AFDF40DFA8EC89BDDBFB8FB09700F00811AE611A62A0DBB55545CF91

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 462 7f065b-7f068b call 7f042f 465 7f068d-7f0698 call 7df2c6 462->465 466 7f06a6-7f06b2 call 7e5221 462->466 471 7f069a-7f06a1 call 7df2d9 465->471 472 7f06cb-7f0714 call 7f039a 466->472 473 7f06b4-7f06c9 call 7df2c6 call 7df2d9 466->473 482 7f097d-7f0983 471->482 480 7f0716-7f071f 472->480 481 7f0781-7f078a GetFileType 472->481 473->471 485 7f0756-7f077c GetLastError call 7df2a3 480->485 486 7f0721-7f0725 480->486 487 7f078c-7f07bd GetLastError call 7df2a3 CloseHandle 481->487 488 7f07d3-7f07d6 481->488 485->471 486->485 491 7f0727-7f0754 call 7f039a 486->491 487->471 499 7f07c3-7f07ce call 7df2d9 487->499 489 7f07df-7f07e5 488->489 490 7f07d8-7f07dd 488->490 494 7f07e9-7f0837 call 7e516a 489->494 495 7f07e7 489->495 490->494 491->481 491->485 505 7f0839-7f0845 call 7f05ab 494->505 506 7f0847-7f086b call 7f014d 494->506 495->494 499->471 505->506 513 7f086f-7f0879 call 7e86ae 505->513 511 7f087e-7f08c1 506->511 512 7f086d 506->512 515 7f08c3-7f08c7 511->515 516 7f08e2-7f08f0 511->516 512->513 513->482 515->516 518 7f08c9-7f08dd 515->518 519 7f097b 516->519 520 7f08f6-7f08fa 516->520 518->516 519->482 520->519 521 7f08fc-7f092f CloseHandle call 7f039a 520->521 524 7f0963-7f0977 521->524 525 7f0931-7f095d GetLastError call 7df2a3 call 7e5333 521->525 524->519 525->524
                              APIs
                                • Part of subcall function 007F039A: CreateFileW.KERNELBASE(00000000,00000000,?,007F0704,?,?,00000000,?,007F0704,00000000,0000000C), ref: 007F03B7
                              • GetLastError.KERNEL32 ref: 007F076F
                              • __dosmaperr.LIBCMT ref: 007F0776
                              • GetFileType.KERNELBASE(00000000), ref: 007F0782
                              • GetLastError.KERNEL32 ref: 007F078C
                              • __dosmaperr.LIBCMT ref: 007F0795
                              • CloseHandle.KERNEL32(00000000), ref: 007F07B5
                              • CloseHandle.KERNEL32(?), ref: 007F08FF
                              • GetLastError.KERNEL32 ref: 007F0931
                              • __dosmaperr.LIBCMT ref: 007F0938
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                              • String ID: H
                              • API String ID: 4237864984-2852464175
                              • Opcode ID: d4680d2a229a141b0ed13f6f578cfc159a766640b16e3c78f19a6708fe1e7274
                              • Instruction ID: 8a588d23177dece8688b7e48c3c2da8e2802d26e9bc10e0f19c3715b25a87639
                              • Opcode Fuzzy Hash: d4680d2a229a141b0ed13f6f578cfc159a766640b16e3c78f19a6708fe1e7274
                              • Instruction Fuzzy Hash: 00A12136A001088FDF19EF68D855BBE7BA0AB06320F14419EF9159F3D2DB399912CB91

                              Control-flow Graph

                              APIs
                                • Part of subcall function 007B3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00881418,?,007B2E7F,?,?,?,00000000), ref: 007B3A78
                                • Part of subcall function 007B3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 007B3379
                              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 007B356A
                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 007F318D
                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 007F31CE
                              • RegCloseKey.ADVAPI32(?), ref: 007F3210
                              • _wcslen.LIBCMT ref: 007F3277
                              • _wcslen.LIBCMT ref: 007F3286
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                              • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                              • API String ID: 98802146-2727554177
                              • Opcode ID: 93b334cc33b000764da6e75d7fcc540e46861810ce60b06c4723b6ea840d4ace
                              • Instruction ID: 1236ad3a734e0ee10517d16f7ea4996bb8f5b3dd570e88656f6d5a9256f23afd
                              • Opcode Fuzzy Hash: 93b334cc33b000764da6e75d7fcc540e46861810ce60b06c4723b6ea840d4ace
                              • Instruction Fuzzy Hash: FD716A71405305EEC314EF69EC95AABBBE8FF85740B40042EF655C3271EB389A48CB62

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 007B2B8E
                              • LoadCursorW.USER32(00000000,00007F00), ref: 007B2B9D
                              • LoadIconW.USER32(00000063), ref: 007B2BB3
                              • LoadIconW.USER32(000000A4), ref: 007B2BC5
                              • LoadIconW.USER32(000000A2), ref: 007B2BD7
                              • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 007B2BEF
                              • RegisterClassExW.USER32(?), ref: 007B2C40
                                • Part of subcall function 007B2CD4: GetSysColorBrush.USER32(0000000F), ref: 007B2D07
                                • Part of subcall function 007B2CD4: RegisterClassExW.USER32(00000030), ref: 007B2D31
                                • Part of subcall function 007B2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 007B2D42
                                • Part of subcall function 007B2CD4: InitCommonControlsEx.COMCTL32(?), ref: 007B2D5F
                                • Part of subcall function 007B2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 007B2D6F
                                • Part of subcall function 007B2CD4: LoadIconW.USER32(000000A9), ref: 007B2D85
                                • Part of subcall function 007B2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 007B2D94
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                              • String ID: #$0$AutoIt v3
                              • API String ID: 423443420-4155596026
                              • Opcode ID: d36d145775cf70a54cd6a93cdd3c0554e2b37fddffb127c3d916665bce99116b
                              • Instruction ID: e1a53c659e09ba698b868a48229e5b1025f05cc04d19d0575434c9adc7912632
                              • Opcode Fuzzy Hash: d36d145775cf70a54cd6a93cdd3c0554e2b37fddffb127c3d916665bce99116b
                              • Instruction Fuzzy Hash: 03211874E01318ABDF109FA9EC59BA97FB8FB48B50F00402AE600A67A0DBB90541CF90

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 603 7b3170-7b3185 604 7b3187-7b318a 603->604 605 7b31e5-7b31e7 603->605 607 7b31eb 604->607 608 7b318c-7b3193 604->608 605->604 606 7b31e9 605->606 609 7b31d0-7b31d8 DefWindowProcW 606->609 610 7f2dfb-7f2e23 call 7b18e2 call 7ce499 607->610 611 7b31f1-7b31f6 607->611 612 7b3199-7b319e 608->612 613 7b3265-7b326d PostQuitMessage 608->613 616 7b31de-7b31e4 609->616 646 7f2e28-7f2e2f 610->646 618 7b31f8-7b31fb 611->618 619 7b321d-7b3244 SetTimer RegisterWindowMessageW 611->619 614 7f2e7c-7f2e90 call 81bf30 612->614 615 7b31a4-7b31a8 612->615 617 7b3219-7b321b 613->617 614->617 640 7f2e96 614->640 622 7b31ae-7b31b3 615->622 623 7f2e68-7f2e72 call 81c161 615->623 617->616 626 7f2d9c-7f2d9f 618->626 627 7b3201-7b320f KillTimer call 7b30f2 618->627 619->617 624 7b3246-7b3251 CreatePopupMenu 619->624 629 7f2e4d-7f2e54 622->629 630 7b31b9-7b31be 622->630 636 7f2e77 623->636 624->617 632 7f2dd7-7f2df6 MoveWindow 626->632 633 7f2da1-7f2da5 626->633 644 7b3214 call 7b3c50 627->644 629->609 643 7f2e5a-7f2e63 call 810ad7 629->643 638 7b3253-7b3263 call 7b326f 630->638 639 7b31c4-7b31ca 630->639 632->617 641 7f2da7-7f2daa 633->641 642 7f2dc6-7f2dd2 SetFocus 633->642 636->617 638->617 639->609 639->646 640->609 641->639 647 7f2db0-7f2dc1 call 7b18e2 641->647 642->617 643->609 644->617 646->609 651 7f2e35-7f2e48 call 7b30f2 call 7b3837 646->651 647->617 651->609
                              APIs
                              • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,007B316A,?,?), ref: 007B31D8
                              • KillTimer.USER32(?,00000001,?,?,?,?,?,007B316A,?,?), ref: 007B3204
                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 007B3227
                              • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,007B316A,?,?), ref: 007B3232
                              • CreatePopupMenu.USER32 ref: 007B3246
                              • PostQuitMessage.USER32(00000000), ref: 007B3267
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                              • String ID: TaskbarCreated
                              • API String ID: 129472671-2362178303
                              • Opcode ID: 1259b21afa4a67701613f79caa8e3dd8923d90c87be23ebc42326a5417029e3a
                              • Instruction ID: 5be5e475e4282f107cdbd0c368ab8e9007d225c3a477824adee4ca5d5b6b3240
                              • Opcode Fuzzy Hash: 1259b21afa4a67701613f79caa8e3dd8923d90c87be23ebc42326a5417029e3a
                              • Instruction Fuzzy Hash: C541DF3524060CABDF146BACDC1EBF93A5DFB06340F040125FA02C62A2DF7D9E8297A1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 659 7b1410-7b1449 660 7b144f-7b1465 mciSendStringW 659->660 661 7f24b8-7f24b9 DestroyWindow 659->661 662 7b146b-7b1473 660->662 663 7b16c6-7b16d3 660->663 666 7f24c4-7f24d1 661->666 662->666 667 7b1479-7b1488 call 7b182e 662->667 664 7b16f8-7b16ff 663->664 665 7b16d5-7b16f0 UnregisterHotKey 663->665 664->662 669 7b1705 664->669 665->664 668 7b16f2-7b16f3 call 7b10d0 665->668 670 7f24d3-7f24d6 666->670 671 7f2500-7f2507 666->671 678 7f250e-7f251a 667->678 679 7b148e-7b1496 667->679 668->664 669->663 676 7f24d8-7f24e0 call 7b6246 670->676 677 7f24e2-7f24e5 FindClose 670->677 671->666 675 7f2509 671->675 675->678 680 7f24eb-7f24f8 676->680 677->680 685 7f251c-7f251e FreeLibrary 678->685 686 7f2524-7f252b 678->686 682 7b149c-7b14c1 call 7bcfa0 679->682 683 7f2532-7f253f 679->683 680->671 684 7f24fa-7f24fb call 8232b1 680->684 696 7b14f8-7b1503 CoUninitialize 682->696 697 7b14c3 682->697 691 7f2566-7f256d 683->691 692 7f2541-7f255e VirtualFree 683->692 684->671 685->686 686->678 690 7f252d 686->690 690->683 691->683 693 7f256f 691->693 692->691 695 7f2560-7f2561 call 823317 692->695 699 7f2574-7f2578 693->699 695->691 696->699 701 7b1509-7b150e 696->701 700 7b14c6-7b14f6 call 7b1a05 call 7b19ae 697->700 699->701 702 7f257e-7f2584 699->702 700->696 704 7f2589-7f2596 call 8232eb 701->704 705 7b1514-7b151e 701->705 702->701 718 7f2598 704->718 708 7b1707-7b1714 call 7cf80e 705->708 709 7b1524-7b15a5 call 7b988f call 7b1944 call 7b17d5 call 7cfe14 call 7b177c call 7b988f call 7bcfa0 call 7b17fe call 7cfe14 705->709 708->709 720 7b171a 708->720 722 7f259d-7f25bf call 7cfdcd 709->722 748 7b15ab-7b15cf call 7cfe14 709->748 718->722 720->708 728 7f25c1 722->728 730 7f25c6-7f25e8 call 7cfdcd 728->730 736 7f25ea 730->736 739 7f25ef-7f2611 call 7cfdcd 736->739 745 7f2613 739->745 749 7f2618-7f2625 call 8164d4 745->749 748->730 754 7b15d5-7b15f9 call 7cfe14 748->754 755 7f2627 749->755 754->739 760 7b15ff-7b1619 call 7cfe14 754->760 757 7f262c-7f2639 call 7cac64 755->757 763 7f263b 757->763 760->749 765 7b161f-7b1643 call 7b17d5 call 7cfe14 760->765 766 7f2640-7f264d call 823245 763->766 765->757 774 7b1649-7b1651 765->774 772 7f264f 766->772 776 7f2654-7f2661 call 8232cc 772->776 774->766 775 7b1657-7b1675 call 7b988f call 7b190a 774->775 775->776 784 7b167b-7b1689 775->784 782 7f2663 776->782 785 7f2668-7f2675 call 8232cc 782->785 784->785 787 7b168f-7b16c5 call 7b988f * 3 call 7b1876 784->787 790 7f2677 785->790 790->790
                              APIs
                              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 007B1459
                              • CoUninitialize.COMBASE ref: 007B14F8
                              • UnregisterHotKey.USER32(?), ref: 007B16DD
                              • DestroyWindow.USER32(?), ref: 007F24B9
                              • FreeLibrary.KERNEL32(?), ref: 007F251E
                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 007F254B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                              • String ID: close all
                              • API String ID: 469580280-3243417748
                              • Opcode ID: f6f2becf5c3705f0e68feeb11329565fcb36af4ddc4b9b14e414486fe88545e0
                              • Instruction ID: cc7d8b2197844ac0e58605ec304b2ea3c3872b41510639b8d0aa08ce5ba6b43c
                              • Opcode Fuzzy Hash: f6f2becf5c3705f0e68feeb11329565fcb36af4ddc4b9b14e414486fe88545e0
                              • Instruction Fuzzy Hash: C8D15E31702212DFCB29DF14C4A9B69F7A5BF05700F9441ADE54AAB352DB38AD22CF51

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 808 7b2c63-7b2cd3 CreateWindowExW * 2 ShowWindow * 2
                              APIs
                              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 007B2C91
                              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 007B2CB2
                              • ShowWindow.USER32(00000000,?,?,?,?,?,?,007B1CAD,?), ref: 007B2CC6
                              • ShowWindow.USER32(00000000,?,?,?,?,?,?,007B1CAD,?), ref: 007B2CCF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Window$CreateShow
                              • String ID: AutoIt v3$edit
                              • API String ID: 1584632944-3779509399
                              • Opcode ID: f8a239ab4a8b37928b49ee257c92cae3bc18d85d01d30a449f6b0c38a79a9260
                              • Instruction ID: 60fda538a2e8d333e4d7b47389421d17f7ca04c3680a8707d71cbaa5833db533
                              • Opcode Fuzzy Hash: f8a239ab4a8b37928b49ee257c92cae3bc18d85d01d30a449f6b0c38a79a9260
                              • Instruction Fuzzy Hash: 43F0DA755413947AEB71171BAC0CEB72EBDF7C7F50B00005AF900A26A0CA791852DBB0

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 959 7b3b1c-7b3b27 960 7b3b99-7b3b9b 959->960 961 7b3b29-7b3b2e 959->961 962 7b3b8c-7b3b8f 960->962 961->960 963 7b3b30-7b3b48 RegOpenKeyExW 961->963 963->960 964 7b3b4a-7b3b69 RegQueryValueExW 963->964 965 7b3b6b-7b3b76 964->965 966 7b3b80-7b3b8b RegCloseKey 964->966 967 7b3b78-7b3b7a 965->967 968 7b3b90-7b3b97 965->968 966->962 969 7b3b7e 967->969 968->969 969->966
                              APIs
                              • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,007B3B0F,SwapMouseButtons,00000004,?), ref: 007B3B40
                              • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,007B3B0F,SwapMouseButtons,00000004,?), ref: 007B3B61
                              • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,007B3B0F,SwapMouseButtons,00000004,?), ref: 007B3B83
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID: Control Panel\Mouse
                              • API String ID: 3677997916-824357125
                              • Opcode ID: aaec3f81ff09898a84b9ad4fe0d4ea5fcafb8922b79fe6c25e47f39e2e0a5db9
                              • Instruction ID: 9d38b0f5344b554f51f5e0ab528a7cd7a5a17e3e46a56bf46c7cab4f0add6402
                              • Opcode Fuzzy Hash: aaec3f81ff09898a84b9ad4fe0d4ea5fcafb8922b79fe6c25e47f39e2e0a5db9
                              • Instruction Fuzzy Hash: 63112AB5511208FFDB208FA5DC44AEFB7BCEF05744B104559A805D7114E6359E809760
                              APIs
                              • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 007F33A2
                                • Part of subcall function 007B6B57: _wcslen.LIBCMT ref: 007B6B6A
                              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 007B3A04
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: IconLoadNotifyShell_String_wcslen
                              • String ID: Line:
                              • API String ID: 2289894680-1585850449
                              • Opcode ID: b219c1129509365c63f19b04f35ea8d8f7d2bb6dbb4f070d5462fa94264963ec
                              • Instruction ID: c2d9a5d3c2a3724d77f4dce91b8d5b7178161273fced04ebf02d287a016a00d4
                              • Opcode Fuzzy Hash: b219c1129509365c63f19b04f35ea8d8f7d2bb6dbb4f070d5462fa94264963ec
                              • Instruction Fuzzy Hash: 8831A571408304AAD725EB14DC49BEBB7ECBF40714F10451AF59993291EF7CAA89C7C2
                              APIs
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 007D0668
                                • Part of subcall function 007D32A4: RaiseException.KERNEL32(?,?,?,007D068A,?,00881444,?,?,?,?,?,?,007D068A,007B1129,00878738,007B1129), ref: 007D3304
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 007D0685
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Exception@8Throw$ExceptionRaise
                              • String ID: Unknown exception
                              • API String ID: 3476068407-410509341
                              • Opcode ID: 30b1baf371e66bee3c1c71a49ff61bd899bb7ad157d89bd4adfcd0c77368ffde
                              • Instruction ID: 2ba0eed18da7c6e991da94069f5c0a75968269e1c7b7ba0a096af79c6d66e1cc
                              • Opcode Fuzzy Hash: 30b1baf371e66bee3c1c71a49ff61bd899bb7ad157d89bd4adfcd0c77368ffde
                              • Instruction Fuzzy Hash: 27F0F42490020DF38B04B664E84EE5D777CAE00350B60803AB929D6795EF38EA2585C0
                              APIs
                                • Part of subcall function 007B1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 007B1BF4
                                • Part of subcall function 007B1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 007B1BFC
                                • Part of subcall function 007B1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 007B1C07
                                • Part of subcall function 007B1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 007B1C12
                                • Part of subcall function 007B1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 007B1C1A
                                • Part of subcall function 007B1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 007B1C22
                                • Part of subcall function 007B1B4A: RegisterWindowMessageW.USER32(00000004,?,007B12C4), ref: 007B1BA2
                              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 007B136A
                              • OleInitialize.OLE32 ref: 007B1388
                              • CloseHandle.KERNEL32(00000000,00000000), ref: 007F24AB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                              • String ID:
                              • API String ID: 1986988660-0
                              • Opcode ID: c0dae7988f3bfd3e9336ec9da35489214642f4a51d118ac9ff2bba423e50abd2
                              • Instruction ID: 2a8378fe63216dd94af72982eb9a9d8d69743d40b6effe0dad25e46b102256fe
                              • Opcode Fuzzy Hash: c0dae7988f3bfd3e9336ec9da35489214642f4a51d118ac9ff2bba423e50abd2
                              • Instruction Fuzzy Hash: 1871A7B49122009ECB84EFBDE95EA953AEDFB88344794823AD10AC7262EF344447CF45
                              APIs
                                • Part of subcall function 007B3923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 007B3A04
                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0081C259
                              • KillTimer.USER32(?,00000001,?,?), ref: 0081C261
                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0081C270
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: IconNotifyShell_Timer$Kill
                              • String ID:
                              • API String ID: 3500052701-0
                              • Opcode ID: 964d78b3f0c26f7d178fcfe11abdc4de4b65d45201251040ef2b621ed2325d75
                              • Instruction ID: 90a0d2653d503d4944459ea0177ef50b17e8cbcacc58fcd4569eec99e69304b6
                              • Opcode Fuzzy Hash: 964d78b3f0c26f7d178fcfe11abdc4de4b65d45201251040ef2b621ed2325d75
                              • Instruction Fuzzy Hash: D1318170944344AFEB629F648859BEABBECFF16308F00049AD59AD7241C7746AC5CB51
                              APIs
                              • CloseHandle.KERNELBASE(00000000,00000000,?,?,007E85CC,?,00878CC8,0000000C), ref: 007E8704
                              • GetLastError.KERNEL32(?,007E85CC,?,00878CC8,0000000C), ref: 007E870E
                              • __dosmaperr.LIBCMT ref: 007E8739
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CloseErrorHandleLast__dosmaperr
                              • String ID:
                              • API String ID: 2583163307-0
                              • Opcode ID: f5644c105a932bab965377306b92cbbe992053e6d738618300ba1049150bd1f2
                              • Instruction ID: 35639846571ea60e7556ceb2e599b3bc1fa38c7882d36c369d90a3c6c1a8ddcb
                              • Opcode Fuzzy Hash: f5644c105a932bab965377306b92cbbe992053e6d738618300ba1049150bd1f2
                              • Instruction Fuzzy Hash: 61018E326072E056C2E06376694977E67494B8E77CF390119F81C8B1D3DEACCC81C252
                              APIs
                              • TranslateMessage.USER32(?), ref: 007BDB7B
                              • DispatchMessageW.USER32(?), ref: 007BDB89
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 007BDB9F
                              • Sleep.KERNELBASE(0000000A), ref: 007BDBB1
                              • TranslateAcceleratorW.USER32(?,?,?), ref: 00801CC9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                              • String ID:
                              • API String ID: 3288985973-0
                              • Opcode ID: 813e0a7861990b16c54a5dac34dcf60ee2ce7a60d1a0886368226fcc9a72a924
                              • Instruction ID: e4f47c47336a62e1463a136132c0c43af8a71ea40d637dfeaaf6e5361819339e
                              • Opcode Fuzzy Hash: 813e0a7861990b16c54a5dac34dcf60ee2ce7a60d1a0886368226fcc9a72a924
                              • Instruction Fuzzy Hash: 2CF05E306453409BEB70CBA48C4DFEA73ACFB45310F104628E61AC30C0EB349848CB25
                              APIs
                              • __Init_thread_footer.LIBCMT ref: 007C17F6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Init_thread_footer
                              • String ID: CALL
                              • API String ID: 1385522511-4196123274
                              • Opcode ID: 3cd10274ca45ac6ec3bed5ff877e7a92f83ad5442745f3fe71dc44a039c28185
                              • Instruction ID: cafe3a304a03d0293577203725c671af39c01d09fbb21efc5572f62f5c856d8b
                              • Opcode Fuzzy Hash: 3cd10274ca45ac6ec3bed5ff877e7a92f83ad5442745f3fe71dc44a039c28185
                              • Instruction Fuzzy Hash: 22226870608241DFC714DF14C894F2ABBE1FF86314F64896DE4968B3A2D739E961CB92
                              APIs
                              • GetOpenFileNameW.COMDLG32(?), ref: 007F2C8C
                                • Part of subcall function 007B3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007B3A97,?,?,007B2E7F,?,?,?,00000000), ref: 007B3AC2
                                • Part of subcall function 007B2DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 007B2DC4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Name$Path$FileFullLongOpen
                              • String ID: X
                              • API String ID: 779396738-3081909835
                              • Opcode ID: dd658ede7d605a0d6f10dc25efd02c48eacab03035d2efcaf562261b1b1f4ee4
                              • Instruction ID: 10f3d2c0e7e985bb5eb1991a23a38f256f952c6aee1e8d1ada9d2b0d514219f7
                              • Opcode Fuzzy Hash: dd658ede7d605a0d6f10dc25efd02c48eacab03035d2efcaf562261b1b1f4ee4
                              • Instruction Fuzzy Hash: 68218471A002589ACB419F94C8497EE7BF8AF49704F108059E505A7345EBB89A8A8F61
                              APIs
                              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 007B3908
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: IconNotifyShell_
                              • String ID:
                              • API String ID: 1144537725-0
                              • Opcode ID: e3db5b9feb45201bc3323ffaae4b3365c3d8f94a2cd7344bbd0d8adb601a5007
                              • Instruction ID: df33565e570c24ec0ab75f2d69afd495e636fc64f8d39664cf9192ee67be9680
                              • Opcode Fuzzy Hash: e3db5b9feb45201bc3323ffaae4b3365c3d8f94a2cd7344bbd0d8adb601a5007
                              • Instruction Fuzzy Hash: 4E314B705047019FD761DF28D8897D7BBE8FB49708F00092EF59987250E779AA85CB52
                              APIs
                              • timeGetTime.WINMM ref: 007CF661
                                • Part of subcall function 007BD730: GetInputState.USER32 ref: 007BD807
                              • Sleep.KERNEL32(00000000), ref: 0080F2DE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: InputSleepStateTimetime
                              • String ID:
                              • API String ID: 4149333218-0
                              • Opcode ID: 4970ad3803d86da19200ac83d54c2a3d649c6730887acee500e343d1fe9a05a0
                              • Instruction ID: dcbc74672a9ec7867914542cb0cd79649f38e54f84843ab70401282a19d0b591
                              • Opcode Fuzzy Hash: 4970ad3803d86da19200ac83d54c2a3d649c6730887acee500e343d1fe9a05a0
                              • Instruction Fuzzy Hash: 5EF08C352402059FD360EF69D849BAAB7E8FF4A760F004029E85AC72A1DBB0A800CB91
                              APIs
                              • __Init_thread_footer.LIBCMT ref: 007BBB4E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Init_thread_footer
                              • String ID:
                              • API String ID: 1385522511-0
                              • Opcode ID: 4e5b91e8dcbe0bf839e167d67805089ac1d639b59a0447535a095a5e766b14a9
                              • Instruction ID: b61a0e4967b36d6e5eed055d0dabfac11e5c01df28b6a3ad162aba888f144e4a
                              • Opcode Fuzzy Hash: 4e5b91e8dcbe0bf839e167d67805089ac1d639b59a0447535a095a5e766b14a9
                              • Instruction Fuzzy Hash: 19327974A00209DFDB24CF58C898BBAB7B9FF44314F158059ED05AB3A1D7B8AD81CB91
                              APIs
                                • Part of subcall function 007B4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,007B4EDD,?,00881418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007B4E9C
                                • Part of subcall function 007B4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 007B4EAE
                                • Part of subcall function 007B4E90: FreeLibrary.KERNEL32(00000000,?,?,007B4EDD,?,00881418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007B4EC0
                              • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00881418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007B4EFD
                                • Part of subcall function 007B4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,007F3CDE,?,00881418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007B4E62
                                • Part of subcall function 007B4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 007B4E74
                                • Part of subcall function 007B4E59: FreeLibrary.KERNEL32(00000000,?,?,007F3CDE,?,00881418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007B4E87
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Library$Load$AddressFreeProc
                              • String ID:
                              • API String ID: 2632591731-0
                              • Opcode ID: 635c82eb9184576e9e06d0f7ea5f5b9d0bdf1cb7005edcea2c48a96de9a469ef
                              • Instruction ID: f39bb18074390a2396b92a63e87437c692f9dd7d5700f41b38081963b2b192de
                              • Opcode Fuzzy Hash: 635c82eb9184576e9e06d0f7ea5f5b9d0bdf1cb7005edcea2c48a96de9a469ef
                              • Instruction Fuzzy Hash: 23119132610219EADB14BB64DC0ABFD77A5AF40B10F148429F542AB2D2EEB8DA459B50
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: __wsopen_s
                              • String ID:
                              • API String ID: 3347428461-0
                              • Opcode ID: 48cd4ce9dd3c3a9c8f2d37773703f26335cc45b27659d5aeb0d35d79e37b44f7
                              • Instruction ID: 19c8dad1ae945c52cf00985d9f9c5ca92f61fca66a11f58615c14e53e089d38f
                              • Opcode Fuzzy Hash: 48cd4ce9dd3c3a9c8f2d37773703f26335cc45b27659d5aeb0d35d79e37b44f7
                              • Instruction Fuzzy Hash: B711487190414AEFCB05DF59E94099A7BF4FF49310F104059F808AB352DA30EA11CBA5
                              APIs
                                • Part of subcall function 007E4C7D: RtlAllocateHeap.NTDLL(00000008,007B1129,00000000,?,007E2E29,00000001,00000364,?,?,?,007DF2DE,007E3863,00881444,?,007CFDF5,?), ref: 007E4CBE
                              • _free.LIBCMT ref: 007E506C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: AllocateHeap_free
                              • String ID:
                              • API String ID: 614378929-0
                              • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                              • Instruction ID: 1b047f7810a48538705bd989243e77eb370b89b13573f9134d7fb08d3f518431
                              • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                              • Instruction Fuzzy Hash: 29012B722057489BE3218E66984595AFBECFB8D374F25061DF184932C0E674A805C674
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                              • Instruction ID: ea18de7b83e1c395e7701adc6edcabc862f7046c42db6bf5be5b3a23b2ee40f7
                              • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                              • Instruction Fuzzy Hash: 35F02D32511A14D6C7323A668C0DB5A33BC9F52334F10071BF525973D2DB7CE80285A6
                              APIs
                              • RtlAllocateHeap.NTDLL(00000008,007B1129,00000000,?,007E2E29,00000001,00000364,?,?,?,007DF2DE,007E3863,00881444,?,007CFDF5,?), ref: 007E4CBE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: AllocateHeap
                              • String ID:
                              • API String ID: 1279760036-0
                              • Opcode ID: c6f8d53a5a609c4af1f35b772a75a4987f4809cc9ef738a78c3cf4a4d8180228
                              • Instruction ID: dbac7ee847919760a726093c3af6e86d14240725c9dfb424580813b2a28b93de
                              • Opcode Fuzzy Hash: c6f8d53a5a609c4af1f35b772a75a4987f4809cc9ef738a78c3cf4a4d8180228
                              • Instruction Fuzzy Hash: 6AF0E9326032A4A7DB315F679D09B5A3798BF457A0B385512F81AA76B1CA3CD80186F0
                              APIs
                              • RtlAllocateHeap.NTDLL(00000000,?,00881444,?,007CFDF5,?,?,007BA976,00000010,00881440,007B13FC,?,007B13C6,?,007B1129), ref: 007E3852
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: AllocateHeap
                              • String ID:
                              • API String ID: 1279760036-0
                              • Opcode ID: 9cdb24ab57ee2d66a88d578fc3cb559b09a81f302ffec679f242f051037c038a
                              • Instruction ID: 9fac118bfbabbf2e9f875c06f57fba4abcd4b713562dcc3be7837c1025fb3c69
                              • Opcode Fuzzy Hash: 9cdb24ab57ee2d66a88d578fc3cb559b09a81f302ffec679f242f051037c038a
                              • Instruction Fuzzy Hash: 26E065321032A4ABE63126A79D0DB9A3759AB867B0F190123BC1597691DB2DDD0182F1
                              APIs
                              • FreeLibrary.KERNEL32(?,?,00881418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007B4F6D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: FreeLibrary
                              • String ID:
                              • API String ID: 3664257935-0
                              • Opcode ID: 39da7279b185725aab6ba2d80a57a8d5b1770773a7b243db8621b95d806bdb3d
                              • Instruction ID: db4ad80747efecfdadd3329c095c3d8defde3b3c0a65fe3ae13450e5a87b7cef
                              • Opcode Fuzzy Hash: 39da7279b185725aab6ba2d80a57a8d5b1770773a7b243db8621b95d806bdb3d
                              • Instruction Fuzzy Hash: D4F03971505752CFDB349F64D494AA2BBF4FF14329328897EE1EA83622C7399844DF10
                              APIs
                              • Shell_NotifyIconW.SHELL32(00000002,?), ref: 007B314E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: IconNotifyShell_
                              • String ID:
                              • API String ID: 1144537725-0
                              • Opcode ID: 62e9eec14f0dde55a2f273c9b18f82b81c6839c8a2e3b72a52ec1084ff2faaa9
                              • Instruction ID: d3a3a4d931ad5432b3029dbc190efe177d839bb227aeda24295183e75ee7da3d
                              • Opcode Fuzzy Hash: 62e9eec14f0dde55a2f273c9b18f82b81c6839c8a2e3b72a52ec1084ff2faaa9
                              • Instruction Fuzzy Hash: 99F037709143189FEB529B28DC4A7D57BBCB701708F0000E5A54896292DB785789CF51
                              APIs
                              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 007B2DC4
                                • Part of subcall function 007B6B57: _wcslen.LIBCMT ref: 007B6B6A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: LongNamePath_wcslen
                              • String ID:
                              • API String ID: 541455249-0
                              • Opcode ID: 6cf9934e50a66d46a1edf6523045a476b49e83081b569989b97c762570c74d9f
                              • Instruction ID: b3f7c9bbff3f365484ad9ca56525ff18cf532009276b01c8933a953149444733
                              • Opcode Fuzzy Hash: 6cf9934e50a66d46a1edf6523045a476b49e83081b569989b97c762570c74d9f
                              • Instruction Fuzzy Hash: 29E0CD766011249BC71092589C09FEA77EDDFC8790F040071FE09D7248DAA4AD80C550
                              APIs
                                • Part of subcall function 007B3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 007B3908
                                • Part of subcall function 007BD730: GetInputState.USER32 ref: 007BD807
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 007B2B6B
                                • Part of subcall function 007B30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 007B314E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: IconNotifyShell_$CurrentDirectoryInputState
                              • String ID:
                              • API String ID: 3667716007-0
                              • Opcode ID: 239cf67fbfeae930ab4691ac15a90aec66e9909731f19716ef892bece4d87d15
                              • Instruction ID: b560895cf7c5647bce0ec895f962b894b6cb2d3b75af866a4e33fb29ee46d7d2
                              • Opcode Fuzzy Hash: 239cf67fbfeae930ab4691ac15a90aec66e9909731f19716ef892bece4d87d15
                              • Instruction Fuzzy Hash: 27E0863130424486CA04BBB4985E7EDA75EABD1751F40153EF24283163DE2D498A8352
                              APIs
                              • CreateFileW.KERNELBASE(00000000,00000000,?,007F0704,?,?,00000000,?,007F0704,00000000,0000000C), ref: 007F03B7
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: 863bca47567c81481c8770c676942e9efd103e18faa43f2b984bc456a4368d84
                              • Instruction ID: 754634fb71f6034882e362a0cc5cb08bfc37607b2adb99d32f34c98cb0075d29
                              • Opcode Fuzzy Hash: 863bca47567c81481c8770c676942e9efd103e18faa43f2b984bc456a4368d84
                              • Instruction Fuzzy Hash: FDD06C3204010DBBDF028F84DD06EDA3BAAFB48714F014000BE1856020C732E821EB90
                              APIs
                              • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 007B1CBC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: InfoParametersSystem
                              • String ID:
                              • API String ID: 3098949447-0
                              • Opcode ID: be112453b1a50494ff87e7b10596b1d32751c5e35702e2d38d76967e7903fee9
                              • Instruction ID: 0d648e9656b78ef6b0d63044c8c3925663222103df78edc5e0dfa631605da1d8
                              • Opcode Fuzzy Hash: be112453b1a50494ff87e7b10596b1d32751c5e35702e2d38d76967e7903fee9
                              • Instruction Fuzzy Hash: 02C0923A2C0304AFF6548B88FC4EF547768B348B00F048001F709A96E3C7A22820EB50
                              APIs
                                • Part of subcall function 007C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007C9BB2
                              • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0084961A
                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0084965B
                              • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0084969F
                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 008496C9
                              • SendMessageW.USER32 ref: 008496F2
                              • GetKeyState.USER32(00000011), ref: 0084978B
                              • GetKeyState.USER32(00000009), ref: 00849798
                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 008497AE
                              • GetKeyState.USER32(00000010), ref: 008497B8
                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 008497E9
                              • SendMessageW.USER32 ref: 00849810
                              • SendMessageW.USER32(?,00001030,?,00847E95), ref: 00849918
                              • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0084992E
                              • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00849941
                              • SetCapture.USER32(?), ref: 0084994A
                              • ClientToScreen.USER32(?,?), ref: 008499AF
                              • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 008499BC
                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 008499D6
                              • ReleaseCapture.USER32 ref: 008499E1
                              • GetCursorPos.USER32(?), ref: 00849A19
                              • ScreenToClient.USER32(?,?), ref: 00849A26
                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00849A80
                              • SendMessageW.USER32 ref: 00849AAE
                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00849AEB
                              • SendMessageW.USER32 ref: 00849B1A
                              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00849B3B
                              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00849B4A
                              • GetCursorPos.USER32(?), ref: 00849B68
                              • ScreenToClient.USER32(?,?), ref: 00849B75
                              • GetParent.USER32(?), ref: 00849B93
                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00849BFA
                              • SendMessageW.USER32 ref: 00849C2B
                              • ClientToScreen.USER32(?,?), ref: 00849C84
                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00849CB4
                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00849CDE
                              • SendMessageW.USER32 ref: 00849D01
                              • ClientToScreen.USER32(?,?), ref: 00849D4E
                              • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00849D82
                                • Part of subcall function 007C9944: GetWindowLongW.USER32(?,000000EB), ref: 007C9952
                              • GetWindowLongW.USER32(?,000000F0), ref: 00849E05
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                              • String ID: @GUI_DRAGID$F
                              • API String ID: 3429851547-4164748364
                              • Opcode ID: 1e8a45da8b3bab601a96c25d6e683745d0a36805c0cca96be036a90e457de754
                              • Instruction ID: a2b2a6dc32ec33dfe7574b9e76dc95a8f42d96c71219bd29a2cc688098abe6ca
                              • Opcode Fuzzy Hash: 1e8a45da8b3bab601a96c25d6e683745d0a36805c0cca96be036a90e457de754
                              • Instruction Fuzzy Hash: 0E427834204209AFDB60CF68CC88EABBBE9FF59314F114619F699C72A1E731A850CF51
                              APIs
                              • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 008448F3
                              • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00844908
                              • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00844927
                              • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 0084494B
                              • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 0084495C
                              • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 0084497B
                              • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 008449AE
                              • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 008449D4
                              • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00844A0F
                              • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00844A56
                              • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00844A7E
                              • IsMenu.USER32(?), ref: 00844A97
                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00844AF2
                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00844B20
                              • GetWindowLongW.USER32(?,000000F0), ref: 00844B94
                              • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00844BE3
                              • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00844C82
                              • wsprintfW.USER32 ref: 00844CAE
                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00844CC9
                              • GetWindowTextW.USER32(?,00000000,00000001), ref: 00844CF1
                              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00844D13
                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00844D33
                              • GetWindowTextW.USER32(?,00000000,00000001), ref: 00844D5A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                              • String ID: %d/%02d/%02d
                              • API String ID: 4054740463-328681919
                              • Opcode ID: a434b73d4d7d42a63076f3e09aa64fd846393f9b66a08f4771d7c56cde1092d4
                              • Instruction ID: 2d76dbcbfb1c467eaede8a8a6eebf3288cd8e3f7bdd12fba6de3ce3e65db71d8
                              • Opcode Fuzzy Hash: a434b73d4d7d42a63076f3e09aa64fd846393f9b66a08f4771d7c56cde1092d4
                              • Instruction Fuzzy Hash: 4B12ED71A00618ABEB249F28CC49FAE7BF8FF45714F105129F916EB2E1DB789941CB50
                              APIs
                              • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 007CF998
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0080F474
                              • IsIconic.USER32(00000000), ref: 0080F47D
                              • ShowWindow.USER32(00000000,00000009), ref: 0080F48A
                              • SetForegroundWindow.USER32(00000000), ref: 0080F494
                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0080F4AA
                              • GetCurrentThreadId.KERNEL32 ref: 0080F4B1
                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0080F4BD
                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 0080F4CE
                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 0080F4D6
                              • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 0080F4DE
                              • SetForegroundWindow.USER32(00000000), ref: 0080F4E1
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0080F4F6
                              • keybd_event.USER32(00000012,00000000), ref: 0080F501
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0080F50B
                              • keybd_event.USER32(00000012,00000000), ref: 0080F510
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0080F519
                              • keybd_event.USER32(00000012,00000000), ref: 0080F51E
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0080F528
                              • keybd_event.USER32(00000012,00000000), ref: 0080F52D
                              • SetForegroundWindow.USER32(00000000), ref: 0080F530
                              • AttachThreadInput.USER32(?,000000FF,00000000), ref: 0080F557
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                              • String ID: Shell_TrayWnd
                              • API String ID: 4125248594-2988720461
                              • Opcode ID: 41aaca6f352644f508968b125e64c89777d2f0a14f8677a0544ec519bbcc793c
                              • Instruction ID: 8f1286e31ad4cc59d2319fa426ea0de351e031c5736c12bdc7ecc7a262a87d08
                              • Opcode Fuzzy Hash: 41aaca6f352644f508968b125e64c89777d2f0a14f8677a0544ec519bbcc793c
                              • Instruction Fuzzy Hash: BC315E75A41218BBEB706BB55C4AFBF7E6CFB45B50F114029FA05E61D2C6B06D00EAA0
                              APIs
                                • Part of subcall function 008116C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0081170D
                                • Part of subcall function 008116C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0081173A
                                • Part of subcall function 008116C3: GetLastError.KERNEL32 ref: 0081174A
                              • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00811286
                              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 008112A8
                              • CloseHandle.KERNEL32(?), ref: 008112B9
                              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 008112D1
                              • GetProcessWindowStation.USER32 ref: 008112EA
                              • SetProcessWindowStation.USER32(00000000), ref: 008112F4
                              • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00811310
                                • Part of subcall function 008110BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,008111FC), ref: 008110D4
                                • Part of subcall function 008110BF: CloseHandle.KERNEL32(?,?,008111FC), ref: 008110E9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                              • String ID: $default$winsta0
                              • API String ID: 22674027-1027155976
                              • Opcode ID: 073a010d8cd6413368c564edc700e770aff1bb55a93fb4eadf82d03e7ce55c74
                              • Instruction ID: c7241843eba24ea5ca14d90ddefd302ada9300f71624874dfec6e8beff8b884e
                              • Opcode Fuzzy Hash: 073a010d8cd6413368c564edc700e770aff1bb55a93fb4eadf82d03e7ce55c74
                              • Instruction Fuzzy Hash: 9F818D71900209ABDF109FA8DC4DBEE7BBEFF05B04F144129FA10E62A0D7758984CB25
                              APIs
                                • Part of subcall function 008110F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00811114
                                • Part of subcall function 008110F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00810B9B,?,?,?), ref: 00811120
                                • Part of subcall function 008110F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00810B9B,?,?,?), ref: 0081112F
                                • Part of subcall function 008110F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00810B9B,?,?,?), ref: 00811136
                                • Part of subcall function 008110F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0081114D
                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00810BCC
                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00810C00
                              • GetLengthSid.ADVAPI32(?), ref: 00810C17
                              • GetAce.ADVAPI32(?,00000000,?), ref: 00810C51
                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00810C6D
                              • GetLengthSid.ADVAPI32(?), ref: 00810C84
                              • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00810C8C
                              • HeapAlloc.KERNEL32(00000000), ref: 00810C93
                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00810CB4
                              • CopySid.ADVAPI32(00000000), ref: 00810CBB
                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00810CEA
                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00810D0C
                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00810D1E
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00810D45
                              • HeapFree.KERNEL32(00000000), ref: 00810D4C
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00810D55
                              • HeapFree.KERNEL32(00000000), ref: 00810D5C
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00810D65
                              • HeapFree.KERNEL32(00000000), ref: 00810D6C
                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00810D78
                              • HeapFree.KERNEL32(00000000), ref: 00810D7F
                                • Part of subcall function 00811193: GetProcessHeap.KERNEL32(00000008,00810BB1,?,00000000,?,00810BB1,?), ref: 008111A1
                                • Part of subcall function 00811193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00810BB1,?), ref: 008111A8
                                • Part of subcall function 00811193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00810BB1,?), ref: 008111B7
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                              • String ID:
                              • API String ID: 4175595110-0
                              • Opcode ID: d1799a26887fade3429e3cdb037bee204b548328eb4c2cd62acf4434b849098c
                              • Instruction ID: 8b09cbb75c6769ae384a2d5dc96db1eb726c9f5735e92be48380aaf8011057e9
                              • Opcode Fuzzy Hash: d1799a26887fade3429e3cdb037bee204b548328eb4c2cd62acf4434b849098c
                              • Instruction Fuzzy Hash: A4715CB690120AABDF10DFA4EC48BEEBBBCFF05300F144615E915E6191D7B5A985CFA0
                              APIs
                              • OpenClipboard.USER32(0084CC08), ref: 0082EB29
                              • IsClipboardFormatAvailable.USER32(0000000D), ref: 0082EB37
                              • GetClipboardData.USER32(0000000D), ref: 0082EB43
                              • CloseClipboard.USER32 ref: 0082EB4F
                              • GlobalLock.KERNEL32(00000000), ref: 0082EB87
                              • CloseClipboard.USER32 ref: 0082EB91
                              • GlobalUnlock.KERNEL32(00000000), ref: 0082EBBC
                              • IsClipboardFormatAvailable.USER32(00000001), ref: 0082EBC9
                              • GetClipboardData.USER32(00000001), ref: 0082EBD1
                              • GlobalLock.KERNEL32(00000000), ref: 0082EBE2
                              • GlobalUnlock.KERNEL32(00000000), ref: 0082EC22
                              • IsClipboardFormatAvailable.USER32(0000000F), ref: 0082EC38
                              • GetClipboardData.USER32(0000000F), ref: 0082EC44
                              • GlobalLock.KERNEL32(00000000), ref: 0082EC55
                              • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0082EC77
                              • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0082EC94
                              • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0082ECD2
                              • GlobalUnlock.KERNEL32(00000000), ref: 0082ECF3
                              • CountClipboardFormats.USER32 ref: 0082ED14
                              • CloseClipboard.USER32 ref: 0082ED59
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                              • String ID:
                              • API String ID: 420908878-0
                              • Opcode ID: 1d98e9f0f2eff1943ea2fc5d60627db7539f5ec9868f9768dbc750fd3e35d347
                              • Instruction ID: 70d26ad48a605bd91c8d96eeaf04639676e02377722b521ce965b4de1a8722eb
                              • Opcode Fuzzy Hash: 1d98e9f0f2eff1943ea2fc5d60627db7539f5ec9868f9768dbc750fd3e35d347
                              • Instruction Fuzzy Hash: 3C61EE38204301AFD300EF24E888F6ABBA8FF85714F14441DF956D72A2CB75E985CB66
                              APIs
                              • FindFirstFileW.KERNEL32(?,?), ref: 008269BE
                              • FindClose.KERNEL32(00000000), ref: 00826A12
                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00826A4E
                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00826A75
                                • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00826AB2
                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00826ADF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                              • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                              • API String ID: 3830820486-3289030164
                              • Opcode ID: daa5dd59ef565ac3564eae9c7c897fad44d51b0add3f2f8fc8d83dd560099b59
                              • Instruction ID: ed90acc4aeb2a21a10b72b3fc399f026b19da73d77c2113dcdb23d7b4317ce26
                              • Opcode Fuzzy Hash: daa5dd59ef565ac3564eae9c7c897fad44d51b0add3f2f8fc8d83dd560099b59
                              • Instruction Fuzzy Hash: FCD15172508350EFC314EBA4D885EABB7ECBF88704F04491DF699D6191EB78DA44CB62
                              APIs
                              • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 00829663
                              • GetFileAttributesW.KERNEL32(?), ref: 008296A1
                              • SetFileAttributesW.KERNEL32(?,?), ref: 008296BB
                              • FindNextFileW.KERNEL32(00000000,?), ref: 008296D3
                              • FindClose.KERNEL32(00000000), ref: 008296DE
                              • FindFirstFileW.KERNEL32(*.*,?), ref: 008296FA
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0082974A
                              • SetCurrentDirectoryW.KERNEL32(00876B7C), ref: 00829768
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00829772
                              • FindClose.KERNEL32(00000000), ref: 0082977F
                              • FindClose.KERNEL32(00000000), ref: 0082978F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                              • String ID: *.*
                              • API String ID: 1409584000-438819550
                              • Opcode ID: dd0f80fcafb6b06a82d5abcade86095e01ae9253bfbadce2d238f0f4904a830e
                              • Instruction ID: a4eabb6f3b957525a1e0d0f1fca76b82c4190295822f59410e6870ee7d641fc0
                              • Opcode Fuzzy Hash: dd0f80fcafb6b06a82d5abcade86095e01ae9253bfbadce2d238f0f4904a830e
                              • Instruction Fuzzy Hash: 4A31D3365016296FDB10AFB4EC48ADE77BCFF0A320F144156F955E2190EB74DD84CA14
                              APIs
                              • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 008297BE
                              • FindNextFileW.KERNEL32(00000000,?), ref: 00829819
                              • FindClose.KERNEL32(00000000), ref: 00829824
                              • FindFirstFileW.KERNEL32(*.*,?), ref: 00829840
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00829890
                              • SetCurrentDirectoryW.KERNEL32(00876B7C), ref: 008298AE
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 008298B8
                              • FindClose.KERNEL32(00000000), ref: 008298C5
                              • FindClose.KERNEL32(00000000), ref: 008298D5
                                • Part of subcall function 0081DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 0081DB00
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                              • String ID: *.*
                              • API String ID: 2640511053-438819550
                              • Opcode ID: a748d0f29ed6b0314ecff41715ab36c61ab2c75d1eaf524cbb939a85339f79de
                              • Instruction ID: 7e0e3106991e1674fe1058e4c1251df1acec521ed94aa7b3b2f577fc8bdef7eb
                              • Opcode Fuzzy Hash: a748d0f29ed6b0314ecff41715ab36c61ab2c75d1eaf524cbb939a85339f79de
                              • Instruction Fuzzy Hash: B531C3315016296FDB14EFB4EC48ADE77BCFF06330F184166E994E2290EB75D984CA24
                              APIs
                                • Part of subcall function 0083C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0083B6AE,?,?), ref: 0083C9B5
                                • Part of subcall function 0083C998: _wcslen.LIBCMT ref: 0083C9F1
                                • Part of subcall function 0083C998: _wcslen.LIBCMT ref: 0083CA68
                                • Part of subcall function 0083C998: _wcslen.LIBCMT ref: 0083CA9E
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0083BF3E
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 0083BFA9
                              • RegCloseKey.ADVAPI32(00000000), ref: 0083BFCD
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0083C02C
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 0083C0E7
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0083C154
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0083C1E9
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 0083C23A
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0083C2E3
                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0083C382
                              • RegCloseKey.ADVAPI32(00000000), ref: 0083C38F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                              • String ID:
                              • API String ID: 3102970594-0
                              • Opcode ID: bfa82da31a739400e8d03d4bc6d023aa8d880ea7d81e262c09b08af62245697b
                              • Instruction ID: 5e2dfdf008dbd6dfe70dcdf02a6c6d47944671222260474cea57d0a48a30e435
                              • Opcode Fuzzy Hash: bfa82da31a739400e8d03d4bc6d023aa8d880ea7d81e262c09b08af62245697b
                              • Instruction Fuzzy Hash: A8020B716042009FD714DF28C895E2ABBE5FF89318F18849DF84ADB2A2DB35ED45CB91
                              APIs
                              • GetLocalTime.KERNEL32(?), ref: 00828257
                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00828267
                              • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00828273
                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00828310
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00828324
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00828356
                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0082838C
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00828395
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CurrentDirectoryTime$File$Local$System
                              • String ID: *.*
                              • API String ID: 1464919966-438819550
                              • Opcode ID: f367a6cad3911eea264db868a3cc08a5596261d8784aac0b1990c7e6ae2c03b7
                              • Instruction ID: dea6c7f11a398fcb72b7037e5e2bc77df8fc9faa8ef28f06cf2e392f1f438c6f
                              • Opcode Fuzzy Hash: f367a6cad3911eea264db868a3cc08a5596261d8784aac0b1990c7e6ae2c03b7
                              • Instruction Fuzzy Hash: 99614972504315DFCB10EF64D848AAEB3E8FF89314F04891AF999C7251EB35E985CB92
                              APIs
                                • Part of subcall function 007B3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007B3A97,?,?,007B2E7F,?,?,?,00000000), ref: 007B3AC2
                                • Part of subcall function 0081E199: GetFileAttributesW.KERNEL32(?,0081CF95), ref: 0081E19A
                              • FindFirstFileW.KERNEL32(?,?), ref: 0081D122
                              • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 0081D1DD
                              • MoveFileW.KERNEL32(?,?), ref: 0081D1F0
                              • DeleteFileW.KERNEL32(?,?,?,?), ref: 0081D20D
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 0081D237
                                • Part of subcall function 0081D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,0081D21C,?,?), ref: 0081D2B2
                              • FindClose.KERNEL32(00000000,?,?,?), ref: 0081D253
                              • FindClose.KERNEL32(00000000), ref: 0081D264
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                              • String ID: \*.*
                              • API String ID: 1946585618-1173974218
                              • Opcode ID: 161cfc07d4372b4f91d790e984c96cab9b67171a26ec4324f677fbaa3a429048
                              • Instruction ID: e49f302a25271c7ac3816de4f1782a724c02ec216c230a78ba32f49f66f75e14
                              • Opcode Fuzzy Hash: 161cfc07d4372b4f91d790e984c96cab9b67171a26ec4324f677fbaa3a429048
                              • Instruction Fuzzy Hash: 4A617B3180120DABCF05EBE4D996AEDB7B9FF15300F204165E512B7191EB34AF89CB61
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                              • String ID:
                              • API String ID: 1737998785-0
                              • Opcode ID: 3bcd0783a50432ccf3d0753468cd39f40426e13fffae51f504e4fffc7c0f9ee6
                              • Instruction ID: 3ff1f48c32f14d47a0e6de395c9607a1fd91ef17d9bb7008202ec32c13f61d73
                              • Opcode Fuzzy Hash: 3bcd0783a50432ccf3d0753468cd39f40426e13fffae51f504e4fffc7c0f9ee6
                              • Instruction Fuzzy Hash: FC419D39205621AFD720DF19E888B29BBE5FF45318F15C099E419CB762C779EC81CB94
                              APIs
                                • Part of subcall function 008116C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0081170D
                                • Part of subcall function 008116C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0081173A
                                • Part of subcall function 008116C3: GetLastError.KERNEL32 ref: 0081174A
                              • ExitWindowsEx.USER32(?,00000000), ref: 0081E932
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                              • String ID: $ $@$SeShutdownPrivilege
                              • API String ID: 2234035333-3163812486
                              • Opcode ID: cb0c26ebf1a2fffccbd555dfa1ff09c2477707705d2a957453906c707ef07568
                              • Instruction ID: f05e902cbe1d76b5fab7efaa79a9f1252d2d62bb1f6d34d90c7d2a4b6a704466
                              • Opcode Fuzzy Hash: cb0c26ebf1a2fffccbd555dfa1ff09c2477707705d2a957453906c707ef07568
                              • Instruction Fuzzy Hash: 2A014932A10315ABEB5426B8AC8AFFF765CFF18744F150422FD13E21D1D6A55CC085A0
                              APIs
                              • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00831276
                              • WSAGetLastError.WSOCK32 ref: 00831283
                              • bind.WSOCK32(00000000,?,00000010), ref: 008312BA
                              • WSAGetLastError.WSOCK32 ref: 008312C5
                              • closesocket.WSOCK32(00000000), ref: 008312F4
                              • listen.WSOCK32(00000000,00000005), ref: 00831303
                              • WSAGetLastError.WSOCK32 ref: 0083130D
                              • closesocket.WSOCK32(00000000), ref: 0083133C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ErrorLast$closesocket$bindlistensocket
                              • String ID:
                              • API String ID: 540024437-0
                              • Opcode ID: 29a7206ac2e6b3cc96c30922d75d707f2dd61475ed1625ae6a819706081f3637
                              • Instruction ID: 1d610b6c898d3fec574b7a19f6f0ba50f2cf742c680a281f7d56ebe111381221
                              • Opcode Fuzzy Hash: 29a7206ac2e6b3cc96c30922d75d707f2dd61475ed1625ae6a819706081f3637
                              • Instruction Fuzzy Hash: 02417F356001009FDB10DF64C488B6ABBE5FF86718F188198E856DF296C775ED81CBE1
                              APIs
                              • _free.LIBCMT ref: 007EB9D4
                              • _free.LIBCMT ref: 007EB9F8
                              • _free.LIBCMT ref: 007EBB7F
                              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00853700), ref: 007EBB91
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,0088121C,000000FF,00000000,0000003F,00000000,?,?), ref: 007EBC09
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00881270,000000FF,?,0000003F,00000000,?), ref: 007EBC36
                              • _free.LIBCMT ref: 007EBD4B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _free$ByteCharMultiWide$InformationTimeZone
                              • String ID:
                              • API String ID: 314583886-0
                              • Opcode ID: 088f08c97735b6106ca4b38b2fd0c755e2f0034dd87e3d1044ee174c8d939098
                              • Instruction ID: bf3842e2f914cb4fbedbc1a8f5c37f160dd92f843a3ba5b27b6454c23c9e57f0
                              • Opcode Fuzzy Hash: 088f08c97735b6106ca4b38b2fd0c755e2f0034dd87e3d1044ee174c8d939098
                              • Instruction Fuzzy Hash: 89C12971906285DFCF20DF7A8C45AAB7FB9EF49310F1441AAE494D7252DB389E42CB90
                              APIs
                                • Part of subcall function 007B3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007B3A97,?,?,007B2E7F,?,?,?,00000000), ref: 007B3AC2
                                • Part of subcall function 0081E199: GetFileAttributesW.KERNEL32(?,0081CF95), ref: 0081E19A
                              • FindFirstFileW.KERNEL32(?,?), ref: 0081D420
                              • DeleteFileW.KERNEL32(?,?,?,?), ref: 0081D470
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 0081D481
                              • FindClose.KERNEL32(00000000), ref: 0081D498
                              • FindClose.KERNEL32(00000000), ref: 0081D4A1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                              • String ID: \*.*
                              • API String ID: 2649000838-1173974218
                              • Opcode ID: 668c281f38bdd11c30c64302713d9bd508da6a8178a1e134c198521e0c9b8287
                              • Instruction ID: 46a68ffa8539213f2c77d5263a435ddde62a08f5216d3627c91567542c066943
                              • Opcode Fuzzy Hash: 668c281f38bdd11c30c64302713d9bd508da6a8178a1e134c198521e0c9b8287
                              • Instruction Fuzzy Hash: 3A319C71009355ABC300EF64C899AEFB7ECBE92304F444A1DF5E593191EB34AA49CB67
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: __floor_pentium4
                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                              • API String ID: 4168288129-2761157908
                              • Opcode ID: bc57be55b44c0240b66c3747f25bed99f292ed244f8c71cab34a3e7298901e05
                              • Instruction ID: ff0a9df85205f84eb1eb104872bac5011a686f8a6c19bdb6e1503f1d18d1af3d
                              • Opcode Fuzzy Hash: bc57be55b44c0240b66c3747f25bed99f292ed244f8c71cab34a3e7298901e05
                              • Instruction Fuzzy Hash: B0C27B72E066688FDB25CF29CD407EAB7B5EB48305F1445EAD84DE7241E778AE818F40
                              APIs
                              • _wcslen.LIBCMT ref: 008264DC
                              • CoInitialize.OLE32(00000000), ref: 00826639
                              • CoCreateInstance.OLE32(0084FCF8,00000000,00000001,0084FB68,?), ref: 00826650
                              • CoUninitialize.OLE32 ref: 008268D4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CreateInitializeInstanceUninitialize_wcslen
                              • String ID: .lnk
                              • API String ID: 886957087-24824748
                              • Opcode ID: f893096d4e7322b891f1f0eef19796161fb3015edb03fc595b929e2a869b9737
                              • Instruction ID: 4677cc5c1f57fbde6181ca4938c1c62aecb4db10334f93fadb96429c1f53431a
                              • Opcode Fuzzy Hash: f893096d4e7322b891f1f0eef19796161fb3015edb03fc595b929e2a869b9737
                              • Instruction Fuzzy Hash: C8D15871508211AFC304EF24C885AABB7E8FF98704F14496DF595CB2A1EB34ED45CBA2
                              APIs
                              • GetForegroundWindow.USER32(?,?,00000000), ref: 008322E8
                                • Part of subcall function 0082E4EC: GetWindowRect.USER32(?,?), ref: 0082E504
                              • GetDesktopWindow.USER32 ref: 00832312
                              • GetWindowRect.USER32(00000000), ref: 00832319
                              • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00832355
                              • GetCursorPos.USER32(?), ref: 00832381
                              • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 008323DF
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Window$Rectmouse_event$CursorDesktopForeground
                              • String ID:
                              • API String ID: 2387181109-0
                              • Opcode ID: f06ed5bdcac63c6205850c3c8191deb3677bd4343c5f01638555030887f8093e
                              • Instruction ID: 946e2557c38b3416bf38cb2bbc364231dc1a472b907eadae8f6ae49a9e72cdea
                              • Opcode Fuzzy Hash: f06ed5bdcac63c6205850c3c8191deb3677bd4343c5f01638555030887f8093e
                              • Instruction Fuzzy Hash: 6C31EB72505315ABD720DF18C848A9BBBADFFC9314F000A19F985D7291DB34EA08CBD2
                              APIs
                                • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                              • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00829B78
                              • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00829C8B
                                • Part of subcall function 00823874: GetInputState.USER32 ref: 008238CB
                                • Part of subcall function 00823874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00823966
                              • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00829BA8
                              • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00829C75
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                              • String ID: *.*
                              • API String ID: 1972594611-438819550
                              • Opcode ID: 8d6dd3521b0e469653de16e939843667445395c3c7d063fb045469a66e6013e0
                              • Instruction ID: 4a4664865148f167111ad4607857d5179e4b70d8b033192ae8a2877702140989
                              • Opcode Fuzzy Hash: 8d6dd3521b0e469653de16e939843667445395c3c7d063fb045469a66e6013e0
                              • Instruction Fuzzy Hash: 3F418E7190021AAFDF55DF64D889AEEBBB8FF05310F24405AE855E2291EB349E84CF60
                              APIs
                                • Part of subcall function 007C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007C9BB2
                              • DefDlgProcW.USER32(?,?,?,?,?), ref: 007C9A4E
                              • GetSysColor.USER32(0000000F), ref: 007C9B23
                              • SetBkColor.GDI32(?,00000000), ref: 007C9B36
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Color$LongProcWindow
                              • String ID:
                              • API String ID: 3131106179-0
                              • Opcode ID: 25d334b42d0d155e1977b6d2f3a241c4b62233b5837774586cd6a0791387cd1b
                              • Instruction ID: 250f5027b649dc180fd2d61af20620e28a309c606707483054bb19aef8032d35
                              • Opcode Fuzzy Hash: 25d334b42d0d155e1977b6d2f3a241c4b62233b5837774586cd6a0791387cd1b
                              • Instruction Fuzzy Hash: 27A127B1609444BEE7B5AA2C8C4DF7F2B9DFB42340B15811DF212D66D1CA29AD01D376
                              APIs
                                • Part of subcall function 0083304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0083307A
                                • Part of subcall function 0083304E: _wcslen.LIBCMT ref: 0083309B
                              • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0083185D
                              • WSAGetLastError.WSOCK32 ref: 00831884
                              • bind.WSOCK32(00000000,?,00000010), ref: 008318DB
                              • WSAGetLastError.WSOCK32 ref: 008318E6
                              • closesocket.WSOCK32(00000000), ref: 00831915
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                              • String ID:
                              • API String ID: 1601658205-0
                              • Opcode ID: d643066a3f3dfbbcfcfef5ab8d7823a607e92763bd3d5455d51584a6bad5b97c
                              • Instruction ID: 908772a10ccc822ab6519cbdc44b03cba4dc68ec11ef0de54987b4f9a4fd0b4f
                              • Opcode Fuzzy Hash: d643066a3f3dfbbcfcfef5ab8d7823a607e92763bd3d5455d51584a6bad5b97c
                              • Instruction Fuzzy Hash: BC519175A00200AFDB10AF24C88AF6A77E5EB85718F08849CF9069F393C775AD41CBE1
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Window$EnabledForegroundIconicVisibleZoomed
                              • String ID:
                              • API String ID: 292994002-0
                              • Opcode ID: eaa3a7f3fcdbe3e69c1735bdcd48ac49dffe81db14292d2135ea042a598253d6
                              • Instruction ID: b6cf2a1207dfd86d62ba0327f0e5ecbda89ab54a4ea887ae4226030dd16777e2
                              • Opcode Fuzzy Hash: eaa3a7f3fcdbe3e69c1735bdcd48ac49dffe81db14292d2135ea042a598253d6
                              • Instruction Fuzzy Hash: 5C21D3317412159FDB208F1ADC88B6A7BE9FF95315B198058E84ACB351C775DC82CB90
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                              • API String ID: 0-1546025612
                              • Opcode ID: 4e26d3e98fa97253bf5ee3e623b83e6f72ca883769504f5c79c6217fe26746d2
                              • Instruction ID: a935b0329c206711c9a0025703c797e44efb9536168389ab3c51ab5513a98be9
                              • Opcode Fuzzy Hash: 4e26d3e98fa97253bf5ee3e623b83e6f72ca883769504f5c79c6217fe26746d2
                              • Instruction Fuzzy Hash: 8CA24A70A0021ECBDF64CF58C8407FDB7B5BB54314F2481AAEA15AB385EB789D81DB91
                              APIs
                              • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 0081AAAC
                              • SetKeyboardState.USER32(00000080), ref: 0081AAC8
                              • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 0081AB36
                              • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 0081AB88
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: KeyboardState$InputMessagePostSend
                              • String ID:
                              • API String ID: 432972143-0
                              • Opcode ID: 595f3f1a9d7b8a444da205aa039bcf3af491694b3e74a3d8ac1a3cd6b893f401
                              • Instruction ID: c888791674a9e236ec8f1967d991f9ed7eb46355b3642917957b297c6a71b242
                              • Opcode Fuzzy Hash: 595f3f1a9d7b8a444da205aa039bcf3af491694b3e74a3d8ac1a3cd6b893f401
                              • Instruction Fuzzy Hash: 66312570A46288AEEB38CA68CC05BFA7BAEFF55330F04421AF081D21D1D37589C1C762
                              APIs
                              • InternetReadFile.WININET(?,?,00000400,?), ref: 0082CE89
                              • GetLastError.KERNEL32(?,00000000), ref: 0082CEEA
                              • SetEvent.KERNEL32(?,?,00000000), ref: 0082CEFE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ErrorEventFileInternetLastRead
                              • String ID:
                              • API String ID: 234945975-0
                              • Opcode ID: 178b6b28b62f1882852aed5dcf1e4e69b92e8834a4f05b4c9d982a0236625ccb
                              • Instruction ID: 6f6587535dbbc486be53583dfd6afe318078846b70efbf08eff17e4576e6b68f
                              • Opcode Fuzzy Hash: 178b6b28b62f1882852aed5dcf1e4e69b92e8834a4f05b4c9d982a0236625ccb
                              • Instruction Fuzzy Hash: 9221BDB5500715EBDB20DFA5E948BAABBFCFB10358F10441EE546D2251EBB4EE84CB60
                              APIs
                              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 008182AA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: lstrlen
                              • String ID: ($|
                              • API String ID: 1659193697-1631851259
                              • Opcode ID: d6ae90395ee45484e27afbd9b5a1d75dd5731fabd0038ce3bcbf77aa9f396867
                              • Instruction ID: 5eaab2fcd789cc79e39935a399d08f09eba5375629fe6b5693ed5cfe750dcbfb
                              • Opcode Fuzzy Hash: d6ae90395ee45484e27afbd9b5a1d75dd5731fabd0038ce3bcbf77aa9f396867
                              • Instruction Fuzzy Hash: F2323674A00605DFC728CF59C481AAAB7F4FF48710B15C56EE59ADB3A1EB70E981CB40
                              APIs
                              • FindFirstFileW.KERNEL32(?,?), ref: 00825CC1
                              • FindNextFileW.KERNEL32(00000000,?), ref: 00825D17
                              • FindClose.KERNEL32(?), ref: 00825D5F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Find$File$CloseFirstNext
                              • String ID:
                              • API String ID: 3541575487-0
                              • Opcode ID: 5feb721cd0d2887cc0e539f5560e984ec56bd50ed11870745d78fa531f533505
                              • Instruction ID: 6df17040c9e66a1c8680cb9c55f272c90e0555d0cbd79a566c0745b7dcbe5cce
                              • Opcode Fuzzy Hash: 5feb721cd0d2887cc0e539f5560e984ec56bd50ed11870745d78fa531f533505
                              • Instruction Fuzzy Hash: B751A835600A019FC314CF28D498A9AB7E4FF09324F14856EE95ACB3A2DB30ED44CB91
                              APIs
                              • IsDebuggerPresent.KERNEL32 ref: 007E271A
                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 007E2724
                              • UnhandledExceptionFilter.KERNEL32(?), ref: 007E2731
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                              • String ID:
                              • API String ID: 3906539128-0
                              • Opcode ID: f68e90561578566727a515d9ac1b0daa53820a25b9be3f7011eae8c659cc66e2
                              • Instruction ID: 5d86e878b77766ebb493418cda938315fa509f17597ee868deb348b428ef05e6
                              • Opcode Fuzzy Hash: f68e90561578566727a515d9ac1b0daa53820a25b9be3f7011eae8c659cc66e2
                              • Instruction Fuzzy Hash: E731B5749112189BCB21DF65DC8979DB7B8BF08310F5051EAE41CA7261E7749F818F45
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 008251DA
                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00825238
                              • SetErrorMode.KERNEL32(00000000), ref: 008252A1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ErrorMode$DiskFreeSpace
                              • String ID:
                              • API String ID: 1682464887-0
                              • Opcode ID: 2b0692dae3f1f9ce0686b25e9d852877d35d938df9b19c9199f5fa9b128b322b
                              • Instruction ID: c4de5d7ea6e1350daeb794baad217fa1f8004e41ff578703a452271caeb71127
                              • Opcode Fuzzy Hash: 2b0692dae3f1f9ce0686b25e9d852877d35d938df9b19c9199f5fa9b128b322b
                              • Instruction Fuzzy Hash: 59314C75A00618DFDB00DF54D888FADBBB4FF49314F188099E805AB3A2DB35E855CBA0
                              APIs
                                • Part of subcall function 007CFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 007D0668
                                • Part of subcall function 007CFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 007D0685
                              • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0081170D
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0081173A
                              • GetLastError.KERNEL32 ref: 0081174A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                              • String ID:
                              • API String ID: 577356006-0
                              • Opcode ID: 50856e4cb6f92fd103d5feed840faf669c81d331df949d81e1a9d95938f58e95
                              • Instruction ID: f7cd3a7242af2bcf2d2a55666ae5422cc402c3e67f6dbe3de8abae2f4addbac2
                              • Opcode Fuzzy Hash: 50856e4cb6f92fd103d5feed840faf669c81d331df949d81e1a9d95938f58e95
                              • Instruction Fuzzy Hash: 551191B2514309AFD7189F54DC8AEAAB7FDFF44714B20852EE05697291EB70BC81CA60
                              APIs
                              • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0081D608
                              • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 0081D645
                              • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0081D650
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CloseControlCreateDeviceFileHandle
                              • String ID:
                              • API String ID: 33631002-0
                              • Opcode ID: 319d748bb5250c71a25b3e58894f324e38fe24736270b03d370dfbf4277e347b
                              • Instruction ID: f3f2bb63242efa200f1e517f08d0b503c876247f0c0a7397c7dc75484ce963fd
                              • Opcode Fuzzy Hash: 319d748bb5250c71a25b3e58894f324e38fe24736270b03d370dfbf4277e347b
                              • Instruction Fuzzy Hash: 6D113C75E05228BBDB208F95AC45FAFBBBCFB45B50F108115F904E7290D6B05A058BA1
                              APIs
                              • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0081168C
                              • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 008116A1
                              • FreeSid.ADVAPI32(?), ref: 008116B1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: AllocateCheckFreeInitializeMembershipToken
                              • String ID:
                              • API String ID: 3429775523-0
                              • Opcode ID: 94dff07213445ce5295e3b454c0b67d7a673cc707522e444821643eb7e9a5e2f
                              • Instruction ID: 08d28467e565838e88e6f329e6d717e97354cf708979bf115c6e85bb70eed289
                              • Opcode Fuzzy Hash: 94dff07213445ce5295e3b454c0b67d7a673cc707522e444821643eb7e9a5e2f
                              • Instruction Fuzzy Hash: 03F0F475A51309FBDF00DFE49C89AAEBBBCFB08605F504965E501E2181E774AA448A54
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID: /
                              • API String ID: 0-2043925204
                              • Opcode ID: 97a8cb5fda1f528699f0efced1df946fd4cc518700aca505c859c49021cc4993
                              • Instruction ID: 90f0f585f92183b0f94834e227ebc3523812ce1db67b3bbd9fc6fc702d91056b
                              • Opcode Fuzzy Hash: 97a8cb5fda1f528699f0efced1df946fd4cc518700aca505c859c49021cc4993
                              • Instruction Fuzzy Hash: 4041287A501259ABCB209FBACC4DDBB777CEB88314F1042A9F915D7280E6749D828B50
                              APIs
                              • GetUserNameW.ADVAPI32(?,?), ref: 0080D28C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: NameUser
                              • String ID: X64
                              • API String ID: 2645101109-893830106
                              • Opcode ID: 8998da5bf2991af5f2767e73466c3d83431398e75e884cddccf48fd72909cc2b
                              • Instruction ID: cc6a150767ee1976015c787b84510d26dad30c984967cd4fba8fc478e37ba1a9
                              • Opcode Fuzzy Hash: 8998da5bf2991af5f2767e73466c3d83431398e75e884cddccf48fd72909cc2b
                              • Instruction Fuzzy Hash: 6DD0C9B480211DEBCB90CB90DC88DD9B37CBB14305F100155F106E2040D77495488F10
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                              • Instruction ID: 887e2f7fe43384356b54a913814697f260e245b0739f1c841e5ba9d30cee4775
                              • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                              • Instruction Fuzzy Hash: 01022E72E0011A9FDF15CFA9C9806ADFBF1EF48314F25826AD919E7384D735A941CB90
                              APIs
                              • FindFirstFileW.KERNEL32(?,?), ref: 00826918
                              • FindClose.KERNEL32(00000000), ref: 00826961
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID:
                              • API String ID: 2295610775-0
                              • Opcode ID: d4008379dc71207df22c81a74ea5ca8931991878c9caed257a498b8bf5e93bb0
                              • Instruction ID: 8d9f7b6728609dea5a29e02c43d6058468cee4ae1b73bef59749d778be6a30b3
                              • Opcode Fuzzy Hash: d4008379dc71207df22c81a74ea5ca8931991878c9caed257a498b8bf5e93bb0
                              • Instruction Fuzzy Hash: 6E11D0356042109FC710CF29D488A26BBE4FF85328F04C699F4698F2A2DB74EC85CB90
                              APIs
                              • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00834891,?,?,00000035,?), ref: 008237E4
                              • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00834891,?,?,00000035,?), ref: 008237F4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ErrorFormatLastMessage
                              • String ID:
                              • API String ID: 3479602957-0
                              • Opcode ID: bf92905cec17bc47c5f5f396646061b3c8abd7085f8e20571bffa2964c115564
                              • Instruction ID: 0240b8c5be96d6e16e1d173495479ba12d2fcb4ac3bf872b37bc19bf9cff9491
                              • Opcode Fuzzy Hash: bf92905cec17bc47c5f5f396646061b3c8abd7085f8e20571bffa2964c115564
                              • Instruction Fuzzy Hash: 8CF0E5B46052286BEB6017B69C4DFEB3AAEFFC5761F000275F609D2291D9A09944C6B0
                              APIs
                              • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 0081B25D
                              • keybd_event.USER32(?,7694C0D0,?,00000000), ref: 0081B270
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: InputSendkeybd_event
                              • String ID:
                              • API String ID: 3536248340-0
                              • Opcode ID: 5db047f0597291159f2de79dea8ca5d0c18c9bf2f3ff2f60f4c04fb9cef8336a
                              • Instruction ID: 7c6ee300b6d925419e4cad1608e8953ad65c99901dd41ff6ae06468f9a391c97
                              • Opcode Fuzzy Hash: 5db047f0597291159f2de79dea8ca5d0c18c9bf2f3ff2f60f4c04fb9cef8336a
                              • Instruction Fuzzy Hash: 44F01D7590424DABDB159FA4C805BEE7BB4FF05309F008009F955E6191C3798655DF94
                              APIs
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,008111FC), ref: 008110D4
                              • CloseHandle.KERNEL32(?,?,008111FC), ref: 008110E9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: AdjustCloseHandlePrivilegesToken
                              • String ID:
                              • API String ID: 81990902-0
                              • Opcode ID: 9f9bc9eaab1739dff13e06fd615a3a06063805aa8d1c0fcd18f1cf4bb6eb6b50
                              • Instruction ID: da4ea6254f5ed1069c50aabcededfb4646f32e9f73926cff854c1498d39e5e1c
                              • Opcode Fuzzy Hash: 9f9bc9eaab1739dff13e06fd615a3a06063805aa8d1c0fcd18f1cf4bb6eb6b50
                              • Instruction Fuzzy Hash: E1E0BF76115A10EEE7652F51FC09F7777ADFF05310B14882EF5A6804B1DB626C90DB50
                              Strings
                              • Variable is not of type 'Object'., xrefs: 00800C40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID: Variable is not of type 'Object'.
                              • API String ID: 0-1840281001
                              • Opcode ID: 0737545edb8471297625bae86863010f95fe8268c84d6ab0aac056d78fd80f44
                              • Instruction ID: 24e2820227c6b8a1d3c4fdf88ff481ce9e6762616b0c1629da2b38e240bfb3cc
                              • Opcode Fuzzy Hash: 0737545edb8471297625bae86863010f95fe8268c84d6ab0aac056d78fd80f44
                              • Instruction Fuzzy Hash: 3C329C74A00218DFDF15DF94C895BEDBBB5FF05304F248069E806AB292DB79AE45CB60
                              APIs
                              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,007E6766,?,?,00000008,?,?,007EFEFE,00000000), ref: 007E6998
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ExceptionRaise
                              • String ID:
                              • API String ID: 3997070919-0
                              • Opcode ID: 5ca036b4220c24f7424240c83599b118ca6fc22fbe4620ebff5dfae822c63a24
                              • Instruction ID: 3afdcb59fc3100b23658443fa656ca690f740d629dd42764941fd857d91f3ac1
                              • Opcode Fuzzy Hash: 5ca036b4220c24f7424240c83599b118ca6fc22fbe4620ebff5dfae822c63a24
                              • Instruction Fuzzy Hash: B5B169716116488FD719CF29C48AB647BE0FF193A4F25C65CE899CF2A2C339E981CB40
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID: 0-3916222277
                              • Opcode ID: a78dbb6819c49db2e9e7052a271377b9271305f6dbbce470e46382db87fa63f1
                              • Instruction ID: 66cdfa7cca44f0f9bc7b66500fdac595c8993bcf01a90416ba66c63356266075
                              • Opcode Fuzzy Hash: a78dbb6819c49db2e9e7052a271377b9271305f6dbbce470e46382db87fa63f1
                              • Instruction Fuzzy Hash: F9123E71900229DFDB54CF58C881BEEB7B5FF48710F15819AE849EB295EB349A81CF90
                              APIs
                              • BlockInput.USER32(00000001), ref: 0082EABD
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: BlockInput
                              • String ID:
                              • API String ID: 3456056419-0
                              • Opcode ID: aa56408e5682c4cb4dbeaf8db820746673cd235f66a32d49cedb923d0559c82f
                              • Instruction ID: 1dda23cd55a898d8b9141e4f57ee34f6e77e6bc6c0041d0528a3ea8aa1b0bc32
                              • Opcode Fuzzy Hash: aa56408e5682c4cb4dbeaf8db820746673cd235f66a32d49cedb923d0559c82f
                              • Instruction Fuzzy Hash: 2EE012752002149FC710DF59D404E9AB7EDFF69760F00841AFC4AC7251D674A8408B91
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,007D03EE), ref: 007D09DA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: eddd58dab075fd5e131effaa5bc80b888fcc747710d51c99b6f562efa945445e
                              • Instruction ID: 0ed1eb06eb66f68bd871d8577a5c3774b430488172c0f00202e36d148d87abaf
                              • Opcode Fuzzy Hash: eddd58dab075fd5e131effaa5bc80b888fcc747710d51c99b6f562efa945445e
                              • Instruction Fuzzy Hash:
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID: 0
                              • API String ID: 0-4108050209
                              • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                              • Instruction ID: 524fc1e03a5d6f68f95409f4f15ad6012ac6d82fca642812d005cce6c09e7a18
                              • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                              • Instruction Fuzzy Hash: E451677260C7459BDB3C856888AE7BE67B99B52300F18050BD886DB382F61DEE41E356
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: cf789f8af10a6d13a9d3ec2a9702d2ad4439d26ada26f9f74d990df3287c30cc
                              • Instruction ID: ba2920f483475723c66805b7642280a74f2461043f9b3179ad6762511c073cda
                              • Opcode Fuzzy Hash: cf789f8af10a6d13a9d3ec2a9702d2ad4439d26ada26f9f74d990df3287c30cc
                              • Instruction Fuzzy Hash: 05322322D2AF814DD7279635D8223356259BFBB3C6F14D737E81AB59A6EF2DC4838100
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3fb6ebf565cb25174ace8702e73a4b02b6677d437b689461c7150179e2648bd8
                              • Instruction ID: fd448adea62279b9153319ff48474851b6d5eaa88ec86510d29cbf7b4d251a43
                              • Opcode Fuzzy Hash: 3fb6ebf565cb25174ace8702e73a4b02b6677d437b689461c7150179e2648bd8
                              • Instruction Fuzzy Hash: 51320232A041198BDF79CF29C894B7D7BA1FB45314F28826ED89ACB2D1D234DD81DB51
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8aeb4cb484c74cd8912fd8b9c591cc72f195865fd77bfcc25227005c5fcd8b0f
                              • Instruction ID: da360f733b950ba6777d4032e7b28461b65de1e4ef6be1d49fea559222a024f3
                              • Opcode Fuzzy Hash: 8aeb4cb484c74cd8912fd8b9c591cc72f195865fd77bfcc25227005c5fcd8b0f
                              • Instruction Fuzzy Hash: 8A228EB0A04609DFDF14DF68D885BEEB7B6FF44300F204529E916AB391EB39A951CB50
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 00e4d00069d7e69a576bb9db66596841c22d3c734775845a9c459aa204f99bb6
                              • Instruction ID: 477fbd10c624b78aaea92dedf39f93e414dec230005efe4a9c4e0056ba7d6ba4
                              • Opcode Fuzzy Hash: 00e4d00069d7e69a576bb9db66596841c22d3c734775845a9c459aa204f99bb6
                              • Instruction Fuzzy Hash: 1E02A7B1E00209EBDB14DF64D885BBDB7B5FF44300F108169EA169B3A1EB39DA50DB91
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fcf81f42ef7b0397818b8064c40af0fdcf99f19b227230f2396317225a808119
                              • Instruction ID: 9369cbbd8c18c3eef5974c26225465263018a679ea9a2286a9b3b2376b0af720
                              • Opcode Fuzzy Hash: fcf81f42ef7b0397818b8064c40af0fdcf99f19b227230f2396317225a808119
                              • Instruction Fuzzy Hash: 31B1F020D2AF414DC62396399831336B75CBFBB6D6F91D31BFC2674E22EB2686834140
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f7254075197c6e3f3e73751c42fe2aa758b471049a743cdbfcae28d361e71a25
                              • Instruction ID: 62142cea7ef744e1fbfd2ac3c34bec2f5e6f6d0a64d72cc962736b87afec309a
                              • Opcode Fuzzy Hash: f7254075197c6e3f3e73751c42fe2aa758b471049a743cdbfcae28d361e71a25
                              • Instruction Fuzzy Hash: 44614BB120874996DA3C5A2C8D96BBE23B8DF81700F14491FE846DB381F61DDE42C366
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dce13b0d871eef399c94097beece11b31ebd49e1a40d3b04c283d1cab66b3997
                              • Instruction ID: 7b32e13d9d46272207342d8e12e924cb833b0b7b50492969595cfd25d5115b8d
                              • Opcode Fuzzy Hash: dce13b0d871eef399c94097beece11b31ebd49e1a40d3b04c283d1cab66b3997
                              • Instruction Fuzzy Hash: 39616A7170870996DE3C4A288896BBF63B6DF42704F14095BE983DB381FA1EED42C256
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 06113e9d275bb668a73157ddaa1f1c24ed544c7273796778d8a9c7839bba3a06
                              • Instruction ID: 3f57fcf30c17d3eedcbaa1ce4a44b30b1f8cd67a3bdae20d0beae84e3e6f6985
                              • Opcode Fuzzy Hash: 06113e9d275bb668a73157ddaa1f1c24ed544c7273796778d8a9c7839bba3a06
                              • Instruction Fuzzy Hash: D621A8326206218BD728CE79C81267A73E5FB64310F15862EE4A7C77D0DE35A944CB40
                              APIs
                              • DeleteObject.GDI32(00000000), ref: 00832B30
                              • DeleteObject.GDI32(00000000), ref: 00832B43
                              • DestroyWindow.USER32 ref: 00832B52
                              • GetDesktopWindow.USER32 ref: 00832B6D
                              • GetWindowRect.USER32(00000000), ref: 00832B74
                              • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00832CA3
                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00832CB1
                              • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00832CF8
                              • GetClientRect.USER32(00000000,?), ref: 00832D04
                              • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00832D40
                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00832D62
                              • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00832D75
                              • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00832D80
                              • GlobalLock.KERNEL32(00000000), ref: 00832D89
                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00832D98
                              • GlobalUnlock.KERNEL32(00000000), ref: 00832DA1
                              • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00832DA8
                              • GlobalFree.KERNEL32(00000000), ref: 00832DB3
                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00832DC5
                              • OleLoadPicture.OLEAUT32(?,00000000,00000000,0084FC38,00000000), ref: 00832DDB
                              • GlobalFree.KERNEL32(00000000), ref: 00832DEB
                              • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00832E11
                              • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00832E30
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00832E52
                              • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0083303F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                              • String ID: $AutoIt v3$DISPLAY$static
                              • API String ID: 2211948467-2373415609
                              • Opcode ID: 2a1f81974851d170d5cb5ae9df6e1c74a47469bf538cd2e2d4c790d7e437515e
                              • Instruction ID: de225b8e1bb19c54a2fe0a37a6454395ce4765346d593baaa9a1e32bbebf032e
                              • Opcode Fuzzy Hash: 2a1f81974851d170d5cb5ae9df6e1c74a47469bf538cd2e2d4c790d7e437515e
                              • Instruction Fuzzy Hash: 64024975500218EFDB24DF68CC89EAE7BB9FF49710F048558F915EB2A1DB74A901CBA0
                              APIs
                              • SetTextColor.GDI32(?,00000000), ref: 0084712F
                              • GetSysColorBrush.USER32(0000000F), ref: 00847160
                              • GetSysColor.USER32(0000000F), ref: 0084716C
                              • SetBkColor.GDI32(?,000000FF), ref: 00847186
                              • SelectObject.GDI32(?,?), ref: 00847195
                              • InflateRect.USER32(?,000000FF,000000FF), ref: 008471C0
                              • GetSysColor.USER32(00000010), ref: 008471C8
                              • CreateSolidBrush.GDI32(00000000), ref: 008471CF
                              • FrameRect.USER32(?,?,00000000), ref: 008471DE
                              • DeleteObject.GDI32(00000000), ref: 008471E5
                              • InflateRect.USER32(?,000000FE,000000FE), ref: 00847230
                              • FillRect.USER32(?,?,?), ref: 00847262
                              • GetWindowLongW.USER32(?,000000F0), ref: 00847284
                                • Part of subcall function 008473E8: GetSysColor.USER32(00000012), ref: 00847421
                                • Part of subcall function 008473E8: SetTextColor.GDI32(?,?), ref: 00847425
                                • Part of subcall function 008473E8: GetSysColorBrush.USER32(0000000F), ref: 0084743B
                                • Part of subcall function 008473E8: GetSysColor.USER32(0000000F), ref: 00847446
                                • Part of subcall function 008473E8: GetSysColor.USER32(00000011), ref: 00847463
                                • Part of subcall function 008473E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00847471
                                • Part of subcall function 008473E8: SelectObject.GDI32(?,00000000), ref: 00847482
                                • Part of subcall function 008473E8: SetBkColor.GDI32(?,00000000), ref: 0084748B
                                • Part of subcall function 008473E8: SelectObject.GDI32(?,?), ref: 00847498
                                • Part of subcall function 008473E8: InflateRect.USER32(?,000000FF,000000FF), ref: 008474B7
                                • Part of subcall function 008473E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 008474CE
                                • Part of subcall function 008473E8: GetWindowLongW.USER32(00000000,000000F0), ref: 008474DB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                              • String ID:
                              • API String ID: 4124339563-0
                              • Opcode ID: 40f3e2d10ca46a2082de8d269cf207c25a1152f3e8708751a91af3fe8a954914
                              • Instruction ID: 765c7c820242e0881352ec17fa747d780afdc7684f34830b6d3cf1ea659bc5ac
                              • Opcode Fuzzy Hash: 40f3e2d10ca46a2082de8d269cf207c25a1152f3e8708751a91af3fe8a954914
                              • Instruction Fuzzy Hash: 23A1AF76009315AFDB509F64DC48E6BBBA9FF8A320F100A19F962E61E1D770E944CB91
                              APIs
                              • DestroyWindow.USER32(00000000), ref: 0083273E
                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0083286A
                              • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 008328A9
                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 008328B9
                              • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00832900
                              • GetClientRect.USER32(00000000,?), ref: 0083290C
                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00832955
                              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00832964
                              • GetStockObject.GDI32(00000011), ref: 00832974
                              • SelectObject.GDI32(00000000,00000000), ref: 00832978
                              • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00832988
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00832991
                              • DeleteDC.GDI32(00000000), ref: 0083299A
                              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 008329C6
                              • SendMessageW.USER32(00000030,00000000,00000001), ref: 008329DD
                              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00832A1D
                              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00832A31
                              • SendMessageW.USER32(00000404,00000001,00000000), ref: 00832A42
                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00832A77
                              • GetStockObject.GDI32(00000011), ref: 00832A82
                              • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00832A8D
                              • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00832A97
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                              • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                              • API String ID: 2910397461-517079104
                              • Opcode ID: 42f6ab8db8f57951d15bfa8142149586d7703f832eb4af3d780732a282b74bc1
                              • Instruction ID: e3b379803e14e7dd318039e1bb2d1dc92b6d133347857f5bce554b731aef1237
                              • Opcode Fuzzy Hash: 42f6ab8db8f57951d15bfa8142149586d7703f832eb4af3d780732a282b74bc1
                              • Instruction Fuzzy Hash: F3B16C75A00219AFEB14DFA8CC4AFAE7BA9FB48714F008514F915E7290DB74ED40CBA0
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 00824AED
                              • GetDriveTypeW.KERNEL32(?,0084CB68,?,\\.\,0084CC08), ref: 00824BCA
                              • SetErrorMode.KERNEL32(00000000,0084CB68,?,\\.\,0084CC08), ref: 00824D36
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ErrorMode$DriveType
                              • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                              • API String ID: 2907320926-4222207086
                              • Opcode ID: 57628564f60d5b832ac0b273d8f380e5ed4549c85789049cedcb031ef6817ec2
                              • Instruction ID: 71ac7bcd1eace9da5b23383f833b7ba123e9ec81be9bf7a821a97e2da5ada5ee
                              • Opcode Fuzzy Hash: 57628564f60d5b832ac0b273d8f380e5ed4549c85789049cedcb031ef6817ec2
                              • Instruction Fuzzy Hash: CE610630601619DBCB14DF68DA85DAC7BA0FF44304B249016F81AEB396EB3ADDD1DB61
                              APIs
                              • GetSysColor.USER32(00000012), ref: 00847421
                              • SetTextColor.GDI32(?,?), ref: 00847425
                              • GetSysColorBrush.USER32(0000000F), ref: 0084743B
                              • GetSysColor.USER32(0000000F), ref: 00847446
                              • CreateSolidBrush.GDI32(?), ref: 0084744B
                              • GetSysColor.USER32(00000011), ref: 00847463
                              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00847471
                              • SelectObject.GDI32(?,00000000), ref: 00847482
                              • SetBkColor.GDI32(?,00000000), ref: 0084748B
                              • SelectObject.GDI32(?,?), ref: 00847498
                              • InflateRect.USER32(?,000000FF,000000FF), ref: 008474B7
                              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 008474CE
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 008474DB
                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0084752A
                              • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00847554
                              • InflateRect.USER32(?,000000FD,000000FD), ref: 00847572
                              • DrawFocusRect.USER32(?,?), ref: 0084757D
                              • GetSysColor.USER32(00000011), ref: 0084758E
                              • SetTextColor.GDI32(?,00000000), ref: 00847596
                              • DrawTextW.USER32(?,008470F5,000000FF,?,00000000), ref: 008475A8
                              • SelectObject.GDI32(?,?), ref: 008475BF
                              • DeleteObject.GDI32(?), ref: 008475CA
                              • SelectObject.GDI32(?,?), ref: 008475D0
                              • DeleteObject.GDI32(?), ref: 008475D5
                              • SetTextColor.GDI32(?,?), ref: 008475DB
                              • SetBkColor.GDI32(?,?), ref: 008475E5
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                              • String ID:
                              • API String ID: 1996641542-0
                              • Opcode ID: 9550b5c939254cfb13fab4f009185e3c85d88a6582407e6b729ce8ae5a0ef8c5
                              • Instruction ID: d6224014a002ad7f0ff79dc7d5a2697c23b377326337c4872d921a66a2239604
                              • Opcode Fuzzy Hash: 9550b5c939254cfb13fab4f009185e3c85d88a6582407e6b729ce8ae5a0ef8c5
                              • Instruction Fuzzy Hash: 35616A76901218AFDF119FA4DC49EAEBFB9FB09320F118115F915BB2A1D7749940CF90
                              APIs
                              • GetCursorPos.USER32(?), ref: 00841128
                              • GetDesktopWindow.USER32 ref: 0084113D
                              • GetWindowRect.USER32(00000000), ref: 00841144
                              • GetWindowLongW.USER32(?,000000F0), ref: 00841199
                              • DestroyWindow.USER32(?), ref: 008411B9
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 008411ED
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0084120B
                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0084121D
                              • SendMessageW.USER32(00000000,00000421,?,?), ref: 00841232
                              • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00841245
                              • IsWindowVisible.USER32(00000000), ref: 008412A1
                              • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 008412BC
                              • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 008412D0
                              • GetWindowRect.USER32(00000000,?), ref: 008412E8
                              • MonitorFromPoint.USER32(?,?,00000002), ref: 0084130E
                              • GetMonitorInfoW.USER32(00000000,?), ref: 00841328
                              • CopyRect.USER32(?,?), ref: 0084133F
                              • SendMessageW.USER32(00000000,00000412,00000000), ref: 008413AA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                              • String ID: ($0$tooltips_class32
                              • API String ID: 698492251-4156429822
                              • Opcode ID: e8857675b455bb798727b58c8232ad6253c871286ebdd2fc2f01579275611c4e
                              • Instruction ID: e02ff8c16b9035c6c8926b66873e34a28ab9ef6b6d0ff0dfadcbe4f19a749648
                              • Opcode Fuzzy Hash: e8857675b455bb798727b58c8232ad6253c871286ebdd2fc2f01579275611c4e
                              • Instruction Fuzzy Hash: 2AB17D71604345AFDB54DF64C888BAABBE4FF89354F00891CF999DB261C771E844CB92
                              APIs
                              • CharUpperBuffW.USER32(?,?), ref: 008402E5
                              • _wcslen.LIBCMT ref: 0084031F
                              • _wcslen.LIBCMT ref: 00840389
                              • _wcslen.LIBCMT ref: 008403F1
                              • _wcslen.LIBCMT ref: 00840475
                              • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 008404C5
                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00840504
                                • Part of subcall function 007CF9F2: _wcslen.LIBCMT ref: 007CF9FD
                                • Part of subcall function 0081223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00812258
                                • Part of subcall function 0081223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0081228A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _wcslen$MessageSend$BuffCharUpper
                              • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                              • API String ID: 1103490817-719923060
                              • Opcode ID: 0c77f1ec16626db46d39dfa7ef841675eadc44cf090e831cc32f441a830e8bb0
                              • Instruction ID: eeb08a53e9890ce45b02ee31edccf8e2aa417ce4de9e137c7c3b88020395a09d
                              • Opcode Fuzzy Hash: 0c77f1ec16626db46d39dfa7ef841675eadc44cf090e831cc32f441a830e8bb0
                              • Instruction Fuzzy Hash: 00E1AB312082098BC724DF24C45096BB7E6FFD8318B15895CFA96EB3A5DB34ED45CB82
                              APIs
                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007C8968
                              • GetSystemMetrics.USER32(00000007), ref: 007C8970
                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007C899B
                              • GetSystemMetrics.USER32(00000008), ref: 007C89A3
                              • GetSystemMetrics.USER32(00000004), ref: 007C89C8
                              • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 007C89E5
                              • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 007C89F5
                              • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 007C8A28
                              • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 007C8A3C
                              • GetClientRect.USER32(00000000,000000FF), ref: 007C8A5A
                              • GetStockObject.GDI32(00000011), ref: 007C8A76
                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 007C8A81
                                • Part of subcall function 007C912D: GetCursorPos.USER32(?), ref: 007C9141
                                • Part of subcall function 007C912D: ScreenToClient.USER32(00000000,?), ref: 007C915E
                                • Part of subcall function 007C912D: GetAsyncKeyState.USER32(00000001), ref: 007C9183
                                • Part of subcall function 007C912D: GetAsyncKeyState.USER32(00000002), ref: 007C919D
                              • SetTimer.USER32(00000000,00000000,00000028,007C90FC), ref: 007C8AA8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                              • String ID: AutoIt v3 GUI
                              • API String ID: 1458621304-248962490
                              • Opcode ID: 21bad5887a6951e8a429dd5ee04059b893e63cdd167a6a8df35df2c513903126
                              • Instruction ID: 8293708309932ccce6a3c8c1b09fbdbb734a17a459b3c0ef6f2d911d929b5645
                              • Opcode Fuzzy Hash: 21bad5887a6951e8a429dd5ee04059b893e63cdd167a6a8df35df2c513903126
                              • Instruction Fuzzy Hash: 8FB18A75A0020AAFDF54DFA8CC49BAE7BB9FB48314F11422DFA15E7290DB34A851CB51
                              APIs
                                • Part of subcall function 008110F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00811114
                                • Part of subcall function 008110F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00810B9B,?,?,?), ref: 00811120
                                • Part of subcall function 008110F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00810B9B,?,?,?), ref: 0081112F
                                • Part of subcall function 008110F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00810B9B,?,?,?), ref: 00811136
                                • Part of subcall function 008110F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0081114D
                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00810DF5
                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00810E29
                              • GetLengthSid.ADVAPI32(?), ref: 00810E40
                              • GetAce.ADVAPI32(?,00000000,?), ref: 00810E7A
                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00810E96
                              • GetLengthSid.ADVAPI32(?), ref: 00810EAD
                              • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00810EB5
                              • HeapAlloc.KERNEL32(00000000), ref: 00810EBC
                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00810EDD
                              • CopySid.ADVAPI32(00000000), ref: 00810EE4
                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00810F13
                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00810F35
                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00810F47
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00810F6E
                              • HeapFree.KERNEL32(00000000), ref: 00810F75
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00810F7E
                              • HeapFree.KERNEL32(00000000), ref: 00810F85
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00810F8E
                              • HeapFree.KERNEL32(00000000), ref: 00810F95
                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00810FA1
                              • HeapFree.KERNEL32(00000000), ref: 00810FA8
                                • Part of subcall function 00811193: GetProcessHeap.KERNEL32(00000008,00810BB1,?,00000000,?,00810BB1,?), ref: 008111A1
                                • Part of subcall function 00811193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00810BB1,?), ref: 008111A8
                                • Part of subcall function 00811193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00810BB1,?), ref: 008111B7
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                              • String ID:
                              • API String ID: 4175595110-0
                              • Opcode ID: 337e1eb813370e709417c086be5436925f92dabeff2125b56a97aef522fb7571
                              • Instruction ID: 30cb46ac7d96d2665850688efda8f31fb9d5c29f5f0e013e73940b53b491ce77
                              • Opcode Fuzzy Hash: 337e1eb813370e709417c086be5436925f92dabeff2125b56a97aef522fb7571
                              • Instruction Fuzzy Hash: 9171487690120AABDB209FA5DC49BEEBBBCFF05300F044115E959E6191DB719A86CF60
                              APIs
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0083C4BD
                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,0084CC08,00000000,?,00000000,?,?), ref: 0083C544
                              • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0083C5A4
                              • _wcslen.LIBCMT ref: 0083C5F4
                              • _wcslen.LIBCMT ref: 0083C66F
                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0083C6B2
                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0083C7C1
                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0083C84D
                              • RegCloseKey.ADVAPI32(?), ref: 0083C881
                              • RegCloseKey.ADVAPI32(00000000), ref: 0083C88E
                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0083C960
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                              • API String ID: 9721498-966354055
                              • Opcode ID: 297d0205f2057c368ca31631e4f9c8ac9832172233db467755d683ce83eb5c3b
                              • Instruction ID: 19cc5cd4c630f8493a62c4cc936dd02d9bf427eabe57c65402344910b4ec52a5
                              • Opcode Fuzzy Hash: 297d0205f2057c368ca31631e4f9c8ac9832172233db467755d683ce83eb5c3b
                              • Instruction Fuzzy Hash: 5B123435604201DFCB14DF14C885B6AB7E5FF88714F14889DF89AAB2A2DB35ED41CB91
                              APIs
                              • CharUpperBuffW.USER32(?,?), ref: 008409C6
                              • _wcslen.LIBCMT ref: 00840A01
                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00840A54
                              • _wcslen.LIBCMT ref: 00840A8A
                              • _wcslen.LIBCMT ref: 00840B06
                              • _wcslen.LIBCMT ref: 00840B81
                                • Part of subcall function 007CF9F2: _wcslen.LIBCMT ref: 007CF9FD
                                • Part of subcall function 00812BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00812BFA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _wcslen$MessageSend$BuffCharUpper
                              • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                              • API String ID: 1103490817-4258414348
                              • Opcode ID: 11f5358184063a390b88f9988477ef12a53897d931eaff3219dbe8da420ec9e1
                              • Instruction ID: 55e4d8eb6a3f4d9bfca4a3d644c7bafdb43ed57f86d5de9b5f2341458b66eb6f
                              • Opcode Fuzzy Hash: 11f5358184063a390b88f9988477ef12a53897d931eaff3219dbe8da420ec9e1
                              • Instruction Fuzzy Hash: 10E17831608305DFC714DF24C491A6AB7E2FF98318B14895DF99A9B3A2D734ED49CB82
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _wcslen$BuffCharUpper
                              • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                              • API String ID: 1256254125-909552448
                              • Opcode ID: 92ce81ddef22ef537d01200543781dbcbe4baa0aa70c0791b8ac7876f10f9fe2
                              • Instruction ID: 9ca86d202b339990f141ed305aa969b5fbfacdef98adffa7c22e863867014045
                              • Opcode Fuzzy Hash: 92ce81ddef22ef537d01200543781dbcbe4baa0aa70c0791b8ac7876f10f9fe2
                              • Instruction Fuzzy Hash: 7271D37260012A8BCB20DE7CCD516BA73A5FBE0764F254529F866F7284EA35DD45C3E0
                              APIs
                              • _wcslen.LIBCMT ref: 0084835A
                              • _wcslen.LIBCMT ref: 0084836E
                              • _wcslen.LIBCMT ref: 00848391
                              • _wcslen.LIBCMT ref: 008483B4
                              • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 008483F2
                              • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00845BF2), ref: 0084844E
                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00848487
                              • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 008484CA
                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00848501
                              • FreeLibrary.KERNEL32(?), ref: 0084850D
                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0084851D
                              • DestroyIcon.USER32(?,?,?,?,?,00845BF2), ref: 0084852C
                              • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00848549
                              • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00848555
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                              • String ID: .dll$.exe$.icl
                              • API String ID: 799131459-1154884017
                              • Opcode ID: 15f317537bd7df392fba25ab743e63f6cfd9526fcd82a442900d44ee0b921287
                              • Instruction ID: 0755e91b7ab20ab911b55309e3dc2967c8d10a9aec67aeb3ad187cb982899be9
                              • Opcode Fuzzy Hash: 15f317537bd7df392fba25ab743e63f6cfd9526fcd82a442900d44ee0b921287
                              • Instruction Fuzzy Hash: B961AF71900219FBEB14DF64CC85BBE77ACFB04B11F10454AF915E61D1DB74AA90CBA0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                              • API String ID: 0-1645009161
                              • Opcode ID: 9a5acd7dc2bd7eab3a570153b4107e7eb8233a54c2c3f4a5d5417bc362a9708a
                              • Instruction ID: e9ae8844307ff727b0ea56be9e59a88c66f851b101d7ba9b43d039a3d3b105c7
                              • Opcode Fuzzy Hash: 9a5acd7dc2bd7eab3a570153b4107e7eb8233a54c2c3f4a5d5417bc362a9708a
                              • Instruction Fuzzy Hash: BB81C371A04609FBDB24AF60CC46FFE37A9FF55300F044025FA15AA296EB7CD911D6A1
                              APIs
                              • CharLowerBuffW.USER32(?,?), ref: 00823EF8
                              • _wcslen.LIBCMT ref: 00823F03
                              • _wcslen.LIBCMT ref: 00823F5A
                              • _wcslen.LIBCMT ref: 00823F98
                              • GetDriveTypeW.KERNEL32(?), ref: 00823FD6
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0082401E
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00824059
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00824087
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: SendString_wcslen$BuffCharDriveLowerType
                              • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                              • API String ID: 1839972693-4113822522
                              • Opcode ID: 7a8d00cfb8414bf816bfec0c31da590350dd89975edab9292cd904dbeb019244
                              • Instruction ID: e5fc2d533d9e1a16cf615f241f11eb5dadedea36d0b3f5ddcfd437aafe71a33b
                              • Opcode Fuzzy Hash: 7a8d00cfb8414bf816bfec0c31da590350dd89975edab9292cd904dbeb019244
                              • Instruction Fuzzy Hash: 267101326046119FC310EF24D8909AAB7F4FF94758F10892DF9A5D7251EB38ED89CB51
                              APIs
                              • LoadIconW.USER32(00000063), ref: 00815A2E
                              • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00815A40
                              • SetWindowTextW.USER32(?,?), ref: 00815A57
                              • GetDlgItem.USER32(?,000003EA), ref: 00815A6C
                              • SetWindowTextW.USER32(00000000,?), ref: 00815A72
                              • GetDlgItem.USER32(?,000003E9), ref: 00815A82
                              • SetWindowTextW.USER32(00000000,?), ref: 00815A88
                              • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00815AA9
                              • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00815AC3
                              • GetWindowRect.USER32(?,?), ref: 00815ACC
                              • _wcslen.LIBCMT ref: 00815B33
                              • SetWindowTextW.USER32(?,?), ref: 00815B6F
                              • GetDesktopWindow.USER32 ref: 00815B75
                              • GetWindowRect.USER32(00000000), ref: 00815B7C
                              • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00815BD3
                              • GetClientRect.USER32(?,?), ref: 00815BE0
                              • PostMessageW.USER32(?,00000005,00000000,?), ref: 00815C05
                              • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00815C2F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                              • String ID:
                              • API String ID: 895679908-0
                              • Opcode ID: 1a4674c344b2de4132d1e20a0fb70f2298fdfeca4356c1a6e65832bbdb7ad9df
                              • Instruction ID: 18d71799e6ad14f13930a64823c0960bdc378615cc513ea4a99d52609d6a2055
                              • Opcode Fuzzy Hash: 1a4674c344b2de4132d1e20a0fb70f2298fdfeca4356c1a6e65832bbdb7ad9df
                              • Instruction Fuzzy Hash: F2716F31900B09EFDB20DFA9CE85AAEBBF9FF88714F104519E542E25A0D775E984CB50
                              APIs
                              • LoadCursorW.USER32(00000000,00007F89), ref: 0082FE27
                              • LoadCursorW.USER32(00000000,00007F8A), ref: 0082FE32
                              • LoadCursorW.USER32(00000000,00007F00), ref: 0082FE3D
                              • LoadCursorW.USER32(00000000,00007F03), ref: 0082FE48
                              • LoadCursorW.USER32(00000000,00007F8B), ref: 0082FE53
                              • LoadCursorW.USER32(00000000,00007F01), ref: 0082FE5E
                              • LoadCursorW.USER32(00000000,00007F81), ref: 0082FE69
                              • LoadCursorW.USER32(00000000,00007F88), ref: 0082FE74
                              • LoadCursorW.USER32(00000000,00007F80), ref: 0082FE7F
                              • LoadCursorW.USER32(00000000,00007F86), ref: 0082FE8A
                              • LoadCursorW.USER32(00000000,00007F83), ref: 0082FE95
                              • LoadCursorW.USER32(00000000,00007F85), ref: 0082FEA0
                              • LoadCursorW.USER32(00000000,00007F82), ref: 0082FEAB
                              • LoadCursorW.USER32(00000000,00007F84), ref: 0082FEB6
                              • LoadCursorW.USER32(00000000,00007F04), ref: 0082FEC1
                              • LoadCursorW.USER32(00000000,00007F02), ref: 0082FECC
                              • GetCursorInfo.USER32(?), ref: 0082FEDC
                              • GetLastError.KERNEL32 ref: 0082FF1E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Cursor$Load$ErrorInfoLast
                              • String ID:
                              • API String ID: 3215588206-0
                              • Opcode ID: 2b9e669b75deb0085c38591913aa42ca1d423837d60f74dd56c4adf797f351cc
                              • Instruction ID: 043c68343e12d85225fac4952fd7b9c99572e6c9bdcfe6e916b6ec6e18499a0f
                              • Opcode Fuzzy Hash: 2b9e669b75deb0085c38591913aa42ca1d423837d60f74dd56c4adf797f351cc
                              • Instruction Fuzzy Hash: 314160B0D04319AADB109FBA9C8985EBFF8FF04354B50853AF119E7281DB78A941CE90
                              APIs
                              • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 007D00C6
                                • Part of subcall function 007D00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0088070C,00000FA0,AFFD7B48,?,?,?,?,007F23B3,000000FF), ref: 007D011C
                                • Part of subcall function 007D00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,007F23B3,000000FF), ref: 007D0127
                                • Part of subcall function 007D00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,007F23B3,000000FF), ref: 007D0138
                                • Part of subcall function 007D00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 007D014E
                                • Part of subcall function 007D00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 007D015C
                                • Part of subcall function 007D00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 007D016A
                                • Part of subcall function 007D00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 007D0195
                                • Part of subcall function 007D00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 007D01A0
                              • ___scrt_fastfail.LIBCMT ref: 007D00E7
                                • Part of subcall function 007D00A3: __onexit.LIBCMT ref: 007D00A9
                              Strings
                              • InitializeConditionVariable, xrefs: 007D0148
                              • WakeAllConditionVariable, xrefs: 007D0162
                              • api-ms-win-core-synch-l1-2-0.dll, xrefs: 007D0122
                              • SleepConditionVariableCS, xrefs: 007D0154
                              • kernel32.dll, xrefs: 007D0133
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                              • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                              • API String ID: 66158676-1714406822
                              • Opcode ID: fb5fc22f96e3cff6248dc2f0653c1cb4342d459d20ec6aaee3f4f9b64ae1e7d8
                              • Instruction ID: 5c245c9f306993479fbfc1a9d13b205c66e4fc8408f9863c02985868cfb002ab
                              • Opcode Fuzzy Hash: fb5fc22f96e3cff6248dc2f0653c1cb4342d459d20ec6aaee3f4f9b64ae1e7d8
                              • Instruction Fuzzy Hash: 0D21C636A45719ABE7506BA4AC09B6E77E8FB05B51F10013FF911E3392DB7E98008AD0
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _wcslen
                              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                              • API String ID: 176396367-1603158881
                              • Opcode ID: a8137b3f5c9445f4494a8947a0c393c5cd25e3b5b73f82fe5e319595d5c56ef2
                              • Instruction ID: 0fedceb0302cbd488bfd94d1c42bd4f4bd7e2ba3d28bf9bbc2925dd844819846
                              • Opcode Fuzzy Hash: a8137b3f5c9445f4494a8947a0c393c5cd25e3b5b73f82fe5e319595d5c56ef2
                              • Instruction Fuzzy Hash: 63E1E432A00516EBCB189FA8C455BEDFBB9FF54710F54812AE566F7240DB30AEC98790
                              APIs
                              • CharLowerBuffW.USER32(00000000,00000000,0084CC08), ref: 00824527
                              • _wcslen.LIBCMT ref: 0082453B
                              • _wcslen.LIBCMT ref: 00824599
                              • _wcslen.LIBCMT ref: 008245F4
                              • _wcslen.LIBCMT ref: 0082463F
                              • _wcslen.LIBCMT ref: 008246A7
                                • Part of subcall function 007CF9F2: _wcslen.LIBCMT ref: 007CF9FD
                              • GetDriveTypeW.KERNEL32(?,00876BF0,00000061), ref: 00824743
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _wcslen$BuffCharDriveLowerType
                              • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                              • API String ID: 2055661098-1000479233
                              • Opcode ID: 0ce5cbb06bdf287ad6008cb94fe77b48c7af531ac44dd64504502d91b3904ddb
                              • Instruction ID: a922b0521a8c074d8b507d955d448b3b9ffd4edd28cf4bebd4f6f4dab113efae
                              • Opcode Fuzzy Hash: 0ce5cbb06bdf287ad6008cb94fe77b48c7af531ac44dd64504502d91b3904ddb
                              • Instruction Fuzzy Hash: A1B112316083229FC710DF28E890A6EB7E5FFA5724F50591DF5AAC7291E734D884CB62
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,0084CC08), ref: 008340BB
                              • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 008340CD
                              • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,0084CC08), ref: 008340F2
                              • FreeLibrary.KERNEL32(00000000,?,0084CC08), ref: 0083413E
                              • StringFromGUID2.OLE32(?,?,00000028,?,0084CC08), ref: 008341A8
                              • SysFreeString.OLEAUT32(00000009), ref: 00834262
                              • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 008342C8
                              • SysFreeString.OLEAUT32(?), ref: 008342F2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                              • String ID: GetModuleHandleExW$kernel32.dll
                              • API String ID: 354098117-199464113
                              • Opcode ID: 4ed91841bbe92b514f4a2b006addf9b61e4f5ddff4ae81c5fd90b4b6d43f5d87
                              • Instruction ID: 2e4ae6a385866f397824fe749e10ef71288891ceeec14c517b0fd55e8b81d250
                              • Opcode Fuzzy Hash: 4ed91841bbe92b514f4a2b006addf9b61e4f5ddff4ae81c5fd90b4b6d43f5d87
                              • Instruction Fuzzy Hash: 99122D75A00119EFDB14CF94C884EAEBBB9FF85318F248098E905EB251D731ED46CBA0
                              APIs
                              • GetMenuItemCount.USER32(00881990), ref: 007F2F8D
                              • GetMenuItemCount.USER32(00881990), ref: 007F303D
                              • GetCursorPos.USER32(?), ref: 007F3081
                              • SetForegroundWindow.USER32(00000000), ref: 007F308A
                              • TrackPopupMenuEx.USER32(00881990,00000000,?,00000000,00000000,00000000), ref: 007F309D
                              • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 007F30A9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                              • String ID: 0
                              • API String ID: 36266755-4108050209
                              • Opcode ID: a1d8b536b3ab54fa66dde813e5c94c6697b7b97fd18966722f5b4b625007b585
                              • Instruction ID: ce8344698765f5ab8dfbc8e13e75fc09c1031beeb5a925525f7bfb7b9b137017
                              • Opcode Fuzzy Hash: a1d8b536b3ab54fa66dde813e5c94c6697b7b97fd18966722f5b4b625007b585
                              • Instruction Fuzzy Hash: B5712D70644209BEEB218F64CC49FEABF69FF05324F204216F615A62D1C7B9AD50DB51
                              APIs
                              • DestroyWindow.USER32(00000000,?), ref: 00846DEB
                                • Part of subcall function 007B6B57: _wcslen.LIBCMT ref: 007B6B6A
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00846E5F
                              • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00846E81
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00846E94
                              • DestroyWindow.USER32(?), ref: 00846EB5
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,007B0000,00000000), ref: 00846EE4
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00846EFD
                              • GetDesktopWindow.USER32 ref: 00846F16
                              • GetWindowRect.USER32(00000000), ref: 00846F1D
                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00846F35
                              • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00846F4D
                                • Part of subcall function 007C9944: GetWindowLongW.USER32(?,000000EB), ref: 007C9952
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                              • String ID: 0$tooltips_class32
                              • API String ID: 2429346358-3619404913
                              • Opcode ID: 7324067461c5b0abb4bd5c1edd98fc0aea3392cecda6757137138d198a0764fa
                              • Instruction ID: 59fbb75dd60c66bc5a3a352b1f24904d8d8c8462b208c094b4b13a2d77133f45
                              • Opcode Fuzzy Hash: 7324067461c5b0abb4bd5c1edd98fc0aea3392cecda6757137138d198a0764fa
                              • Instruction Fuzzy Hash: 9A714674104348AFDB61CF18DC48BAABBE9FB8A304F54441DF999C7261DB74A91ACB12
                              APIs
                                • Part of subcall function 007C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007C9BB2
                              • DragQueryPoint.SHELL32(?,?), ref: 00849147
                                • Part of subcall function 00847674: ClientToScreen.USER32(?,?), ref: 0084769A
                                • Part of subcall function 00847674: GetWindowRect.USER32(?,?), ref: 00847710
                                • Part of subcall function 00847674: PtInRect.USER32(?,?,00848B89), ref: 00847720
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 008491B0
                              • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 008491BB
                              • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 008491DE
                              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00849225
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 0084923E
                              • SendMessageW.USER32(?,000000B1,?,?), ref: 00849255
                              • SendMessageW.USER32(?,000000B1,?,?), ref: 00849277
                              • DragFinish.SHELL32(?), ref: 0084927E
                              • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00849371
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                              • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                              • API String ID: 221274066-3440237614
                              • Opcode ID: 73234da629cbd78eb70dcfc152f34a4d3252928702f820598f720f00c8b5ca71
                              • Instruction ID: bdbbfa59c9f06e861bfc0e85633b40ae4c7a2a46a3a1954221d2fa731e0e9048
                              • Opcode Fuzzy Hash: 73234da629cbd78eb70dcfc152f34a4d3252928702f820598f720f00c8b5ca71
                              • Instruction Fuzzy Hash: 07617C71108305AFD701EF64DC89EAFBBE8FF89350F40491DF6A5922A1DB709A49CB52
                              APIs
                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0082C4B0
                              • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0082C4C3
                              • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0082C4D7
                              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0082C4F0
                              • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0082C533
                              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0082C549
                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0082C554
                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0082C584
                              • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0082C5DC
                              • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0082C5F0
                              • InternetCloseHandle.WININET(00000000), ref: 0082C5FB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                              • String ID:
                              • API String ID: 3800310941-3916222277
                              • Opcode ID: f298dea88832a5e65c1a29458ebb40c6e3ff002fd90ea0b71bd33c0f4f6d804e
                              • Instruction ID: c652945e43e4d41af07cab9cdc426af269a9cc61754e98b66f1b20f1297b3179
                              • Opcode Fuzzy Hash: f298dea88832a5e65c1a29458ebb40c6e3ff002fd90ea0b71bd33c0f4f6d804e
                              • Instruction Fuzzy Hash: 4D5158B4500618AFEB219F64DA88ABB7BFCFF09344F00441AF945D6250DB74E984DB60
                              APIs
                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00848592
                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008485A2
                              • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008485AD
                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008485BA
                              • GlobalLock.KERNEL32(00000000), ref: 008485C8
                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008485D7
                              • GlobalUnlock.KERNEL32(00000000), ref: 008485E0
                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008485E7
                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008485F8
                              • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,0084FC38,?), ref: 00848611
                              • GlobalFree.KERNEL32(00000000), ref: 00848621
                              • GetObjectW.GDI32(?,00000018,?), ref: 00848641
                              • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00848671
                              • DeleteObject.GDI32(?), ref: 00848699
                              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 008486AF
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                              • String ID:
                              • API String ID: 3840717409-0
                              • Opcode ID: 6e08ea6f6a589543d07bbed1e3c1eb075cffe3d2ea23c9687765bea4b09db686
                              • Instruction ID: 7da7ef7db1ef7a90081bfab9c8421dccd1309b2c1413ec2e677ef774535f6a14
                              • Opcode Fuzzy Hash: 6e08ea6f6a589543d07bbed1e3c1eb075cffe3d2ea23c9687765bea4b09db686
                              • Instruction Fuzzy Hash: D8412979601208EFDB519FA5CC48EAE7BBCFF9A715F118058F909E7260DB749901DB20
                              APIs
                              • VariantInit.OLEAUT32(00000000), ref: 00821502
                              • VariantCopy.OLEAUT32(?,?), ref: 0082150B
                              • VariantClear.OLEAUT32(?), ref: 00821517
                              • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 008215FB
                              • VarR8FromDec.OLEAUT32(?,?), ref: 00821657
                              • VariantInit.OLEAUT32(?), ref: 00821708
                              • SysFreeString.OLEAUT32(?), ref: 0082178C
                              • VariantClear.OLEAUT32(?), ref: 008217D8
                              • VariantClear.OLEAUT32(?), ref: 008217E7
                              • VariantInit.OLEAUT32(00000000), ref: 00821823
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                              • String ID: %4d%02d%02d%02d%02d%02d$Default
                              • API String ID: 1234038744-3931177956
                              • Opcode ID: 335646b6d8b0bb2ac9f79730beb8544d102dd80e29929a9c04ae55a1dcae88f1
                              • Instruction ID: 15a55445df01e1e8f38bac0e7d42cfb47e89e0e35077e7c34c292fe008193826
                              • Opcode Fuzzy Hash: 335646b6d8b0bb2ac9f79730beb8544d102dd80e29929a9c04ae55a1dcae88f1
                              • Instruction Fuzzy Hash: 4CD1CF71A00229EBDF109F65E98DBB9B7B5FF55704F24809AE406EB180DB34EC81DB61
                              APIs
                                • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                • Part of subcall function 0083C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0083B6AE,?,?), ref: 0083C9B5
                                • Part of subcall function 0083C998: _wcslen.LIBCMT ref: 0083C9F1
                                • Part of subcall function 0083C998: _wcslen.LIBCMT ref: 0083CA68
                                • Part of subcall function 0083C998: _wcslen.LIBCMT ref: 0083CA9E
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0083B6F4
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0083B772
                              • RegDeleteValueW.ADVAPI32(?,?), ref: 0083B80A
                              • RegCloseKey.ADVAPI32(?), ref: 0083B87E
                              • RegCloseKey.ADVAPI32(?), ref: 0083B89C
                              • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0083B8F2
                              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0083B904
                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 0083B922
                              • FreeLibrary.KERNEL32(00000000), ref: 0083B983
                              • RegCloseKey.ADVAPI32(00000000), ref: 0083B994
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                              • String ID: RegDeleteKeyExW$advapi32.dll
                              • API String ID: 146587525-4033151799
                              • Opcode ID: a54c3aa904fc45b99503c02276fc718fba4217feda7901b5a0ce10c95142ad81
                              • Instruction ID: 30513ba37bd3a0391948f638cf2344f51ef3e724e4cb0e6172822ab24584d91f
                              • Opcode Fuzzy Hash: a54c3aa904fc45b99503c02276fc718fba4217feda7901b5a0ce10c95142ad81
                              • Instruction Fuzzy Hash: 03C17A75208201EFD710DF14C499B6ABBE5FF84318F18849CF69A8B2A2DB35ED45CB91
                              APIs
                              • GetDC.USER32(00000000), ref: 008325D8
                              • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 008325E8
                              • CreateCompatibleDC.GDI32(?), ref: 008325F4
                              • SelectObject.GDI32(00000000,?), ref: 00832601
                              • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 0083266D
                              • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 008326AC
                              • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 008326D0
                              • SelectObject.GDI32(?,?), ref: 008326D8
                              • DeleteObject.GDI32(?), ref: 008326E1
                              • DeleteDC.GDI32(?), ref: 008326E8
                              • ReleaseDC.USER32(00000000,?), ref: 008326F3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                              • String ID: (
                              • API String ID: 2598888154-3887548279
                              • Opcode ID: 19a0b26b4eff8a0e1cf11119c44bf03b69ddeb50e87162f45dacba9101f70247
                              • Instruction ID: e8186a6d8b64aa710d723f887d49b43914c7514245dced594197877913144902
                              • Opcode Fuzzy Hash: 19a0b26b4eff8a0e1cf11119c44bf03b69ddeb50e87162f45dacba9101f70247
                              • Instruction Fuzzy Hash: CB61E275D01219EFCF14CFA8D885AAEBBBAFF48310F208529E955E7250E770A951CF90
                              APIs
                              • ___free_lconv_mon.LIBCMT ref: 007EDAA1
                                • Part of subcall function 007ED63C: _free.LIBCMT ref: 007ED659
                                • Part of subcall function 007ED63C: _free.LIBCMT ref: 007ED66B
                                • Part of subcall function 007ED63C: _free.LIBCMT ref: 007ED67D
                                • Part of subcall function 007ED63C: _free.LIBCMT ref: 007ED68F
                                • Part of subcall function 007ED63C: _free.LIBCMT ref: 007ED6A1
                                • Part of subcall function 007ED63C: _free.LIBCMT ref: 007ED6B3
                                • Part of subcall function 007ED63C: _free.LIBCMT ref: 007ED6C5
                                • Part of subcall function 007ED63C: _free.LIBCMT ref: 007ED6D7
                                • Part of subcall function 007ED63C: _free.LIBCMT ref: 007ED6E9
                                • Part of subcall function 007ED63C: _free.LIBCMT ref: 007ED6FB
                                • Part of subcall function 007ED63C: _free.LIBCMT ref: 007ED70D
                                • Part of subcall function 007ED63C: _free.LIBCMT ref: 007ED71F
                                • Part of subcall function 007ED63C: _free.LIBCMT ref: 007ED731
                              • _free.LIBCMT ref: 007EDA96
                                • Part of subcall function 007E29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007ED7D1,00000000,00000000,00000000,00000000,?,007ED7F8,00000000,00000007,00000000,?,007EDBF5,00000000), ref: 007E29DE
                                • Part of subcall function 007E29C8: GetLastError.KERNEL32(00000000,?,007ED7D1,00000000,00000000,00000000,00000000,?,007ED7F8,00000000,00000007,00000000,?,007EDBF5,00000000,00000000), ref: 007E29F0
                              • _free.LIBCMT ref: 007EDAB8
                              • _free.LIBCMT ref: 007EDACD
                              • _free.LIBCMT ref: 007EDAD8
                              • _free.LIBCMT ref: 007EDAFA
                              • _free.LIBCMT ref: 007EDB0D
                              • _free.LIBCMT ref: 007EDB1B
                              • _free.LIBCMT ref: 007EDB26
                              • _free.LIBCMT ref: 007EDB5E
                              • _free.LIBCMT ref: 007EDB65
                              • _free.LIBCMT ref: 007EDB82
                              • _free.LIBCMT ref: 007EDB9A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                              • String ID:
                              • API String ID: 161543041-0
                              • Opcode ID: b4d5840bfc30ca9022307aa1ecd3015d85341cc2b50ad69d6863f88f0ff58c12
                              • Instruction ID: cadab9b782c309b43f8f849fc2163c742b30370a4ad6403aaf63d0bd409cb1ad
                              • Opcode Fuzzy Hash: b4d5840bfc30ca9022307aa1ecd3015d85341cc2b50ad69d6863f88f0ff58c12
                              • Instruction Fuzzy Hash: 62315F71506288DFDB31AA76D84AB5677E8FF08310F115429E458E71A2EA3DFD418B20
                              APIs
                              • GetClassNameW.USER32(?,?,00000100), ref: 0081369C
                              • _wcslen.LIBCMT ref: 008136A7
                              • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00813797
                              • GetClassNameW.USER32(?,?,00000400), ref: 0081380C
                              • GetDlgCtrlID.USER32(?), ref: 0081385D
                              • GetWindowRect.USER32(?,?), ref: 00813882
                              • GetParent.USER32(?), ref: 008138A0
                              • ScreenToClient.USER32(00000000), ref: 008138A7
                              • GetClassNameW.USER32(?,?,00000100), ref: 00813921
                              • GetWindowTextW.USER32(?,?,00000400), ref: 0081395D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                              • String ID: %s%u
                              • API String ID: 4010501982-679674701
                              • Opcode ID: a84072a21a3d19320f277c12d6fda2d5eee65f28471c589ccf53badaa9a65334
                              • Instruction ID: b8174ff7018e758bc9656e04ec2446cebe36a206382cb83e366266fa773738bf
                              • Opcode Fuzzy Hash: a84072a21a3d19320f277c12d6fda2d5eee65f28471c589ccf53badaa9a65334
                              • Instruction Fuzzy Hash: C291AF71204606AFD719DF24C885FEAFBACFF45350F008629F999D2190DB34EA95CBA1
                              APIs
                              • GetClassNameW.USER32(?,?,00000400), ref: 00814994
                              • GetWindowTextW.USER32(?,?,00000400), ref: 008149DA
                              • _wcslen.LIBCMT ref: 008149EB
                              • CharUpperBuffW.USER32(?,00000000), ref: 008149F7
                              • _wcsstr.LIBVCRUNTIME ref: 00814A2C
                              • GetClassNameW.USER32(00000018,?,00000400), ref: 00814A64
                              • GetWindowTextW.USER32(?,?,00000400), ref: 00814A9D
                              • GetClassNameW.USER32(00000018,?,00000400), ref: 00814AE6
                              • GetClassNameW.USER32(?,?,00000400), ref: 00814B20
                              • GetWindowRect.USER32(?,?), ref: 00814B8B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                              • String ID: ThumbnailClass
                              • API String ID: 1311036022-1241985126
                              • Opcode ID: 4c35fe6e6f5a247bdd25830eca6ca770d27be02f05abf4b5ef2031bc679643ed
                              • Instruction ID: d39455dc301cfbb0c8bd6abfc5b9519509f65586d4c80559f349caab81242975
                              • Opcode Fuzzy Hash: 4c35fe6e6f5a247bdd25830eca6ca770d27be02f05abf4b5ef2031bc679643ed
                              • Instruction Fuzzy Hash: D4919C710082059BDB04CF54C985BEA7BECFF84354F04946AFD8ADA196EB34ED85CBA1
                              APIs
                                • Part of subcall function 007C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007C9BB2
                              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00848D5A
                              • GetFocus.USER32 ref: 00848D6A
                              • GetDlgCtrlID.USER32(00000000), ref: 00848D75
                              • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00848E1D
                              • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00848ECF
                              • GetMenuItemCount.USER32(?), ref: 00848EEC
                              • GetMenuItemID.USER32(?,00000000), ref: 00848EFC
                              • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00848F2E
                              • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00848F70
                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00848FA1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                              • String ID: 0
                              • API String ID: 1026556194-4108050209
                              • Opcode ID: 4549fcead4d78ac73c0cb217f6fc99b5495b059604ec6afd907a37306efcf71e
                              • Instruction ID: 5bad8e09058de36a4293973079b428c4bb4f82458316c40a8778dadf65e45d74
                              • Opcode Fuzzy Hash: 4549fcead4d78ac73c0cb217f6fc99b5495b059604ec6afd907a37306efcf71e
                              • Instruction Fuzzy Hash: E6817A71508309EBDB10CF28D888AAFBBE9FB89754F14091DF995D7291DB30D905CBA2
                              APIs
                              • GetMenuItemInfoW.USER32(00881990,000000FF,00000000,00000030), ref: 0081BFAC
                              • SetMenuItemInfoW.USER32(00881990,00000004,00000000,00000030), ref: 0081BFE1
                              • Sleep.KERNEL32(000001F4), ref: 0081BFF3
                              • GetMenuItemCount.USER32(?), ref: 0081C039
                              • GetMenuItemID.USER32(?,00000000), ref: 0081C056
                              • GetMenuItemID.USER32(?,-00000001), ref: 0081C082
                              • GetMenuItemID.USER32(?,?), ref: 0081C0C9
                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0081C10F
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0081C124
                              • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0081C145
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ItemMenu$Info$CheckCountRadioSleep
                              • String ID: 0
                              • API String ID: 1460738036-4108050209
                              • Opcode ID: 262cde61f2206fdcb93278877392d95e5379a2b20d64e962c00b82d99f00ca33
                              • Instruction ID: 367f7f1afec4795ccb081c6da047aa1aa522907223a79dbc9b0dd2b170bc19de
                              • Opcode Fuzzy Hash: 262cde61f2206fdcb93278877392d95e5379a2b20d64e962c00b82d99f00ca33
                              • Instruction Fuzzy Hash: 51615AB498024AABDF11CF68DC88AEEBBADFF06344F104155E811E3291CB35AD85CB61
                              APIs
                              • GetFileVersionInfoSizeW.VERSION(?,?), ref: 0081DC20
                              • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 0081DC46
                              • _wcslen.LIBCMT ref: 0081DC50
                              • _wcsstr.LIBVCRUNTIME ref: 0081DCA0
                              • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 0081DCBC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                              • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                              • API String ID: 1939486746-1459072770
                              • Opcode ID: 924ac28626b6a1770765b58d5d8d3d9e99b408696beefd5851ac86ee9cf539d0
                              • Instruction ID: b6763382772271541a1fe13c1474bb7c79e652c8e0e54095df0bb97da0c11f90
                              • Opcode Fuzzy Hash: 924ac28626b6a1770765b58d5d8d3d9e99b408696beefd5851ac86ee9cf539d0
                              • Instruction Fuzzy Hash: B541F372A40305BBDB10A765AC4BFFF377CFF52710F10406AF900E6282EA78A90196A5
                              APIs
                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0083CC64
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 0083CC8D
                              • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0083CD48
                                • Part of subcall function 0083CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 0083CCAA
                                • Part of subcall function 0083CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 0083CCBD
                                • Part of subcall function 0083CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0083CCCF
                                • Part of subcall function 0083CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0083CD05
                                • Part of subcall function 0083CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0083CD28
                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 0083CCF3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                              • String ID: RegDeleteKeyExW$advapi32.dll
                              • API String ID: 2734957052-4033151799
                              • Opcode ID: 236d771883ecb8f5718df8a4d68d6aeb2cc41e63fef33f405f5dd9dfdb5d0d5c
                              • Instruction ID: 22b0f1c9fc82eb60db71aec6aa43807974f58b74acdc6b38951f65299314fbbe
                              • Opcode Fuzzy Hash: 236d771883ecb8f5718df8a4d68d6aeb2cc41e63fef33f405f5dd9dfdb5d0d5c
                              • Instruction Fuzzy Hash: E9316C75902129BBDB609B65DC88EFFBB7CFF86754F000165B906E2240DA349A45DBE0
                              APIs
                              • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00823D40
                              • _wcslen.LIBCMT ref: 00823D6D
                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00823D9D
                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00823DBE
                              • RemoveDirectoryW.KERNEL32(?), ref: 00823DCE
                              • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00823E55
                              • CloseHandle.KERNEL32(00000000), ref: 00823E60
                              • CloseHandle.KERNEL32(00000000), ref: 00823E6B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                              • String ID: :$\$\??\%s
                              • API String ID: 1149970189-3457252023
                              • Opcode ID: 5f0a3dcb3bbc06d1f1b19e66dc39d7fcc556453781af9770c3d5d753772d8af2
                              • Instruction ID: d7ec37b13efa586e67184ed12d2c18261143e34b1aa1e80b6813f2a05535bd97
                              • Opcode Fuzzy Hash: 5f0a3dcb3bbc06d1f1b19e66dc39d7fcc556453781af9770c3d5d753772d8af2
                              • Instruction Fuzzy Hash: 1F31A176A00219ABDB209FA0DC49FEB37BCFF89700F1041A6F509D6160E7789784CB24
                              APIs
                              • timeGetTime.WINMM ref: 0081E6B4
                                • Part of subcall function 007CE551: timeGetTime.WINMM(?,?,0081E6D4), ref: 007CE555
                              • Sleep.KERNEL32(0000000A), ref: 0081E6E1
                              • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 0081E705
                              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0081E727
                              • SetActiveWindow.USER32 ref: 0081E746
                              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0081E754
                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 0081E773
                              • Sleep.KERNEL32(000000FA), ref: 0081E77E
                              • IsWindow.USER32 ref: 0081E78A
                              • EndDialog.USER32(00000000), ref: 0081E79B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                              • String ID: BUTTON
                              • API String ID: 1194449130-3405671355
                              • Opcode ID: 22c13e52455321b8ca7607fcb0225ed33e9f6ebc23cc8a47bcbf6cc2d1258a7e
                              • Instruction ID: 3ea98f274d18cb4169a702da365f9b00772bda9d6865b8e2c172d0039125f18f
                              • Opcode Fuzzy Hash: 22c13e52455321b8ca7607fcb0225ed33e9f6ebc23cc8a47bcbf6cc2d1258a7e
                              • Instruction Fuzzy Hash: 96218174201204AFFB50DF68EC89E653BADFF76748F144424F915C22A1EB75AC80CB25
                              APIs
                                • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0081EA5D
                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0081EA73
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0081EA84
                              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0081EA96
                              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0081EAA7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: SendString$_wcslen
                              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                              • API String ID: 2420728520-1007645807
                              • Opcode ID: e6bf2cb8509cf0db647adb5d170499a85c357bb953b725aa0141290a9e7839cb
                              • Instruction ID: 466c79ea8bfe02a29b2e9699877d591223304839b2db0a0920f8bc2a81929720
                              • Opcode Fuzzy Hash: e6bf2cb8509cf0db647adb5d170499a85c357bb953b725aa0141290a9e7839cb
                              • Instruction Fuzzy Hash: 1511BF20A50229B9D720A3A1DC4AEFB6F7CFFD1B40F000429B925E20D5EA744984C5B0
                              APIs
                              • GetKeyboardState.USER32(?), ref: 0081A012
                              • SetKeyboardState.USER32(?), ref: 0081A07D
                              • GetAsyncKeyState.USER32(000000A0), ref: 0081A09D
                              • GetKeyState.USER32(000000A0), ref: 0081A0B4
                              • GetAsyncKeyState.USER32(000000A1), ref: 0081A0E3
                              • GetKeyState.USER32(000000A1), ref: 0081A0F4
                              • GetAsyncKeyState.USER32(00000011), ref: 0081A120
                              • GetKeyState.USER32(00000011), ref: 0081A12E
                              • GetAsyncKeyState.USER32(00000012), ref: 0081A157
                              • GetKeyState.USER32(00000012), ref: 0081A165
                              • GetAsyncKeyState.USER32(0000005B), ref: 0081A18E
                              • GetKeyState.USER32(0000005B), ref: 0081A19C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: State$Async$Keyboard
                              • String ID:
                              • API String ID: 541375521-0
                              • Opcode ID: 497a251811f0993f0798f257375429fc50bc91dec2e6000eb5f95f13b0f4b153
                              • Instruction ID: 7bb4f49127d558ea732d146b7d421f176b9fce52cb93254030d5f38b1a29d488
                              • Opcode Fuzzy Hash: 497a251811f0993f0798f257375429fc50bc91dec2e6000eb5f95f13b0f4b153
                              • Instruction Fuzzy Hash: 4E51B96490578469FB39DB64C4117EABFBCEF12340F084599D5C2D61C2DA649ACCC763
                              APIs
                              • GetDlgItem.USER32(?,00000001), ref: 00815CE2
                              • GetWindowRect.USER32(00000000,?), ref: 00815CFB
                              • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00815D59
                              • GetDlgItem.USER32(?,00000002), ref: 00815D69
                              • GetWindowRect.USER32(00000000,?), ref: 00815D7B
                              • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00815DCF
                              • GetDlgItem.USER32(?,000003E9), ref: 00815DDD
                              • GetWindowRect.USER32(00000000,?), ref: 00815DEF
                              • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00815E31
                              • GetDlgItem.USER32(?,000003EA), ref: 00815E44
                              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00815E5A
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00815E67
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Window$ItemMoveRect$Invalidate
                              • String ID:
                              • API String ID: 3096461208-0
                              • Opcode ID: df0719639641416704eabca035255ab84f0f749b18f3771593a4b201515f0403
                              • Instruction ID: 0eb812a29dc43a0ca2b843a20ade7daea5dcc3de54e3bfe8f0eacaf70f353b37
                              • Opcode Fuzzy Hash: df0719639641416704eabca035255ab84f0f749b18f3771593a4b201515f0403
                              • Instruction Fuzzy Hash: BE510E75B01609AFDF18CF68DD89AAEBBB9FF89300F148129F915E6290D7709E40CB50
                              APIs
                                • Part of subcall function 007C8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,007C8BE8,?,00000000,?,?,?,?,007C8BBA,00000000,?), ref: 007C8FC5
                              • DestroyWindow.USER32(?), ref: 007C8C81
                              • KillTimer.USER32(00000000,?,?,?,?,007C8BBA,00000000,?), ref: 007C8D1B
                              • DestroyAcceleratorTable.USER32(00000000), ref: 00806973
                              • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,007C8BBA,00000000,?), ref: 008069A1
                              • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,007C8BBA,00000000,?), ref: 008069B8
                              • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,007C8BBA,00000000), ref: 008069D4
                              • DeleteObject.GDI32(00000000), ref: 008069E6
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                              • String ID:
                              • API String ID: 641708696-0
                              • Opcode ID: 59f78126dd5f9fda10547256c65b812d82d84c57e13774994908d9309df60b37
                              • Instruction ID: bcb263434e6f0378092e68be610bd50ffb88919ec2be2df314bcc872dc5a5daf
                              • Opcode Fuzzy Hash: 59f78126dd5f9fda10547256c65b812d82d84c57e13774994908d9309df60b37
                              • Instruction Fuzzy Hash: 3561BD31102A10DFCBB59F18DD48B25BBF5FB41312F14456CE0429BAA0CB39ACA1DFA6
                              APIs
                                • Part of subcall function 007C9944: GetWindowLongW.USER32(?,000000EB), ref: 007C9952
                              • GetSysColor.USER32(0000000F), ref: 007C9862
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ColorLongWindow
                              • String ID:
                              • API String ID: 259745315-0
                              • Opcode ID: e0d57f440088004a5f9b58c821e61bbba51619d6b014fa08e57b2500c340d0d0
                              • Instruction ID: 5b267e0ef934107272f051fbd7921e2ba9c0aa5ba0533bccb465315cd8ecbcb9
                              • Opcode Fuzzy Hash: e0d57f440088004a5f9b58c821e61bbba51619d6b014fa08e57b2500c340d0d0
                              • Instruction Fuzzy Hash: 79417D35505640AFDBA05F389C88FB93BA9FB47330F14465DFAA2871E2D735A942DB10
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID: .}
                              • API String ID: 0-2266125135
                              • Opcode ID: f9e43d3984fe416a90cab7291451a35ea3c5704c9c9fbed47d7df97e1be1d1ea
                              • Instruction ID: 2be937ed8ee9abca35004e715190fcad8cb3275e3a1b5ce37c4b2fe708a5de9b
                              • Opcode Fuzzy Hash: f9e43d3984fe416a90cab7291451a35ea3c5704c9c9fbed47d7df97e1be1d1ea
                              • Instruction Fuzzy Hash: 2AC13675905289EFCF51DFAAC844BADBBB0BF0D310F044199E619AB392C7389941CF61
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,007FF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00819717
                              • LoadStringW.USER32(00000000,?,007FF7F8,00000001), ref: 00819720
                                • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                              • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,007FF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00819742
                              • LoadStringW.USER32(00000000,?,007FF7F8,00000001), ref: 00819745
                              • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00819866
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: HandleLoadModuleString$Message_wcslen
                              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                              • API String ID: 747408836-2268648507
                              • Opcode ID: 3cfda51a4965d2061224a6e9395e96e044ee31c20fcd36766a41474d2b0354b4
                              • Instruction ID: 3da26277cd922559b3b0e6bc49e58a195898d5cb668853ce9604f15d9db22a2e
                              • Opcode Fuzzy Hash: 3cfda51a4965d2061224a6e9395e96e044ee31c20fcd36766a41474d2b0354b4
                              • Instruction Fuzzy Hash: AF411371800219AACB04EBE4DD9AEEEB77CFF55340F504465F605B2192EB396F88CB61
                              APIs
                                • Part of subcall function 007B6B57: _wcslen.LIBCMT ref: 007B6B6A
                              • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 008107A2
                              • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 008107BE
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 008107DA
                              • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00810804
                              • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 0081082C
                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00810837
                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0081083C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                              • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                              • API String ID: 323675364-22481851
                              • Opcode ID: 18910849108dce7a890fcdc0a30a1b75a0a00d841621e82f73c55500dd898c4d
                              • Instruction ID: c41c86ff60da3f0400585c3dd958b69d18e7d4d9c590baab1d0996459de86142
                              • Opcode Fuzzy Hash: 18910849108dce7a890fcdc0a30a1b75a0a00d841621e82f73c55500dd898c4d
                              • Instruction Fuzzy Hash: 0B413872C00229EBDF11EBA4DC89DEEB778FF04340B144129E915A31A1EB74AE84CF90
                              APIs
                              • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0084403B
                              • CreateCompatibleDC.GDI32(00000000), ref: 00844042
                              • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00844055
                              • SelectObject.GDI32(00000000,00000000), ref: 0084405D
                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 00844068
                              • DeleteDC.GDI32(00000000), ref: 00844072
                              • GetWindowLongW.USER32(?,000000EC), ref: 0084407C
                              • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00844092
                              • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 0084409E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                              • String ID: static
                              • API String ID: 2559357485-2160076837
                              • Opcode ID: f43762fff08b41bb2b9b57e8f9cd59e48343ad725734019cddc951b628d8b9b9
                              • Instruction ID: 4b38fab7eda6b3b3ef4c4f8c1fe1da5bb9d282187d89e48847d2a202fdd98c2e
                              • Opcode Fuzzy Hash: f43762fff08b41bb2b9b57e8f9cd59e48343ad725734019cddc951b628d8b9b9
                              • Instruction Fuzzy Hash: 43315A36502219ABDF619FA8DC09FDA3B6CFF0E324F110215FA59E61A0D775D820DB54
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 00833C5C
                              • CoInitialize.OLE32(00000000), ref: 00833C8A
                              • CoUninitialize.OLE32 ref: 00833C94
                              • _wcslen.LIBCMT ref: 00833D2D
                              • GetRunningObjectTable.OLE32(00000000,?), ref: 00833DB1
                              • SetErrorMode.KERNEL32(00000001,00000029), ref: 00833ED5
                              • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00833F0E
                              • CoGetObject.OLE32(?,00000000,0084FB98,?), ref: 00833F2D
                              • SetErrorMode.KERNEL32(00000000), ref: 00833F40
                              • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00833FC4
                              • VariantClear.OLEAUT32(?), ref: 00833FD8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                              • String ID:
                              • API String ID: 429561992-0
                              • Opcode ID: 310b64ab8eba9e7c3be35206d2d3682098833e9b83f6811a07eb76747ff0ddf8
                              • Instruction ID: b0c05532ad7d56a888cb74c4010604013c8d576b1888322cbecfbabd622cf773
                              • Opcode Fuzzy Hash: 310b64ab8eba9e7c3be35206d2d3682098833e9b83f6811a07eb76747ff0ddf8
                              • Instruction Fuzzy Hash: FDC11271608205AFD700DF68C88496BBBE9FF89748F10491DF98ADB211DB71EE45CB92
                              APIs
                              • CoInitialize.OLE32(00000000), ref: 00827AF3
                              • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00827B8F
                              • SHGetDesktopFolder.SHELL32(?), ref: 00827BA3
                              • CoCreateInstance.OLE32(0084FD08,00000000,00000001,00876E6C,?), ref: 00827BEF
                              • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00827C74
                              • CoTaskMemFree.OLE32(?,?), ref: 00827CCC
                              • SHBrowseForFolderW.SHELL32(?), ref: 00827D57
                              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00827D7A
                              • CoTaskMemFree.OLE32(00000000), ref: 00827D81
                              • CoTaskMemFree.OLE32(00000000), ref: 00827DD6
                              • CoUninitialize.OLE32 ref: 00827DDC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                              • String ID:
                              • API String ID: 2762341140-0
                              • Opcode ID: 4b26ce802809a17d1dd9ff50a2160ae52aa40e721815ce3e31da4cf5b6ba362e
                              • Instruction ID: 3e07028b8b9a9bdecc91e7ec1a2ce444fd55c8370204e76c459b60ea7b55d35e
                              • Opcode Fuzzy Hash: 4b26ce802809a17d1dd9ff50a2160ae52aa40e721815ce3e31da4cf5b6ba362e
                              • Instruction Fuzzy Hash: 2DC14B75A00119EFCB14DFA4D888DAEBBF9FF48304B1484A9E916DB261D730ED81CB90
                              APIs
                              • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00845504
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00845515
                              • CharNextW.USER32(00000158), ref: 00845544
                              • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00845585
                              • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0084559B
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 008455AC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessageSend$CharNext
                              • String ID:
                              • API String ID: 1350042424-0
                              • Opcode ID: 4cfbe50355e38dd0333251ad56e587f816efc3953ca398ac610f21f2b0026575
                              • Instruction ID: 8dfd5ab271c0b9f81d60831491258d3683578e9a2e4c0435a98da25e36755efd
                              • Opcode Fuzzy Hash: 4cfbe50355e38dd0333251ad56e587f816efc3953ca398ac610f21f2b0026575
                              • Instruction Fuzzy Hash: 21619F7490560CEFDF509F64CC849FE7BB9FB06728F108149F925EA292D7748A81DB60
                              APIs
                              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 0080FAAF
                              • SafeArrayAllocData.OLEAUT32(?), ref: 0080FB08
                              • VariantInit.OLEAUT32(?), ref: 0080FB1A
                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 0080FB3A
                              • VariantCopy.OLEAUT32(?,?), ref: 0080FB8D
                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 0080FBA1
                              • VariantClear.OLEAUT32(?), ref: 0080FBB6
                              • SafeArrayDestroyData.OLEAUT32(?), ref: 0080FBC3
                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0080FBCC
                              • VariantClear.OLEAUT32(?), ref: 0080FBDE
                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0080FBE9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                              • String ID:
                              • API String ID: 2706829360-0
                              • Opcode ID: 73454fe1ff715a895f3dcde965c7f42dbf9aa5f6f8979d3327ca3674efa20e18
                              • Instruction ID: e1a3dc52d10de2c2d2ec2c207d72e608bbb37b7187ac62d38be907bfa884417d
                              • Opcode Fuzzy Hash: 73454fe1ff715a895f3dcde965c7f42dbf9aa5f6f8979d3327ca3674efa20e18
                              • Instruction Fuzzy Hash: 63415F35A01219DFCB50DF68CC689AEBBB9FF49354F00C069E945E7262CB34A945CFA4
                              APIs
                              • GetKeyboardState.USER32(?), ref: 00819CA1
                              • GetAsyncKeyState.USER32(000000A0), ref: 00819D22
                              • GetKeyState.USER32(000000A0), ref: 00819D3D
                              • GetAsyncKeyState.USER32(000000A1), ref: 00819D57
                              • GetKeyState.USER32(000000A1), ref: 00819D6C
                              • GetAsyncKeyState.USER32(00000011), ref: 00819D84
                              • GetKeyState.USER32(00000011), ref: 00819D96
                              • GetAsyncKeyState.USER32(00000012), ref: 00819DAE
                              • GetKeyState.USER32(00000012), ref: 00819DC0
                              • GetAsyncKeyState.USER32(0000005B), ref: 00819DD8
                              • GetKeyState.USER32(0000005B), ref: 00819DEA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: State$Async$Keyboard
                              • String ID:
                              • API String ID: 541375521-0
                              • Opcode ID: d386c8a2160d8b4e9696b6cff84dd06ffe703883b29f3161f89eec673f896949
                              • Instruction ID: 4ac756ada051ed6f5c97e8d2a3ef22eafb4b79da475fa8f9ee0feff2d421e4d1
                              • Opcode Fuzzy Hash: d386c8a2160d8b4e9696b6cff84dd06ffe703883b29f3161f89eec673f896949
                              • Instruction Fuzzy Hash: E241D5346047C96DFF708664D8243F5BEE8FF12344F08805ADAC6965C2EBA499C8C7A2
                              APIs
                              • WSAStartup.WSOCK32(00000101,?), ref: 008305BC
                              • inet_addr.WSOCK32(?), ref: 0083061C
                              • gethostbyname.WSOCK32(?), ref: 00830628
                              • IcmpCreateFile.IPHLPAPI ref: 00830636
                              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 008306C6
                              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 008306E5
                              • IcmpCloseHandle.IPHLPAPI(?), ref: 008307B9
                              • WSACleanup.WSOCK32 ref: 008307BF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                              • String ID: Ping
                              • API String ID: 1028309954-2246546115
                              • Opcode ID: c3f3889bcf82aeb5a18e278f9aad3730034df5b25b02acd84afb5502cc9665cf
                              • Instruction ID: 890a9b139598f197213da5b6c45959010b813cdda79e84996e8a0abf4f09147b
                              • Opcode Fuzzy Hash: c3f3889bcf82aeb5a18e278f9aad3730034df5b25b02acd84afb5502cc9665cf
                              • Instruction Fuzzy Hash: 4A9167356082019FD320DF19C899B1ABBE4FF88318F1485A9E46ADB6A2C735EC41CFD1
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _wcslen$BuffCharLower
                              • String ID: cdecl$none$stdcall$winapi
                              • API String ID: 707087890-567219261
                              • Opcode ID: 3e86d6065a0e9a89aea144e1dd64b6321b5c080b7a0bf494f6e246c3cd337bbe
                              • Instruction ID: 90a78edcf8663f084168a90b63eb67ea37c53a765f1495acc384709c61ec4946
                              • Opcode Fuzzy Hash: 3e86d6065a0e9a89aea144e1dd64b6321b5c080b7a0bf494f6e246c3cd337bbe
                              • Instruction Fuzzy Hash: 5D518031A00616DBCF14DF68C9909BEB7A5FFA4724B214229F526E7284EB35DD44C7D0
                              APIs
                              • CoInitialize.OLE32 ref: 00833774
                              • CoUninitialize.OLE32 ref: 0083377F
                              • CoCreateInstance.OLE32(?,00000000,00000017,0084FB78,?), ref: 008337D9
                              • IIDFromString.OLE32(?,?), ref: 0083384C
                              • VariantInit.OLEAUT32(?), ref: 008338E4
                              • VariantClear.OLEAUT32(?), ref: 00833936
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                              • API String ID: 636576611-1287834457
                              • Opcode ID: 6b29be6bb1937d9edfe9d6fd0db38bbc51a82e99456c34b2f48f8574a17e85e7
                              • Instruction ID: 6cddecab79ad8871549343a6c0d4c90db660dbfc4de05ef1879aa6d1fe3bd628
                              • Opcode Fuzzy Hash: 6b29be6bb1937d9edfe9d6fd0db38bbc51a82e99456c34b2f48f8574a17e85e7
                              • Instruction Fuzzy Hash: DD6159B4608301AFD310DF54C889B6ABBE8FF89714F104929F995DB291C774EE48CB92
                              APIs
                              • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 008233CF
                                • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                              • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 008233F0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: LoadString$_wcslen
                              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                              • API String ID: 4099089115-3080491070
                              • Opcode ID: 7142b1ed3cb79f5af9ccfd49f4bf376ca0e2db01c250d55f187c9cc3b900ca74
                              • Instruction ID: 4306ef850d39e4e6f7aad73a72c4e0ff3be64cf4962e258a73550ceb2f8df60b
                              • Opcode Fuzzy Hash: 7142b1ed3cb79f5af9ccfd49f4bf376ca0e2db01c250d55f187c9cc3b900ca74
                              • Instruction Fuzzy Hash: FA51A371800219EADF14EBA0DD5AEEEB7B8FF14340F204065F119B2151EB396F98DB61
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _wcslen$BuffCharUpper
                              • String ID: APPEND$EXISTS$KEYS$REMOVE
                              • API String ID: 1256254125-769500911
                              • Opcode ID: 61c0155671e3f2669a1662d988e1b2342c69914ace5b6fea8ffac2fa343b47da
                              • Instruction ID: cb380ac7da1442273fc2c591bf2d50ce2b3ccfaaaa10d0ee1fe13686e9b32751
                              • Opcode Fuzzy Hash: 61c0155671e3f2669a1662d988e1b2342c69914ace5b6fea8ffac2fa343b47da
                              • Instruction Fuzzy Hash: 4D41A032A001269BCB206F7988A05FEB7A9FFB17A4F244229E525D7284F735CDC1C690
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 008253A0
                              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00825416
                              • GetLastError.KERNEL32 ref: 00825420
                              • SetErrorMode.KERNEL32(00000000,READY), ref: 008254A7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Error$Mode$DiskFreeLastSpace
                              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                              • API String ID: 4194297153-14809454
                              • Opcode ID: c3472e5c528a082446a2894f8633d010d2591f534d079579d86b0b40f5de2b2b
                              • Instruction ID: 50c0c3b545787483bf7cbd5eab23f08f67032dfe1d1d9d40023dd666d82a3c06
                              • Opcode Fuzzy Hash: c3472e5c528a082446a2894f8633d010d2591f534d079579d86b0b40f5de2b2b
                              • Instruction Fuzzy Hash: 6D31D2B5A40614DFD710EF68D488BAABBB4FF05305F148066E505CB292E771DDC6CBA0
                              APIs
                              • CreateMenu.USER32 ref: 00843C79
                              • SetMenu.USER32(?,00000000), ref: 00843C88
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00843D10
                              • IsMenu.USER32(?), ref: 00843D24
                              • CreatePopupMenu.USER32 ref: 00843D2E
                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00843D5B
                              • DrawMenuBar.USER32 ref: 00843D63
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Menu$CreateItem$DrawInfoInsertPopup
                              • String ID: 0$F
                              • API String ID: 161812096-3044882817
                              • Opcode ID: 71c8fd9c983dba33de3926d474a02cbfeb2434a30892d7ed57d4c19cce65d648
                              • Instruction ID: fd888473996f90fdc6f8c2a8df4fb9a123c2a2671e5dc7477db360518a91c825
                              • Opcode Fuzzy Hash: 71c8fd9c983dba33de3926d474a02cbfeb2434a30892d7ed57d4c19cce65d648
                              • Instruction Fuzzy Hash: BA412779A02209EFDB14DF64D884BAEBBB9FF49350F140029E956A7360D770AA11CB94
                              APIs
                                • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                • Part of subcall function 00813CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00813CCA
                              • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00811F64
                              • GetDlgCtrlID.USER32 ref: 00811F6F
                              • GetParent.USER32 ref: 00811F8B
                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00811F8E
                              • GetDlgCtrlID.USER32(?), ref: 00811F97
                              • GetParent.USER32(?), ref: 00811FAB
                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00811FAE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessageSend$CtrlParent$ClassName_wcslen
                              • String ID: ComboBox$ListBox
                              • API String ID: 711023334-1403004172
                              • Opcode ID: baf27075a124c8aeae314851a3b7f90137e49caa0000450ad59482434fb60a6d
                              • Instruction ID: 4d3bc2548a1a7201342eff14d7863019603d101ce725feafc6decb823a6afb35
                              • Opcode Fuzzy Hash: baf27075a124c8aeae314851a3b7f90137e49caa0000450ad59482434fb60a6d
                              • Instruction Fuzzy Hash: F321B374A00118BBCF44AFA0CC89AEEBBB8FF16314F104119BA65A7291DB785949DB60
                              APIs
                                • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                • Part of subcall function 00813CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00813CCA
                              • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 00812043
                              • GetDlgCtrlID.USER32 ref: 0081204E
                              • GetParent.USER32 ref: 0081206A
                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 0081206D
                              • GetDlgCtrlID.USER32(?), ref: 00812076
                              • GetParent.USER32(?), ref: 0081208A
                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 0081208D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessageSend$CtrlParent$ClassName_wcslen
                              • String ID: ComboBox$ListBox
                              • API String ID: 711023334-1403004172
                              • Opcode ID: f1fd6916b25bbd3dfc6e1c15c44d4a978097a7e7ba87c753da7ef50d33173ae3
                              • Instruction ID: 5d8af3269f41b278c269c2139d875599891a2ce7111731a0f9cbd4470951da0b
                              • Opcode Fuzzy Hash: f1fd6916b25bbd3dfc6e1c15c44d4a978097a7e7ba87c753da7ef50d33173ae3
                              • Instruction Fuzzy Hash: 9121D7B5900218BBCF14AFA0CC89EFEBBBCFF19344F104005BA65A7191D7794554DB60
                              APIs
                              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00843A9D
                              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00843AA0
                              • GetWindowLongW.USER32(?,000000F0), ref: 00843AC7
                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00843AEA
                              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00843B62
                              • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00843BAC
                              • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00843BC7
                              • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00843BE2
                              • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00843BF6
                              • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00843C13
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessageSend$LongWindow
                              • String ID:
                              • API String ID: 312131281-0
                              • Opcode ID: b36c6fa13d8c906a34c9adcb2f31529d9fdf4a57c04368defd06e6e247e5a32e
                              • Instruction ID: 06b1834d92bbfcd46ba937aa7ff566edff02a09fb7628493f902ccb89660bb0e
                              • Opcode Fuzzy Hash: b36c6fa13d8c906a34c9adcb2f31529d9fdf4a57c04368defd06e6e247e5a32e
                              • Instruction Fuzzy Hash: FB617775A00208AFDB11DFA8CC85EEEB7B8FB09714F104199FA15E72A1C774AA46DF50
                              APIs
                              • _free.LIBCMT ref: 007E2C94
                                • Part of subcall function 007E29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007ED7D1,00000000,00000000,00000000,00000000,?,007ED7F8,00000000,00000007,00000000,?,007EDBF5,00000000), ref: 007E29DE
                                • Part of subcall function 007E29C8: GetLastError.KERNEL32(00000000,?,007ED7D1,00000000,00000000,00000000,00000000,?,007ED7F8,00000000,00000007,00000000,?,007EDBF5,00000000,00000000), ref: 007E29F0
                              • _free.LIBCMT ref: 007E2CA0
                              • _free.LIBCMT ref: 007E2CAB
                              • _free.LIBCMT ref: 007E2CB6
                              • _free.LIBCMT ref: 007E2CC1
                              • _free.LIBCMT ref: 007E2CCC
                              • _free.LIBCMT ref: 007E2CD7
                              • _free.LIBCMT ref: 007E2CE2
                              • _free.LIBCMT ref: 007E2CED
                              • _free.LIBCMT ref: 007E2CFB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 6a5642ee0f4265d412e1b5124f56cbb85029b90440b2839ac6e66c2600181a35
                              • Instruction ID: 652d438804ef9c724adc7d609681b5c562699d3d061682c5deed2efa36a3ee23
                              • Opcode Fuzzy Hash: 6a5642ee0f4265d412e1b5124f56cbb85029b90440b2839ac6e66c2600181a35
                              • Instruction Fuzzy Hash: 9D11B376101148EFCB02EF56D846C9D3BA9BF09350F5254A0FA48AB233D639EA519F90
                              APIs
                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00827FAD
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00827FC1
                              • GetFileAttributesW.KERNEL32(?), ref: 00827FEB
                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00828005
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00828017
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00828060
                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 008280B0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CurrentDirectory$AttributesFile
                              • String ID: *.*
                              • API String ID: 769691225-438819550
                              • Opcode ID: 15159bcc5d01456358efb080b8c0ba9bf1e9d4648a77b2db2fdfa16cbe39be94
                              • Instruction ID: 04672a6c4cc442ebd48c1820beb9078b5bb82227de0c67f45853a57616257c1e
                              • Opcode Fuzzy Hash: 15159bcc5d01456358efb080b8c0ba9bf1e9d4648a77b2db2fdfa16cbe39be94
                              • Instruction Fuzzy Hash: 0281C076508255DBCB20EF15D844AAAB3E8FF88714F55486EF885C7250EB34ED84CBA2
                              APIs
                              • SetWindowLongW.USER32(?,000000EB), ref: 007B5C7A
                                • Part of subcall function 007B5D0A: GetClientRect.USER32(?,?), ref: 007B5D30
                                • Part of subcall function 007B5D0A: GetWindowRect.USER32(?,?), ref: 007B5D71
                                • Part of subcall function 007B5D0A: ScreenToClient.USER32(?,?), ref: 007B5D99
                              • GetDC.USER32 ref: 007F46F5
                              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 007F4708
                              • SelectObject.GDI32(00000000,00000000), ref: 007F4716
                              • SelectObject.GDI32(00000000,00000000), ref: 007F472B
                              • ReleaseDC.USER32(?,00000000), ref: 007F4733
                              • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 007F47C4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                              • String ID: U
                              • API String ID: 4009187628-3372436214
                              • Opcode ID: 51bfc8d57aa8a0e34585e1a044a973e03e8b4678cecb6ab39cbe38197646279b
                              • Instruction ID: 02f2abdcbaf424dbf86495f22651afc7e668d08a574b6fb4baaeab3f8151260d
                              • Opcode Fuzzy Hash: 51bfc8d57aa8a0e34585e1a044a973e03e8b4678cecb6ab39cbe38197646279b
                              • Instruction Fuzzy Hash: CF71E135500209DFCF219F68C984BFB7BB6FF4A360F144269EE559A266C7398841DF60
                              APIs
                              • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 008235E4
                                • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                              • LoadStringW.USER32(00882390,?,00000FFF,?), ref: 0082360A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: LoadString$_wcslen
                              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                              • API String ID: 4099089115-2391861430
                              • Opcode ID: 77649d3f5a9ae6c421c0708659f2871c0036acc6fc8808a0481f2c536b6c3605
                              • Instruction ID: a48a8a34419c28ff3563222028f5279c371d02c04acc1052cbd9fadf4c8e0768
                              • Opcode Fuzzy Hash: 77649d3f5a9ae6c421c0708659f2871c0036acc6fc8808a0481f2c536b6c3605
                              • Instruction Fuzzy Hash: FE513B71800219FACF14EBA4DC9AEEEBB78FF14300F144125F215A21A1EB395AD9DF61
                              APIs
                                • Part of subcall function 007C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007C9BB2
                                • Part of subcall function 007C912D: GetCursorPos.USER32(?), ref: 007C9141
                                • Part of subcall function 007C912D: ScreenToClient.USER32(00000000,?), ref: 007C915E
                                • Part of subcall function 007C912D: GetAsyncKeyState.USER32(00000001), ref: 007C9183
                                • Part of subcall function 007C912D: GetAsyncKeyState.USER32(00000002), ref: 007C919D
                              • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00848B6B
                              • ImageList_EndDrag.COMCTL32 ref: 00848B71
                              • ReleaseCapture.USER32 ref: 00848B77
                              • SetWindowTextW.USER32(?,00000000), ref: 00848C12
                              • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00848C25
                              • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00848CFF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                              • String ID: @GUI_DRAGFILE$@GUI_DROPID
                              • API String ID: 1924731296-2107944366
                              • Opcode ID: b9d2b486549bb48f83f7eb5fd392749fffde70dc5b9d8c78a1cd3a6db1121a50
                              • Instruction ID: cd7ee7684c5200a518a8d975bad4f5a53b9271fedbb12ef62b5b572548c68286
                              • Opcode Fuzzy Hash: b9d2b486549bb48f83f7eb5fd392749fffde70dc5b9d8c78a1cd3a6db1121a50
                              • Instruction Fuzzy Hash: BB516C71105304AFD740EF24DC9AFAE7BE8FB88714F40062DFA56972A1DB74A904CB62
                              APIs
                              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0082C272
                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0082C29A
                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0082C2CA
                              • GetLastError.KERNEL32 ref: 0082C322
                              • SetEvent.KERNEL32(?), ref: 0082C336
                              • InternetCloseHandle.WININET(00000000), ref: 0082C341
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                              • String ID:
                              • API String ID: 3113390036-3916222277
                              • Opcode ID: 8034bf4c8262d34c9def46e377874ab1b2221defc5f4d5c38e9963dbdc3cabf2
                              • Instruction ID: 3a89b5d80945110745e383bff48d8acbcafa968d149f7bdf3c7c825cde2d7352
                              • Opcode Fuzzy Hash: 8034bf4c8262d34c9def46e377874ab1b2221defc5f4d5c38e9963dbdc3cabf2
                              • Instruction Fuzzy Hash: 8F317CB5500618AFD721DFA8A888ABF7AFCFB49744B10891EA446D2200DB74DD848B61
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,007F3AAF,?,?,Bad directive syntax error,0084CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 008198BC
                              • LoadStringW.USER32(00000000,?,007F3AAF,?), ref: 008198C3
                                • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                              • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00819987
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: HandleLoadMessageModuleString_wcslen
                              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                              • API String ID: 858772685-4153970271
                              • Opcode ID: fd1863f1c27539792cbbf70b8af028657b1bb30e9cc320a01425770b1479bf00
                              • Instruction ID: e1bbf06c5e3e51803466a8de2ed01a127228210785854a541e8f189fb746ae31
                              • Opcode Fuzzy Hash: fd1863f1c27539792cbbf70b8af028657b1bb30e9cc320a01425770b1479bf00
                              • Instruction Fuzzy Hash: 8B21713180021DFBCF15AF90CC1AEEE7B79FF14304F044459F629A61A2EB3996A8CB10
                              APIs
                              • GetParent.USER32 ref: 008120AB
                              • GetClassNameW.USER32(00000000,?,00000100), ref: 008120C0
                              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0081214D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ClassMessageNameParentSend
                              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                              • API String ID: 1290815626-3381328864
                              • Opcode ID: 6892a3a97441899cfb81af8dcdf1fe6a99f3574a5f61602b55ff6310859656e3
                              • Instruction ID: cab16a55a736dad167132639c66e664090987a771a4beaa6e93f9de000dcc777
                              • Opcode Fuzzy Hash: 6892a3a97441899cfb81af8dcdf1fe6a99f3574a5f61602b55ff6310859656e3
                              • Instruction Fuzzy Hash: A7113A7A684706FAF705A220DC0ACFA33ACFF15324B20801AFB08F41D1FBA9B8915614
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                              • String ID:
                              • API String ID: 1282221369-0
                              • Opcode ID: 8321e2c0fa5952564485060166c2f5765e33a2a55eacae668c18c89f0fd95f37
                              • Instruction ID: fe8dd19ac04ea27b3e7256d47128b552c4b5116a2b9408b64761d3a90be52154
                              • Opcode Fuzzy Hash: 8321e2c0fa5952564485060166c2f5765e33a2a55eacae668c18c89f0fd95f37
                              • Instruction Fuzzy Hash: A4614C77906384EFDB32AFBA984966D7BA9AF0D310F04456DF940A7243D63D9D028B50
                              APIs
                              • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00845186
                              • ShowWindow.USER32(?,00000000), ref: 008451C7
                              • ShowWindow.USER32(?,00000005,?,00000000), ref: 008451CD
                              • SetFocus.USER32(?,?,00000005,?,00000000), ref: 008451D1
                                • Part of subcall function 00846FBA: DeleteObject.GDI32(00000000), ref: 00846FE6
                              • GetWindowLongW.USER32(?,000000F0), ref: 0084520D
                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0084521A
                              • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0084524D
                              • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00845287
                              • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00845296
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                              • String ID:
                              • API String ID: 3210457359-0
                              • Opcode ID: 8f0a84837acae2106faca4cfe8207961aef71eed7c610e1a167031ebecd97dc6
                              • Instruction ID: 75e6c107adff9cb8b1013354cbe0fab6900dfba01e3ccc17adeb4e9faf1527d8
                              • Opcode Fuzzy Hash: 8f0a84837acae2106faca4cfe8207961aef71eed7c610e1a167031ebecd97dc6
                              • Instruction Fuzzy Hash: 6A519C30A41A1CFFEF609F28CC4AB9D7B65FB05325F148016FA25D62E2C7B5A980DB41
                              APIs
                              • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00806890
                              • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 008068A9
                              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 008068B9
                              • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 008068D1
                              • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 008068F2
                              • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,007C8874,00000000,00000000,00000000,000000FF,00000000), ref: 00806901
                              • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0080691E
                              • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,007C8874,00000000,00000000,00000000,000000FF,00000000), ref: 0080692D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Icon$DestroyExtractImageLoadMessageSend
                              • String ID:
                              • API String ID: 1268354404-0
                              • Opcode ID: 711e42a9a0a428c5c1f22cd27fe0e912172af0326fa9979c58ea1f0744ffc6d0
                              • Instruction ID: 5e0b3aa9ee89f5fef339af56f5f62f411b8c91e415d8fa41549e1ec92fd17814
                              • Opcode Fuzzy Hash: 711e42a9a0a428c5c1f22cd27fe0e912172af0326fa9979c58ea1f0744ffc6d0
                              • Instruction Fuzzy Hash: DC5169B0600209EFDB608F28CC55FAA7BB9FB54750F10452CF906D62A0EB74ADA0DB50
                              APIs
                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0082C182
                              • GetLastError.KERNEL32 ref: 0082C195
                              • SetEvent.KERNEL32(?), ref: 0082C1A9
                                • Part of subcall function 0082C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0082C272
                                • Part of subcall function 0082C253: GetLastError.KERNEL32 ref: 0082C322
                                • Part of subcall function 0082C253: SetEvent.KERNEL32(?), ref: 0082C336
                                • Part of subcall function 0082C253: InternetCloseHandle.WININET(00000000), ref: 0082C341
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                              • String ID:
                              • API String ID: 337547030-0
                              • Opcode ID: 1392931aa63f858ddfd21a0f10396e5e67c51c1ebaafeffc0c2336b9c4281c31
                              • Instruction ID: 1fad6b94899d83c3edd4abb21bee5866492c9e844697abbb36857ef45cc2a9d1
                              • Opcode Fuzzy Hash: 1392931aa63f858ddfd21a0f10396e5e67c51c1ebaafeffc0c2336b9c4281c31
                              • Instruction Fuzzy Hash: 1E317A75201A15EFDB219FA9ED44A7ABBECFF19300B00441EF956C3610DB71E894DBA0
                              APIs
                                • Part of subcall function 00813A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00813A57
                                • Part of subcall function 00813A3D: GetCurrentThreadId.KERNEL32 ref: 00813A5E
                                • Part of subcall function 00813A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,008125B3), ref: 00813A65
                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 008125BD
                              • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 008125DB
                              • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 008125DF
                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 008125E9
                              • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00812601
                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00812605
                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 0081260F
                              • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00812623
                              • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00812627
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                              • String ID:
                              • API String ID: 2014098862-0
                              • Opcode ID: 7b0984cd7907b28f8c79523810c55c46ad1e50261fb4f8d92e5bf4eee38d5269
                              • Instruction ID: 493717cd3c3f6c731c72a4779ce87681a4376879d2b4514bf4dd99fd7cefdc96
                              • Opcode Fuzzy Hash: 7b0984cd7907b28f8c79523810c55c46ad1e50261fb4f8d92e5bf4eee38d5269
                              • Instruction Fuzzy Hash: F001D430391624BBFB5067689C8AF993F5DFF5EB12F100005F318EE0D1C9E22484CAAA
                              APIs
                              • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00811449,?,?,00000000), ref: 0081180C
                              • HeapAlloc.KERNEL32(00000000,?,00811449,?,?,00000000), ref: 00811813
                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00811449,?,?,00000000), ref: 00811828
                              • GetCurrentProcess.KERNEL32(?,00000000,?,00811449,?,?,00000000), ref: 00811830
                              • DuplicateHandle.KERNEL32(00000000,?,00811449,?,?,00000000), ref: 00811833
                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00811449,?,?,00000000), ref: 00811843
                              • GetCurrentProcess.KERNEL32(00811449,00000000,?,00811449,?,?,00000000), ref: 0081184B
                              • DuplicateHandle.KERNEL32(00000000,?,00811449,?,?,00000000), ref: 0081184E
                              • CreateThread.KERNEL32(00000000,00000000,00811874,00000000,00000000,00000000), ref: 00811868
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                              • String ID:
                              • API String ID: 1957940570-0
                              • Opcode ID: fbffd52bbafdab8eaa33673d74369d63bcf9bc1551bdd7e9b8d689e1d5a860b4
                              • Instruction ID: e1545f617d9ed093512c0ae81740e26d641096b2133053a529326da6fffc7ba4
                              • Opcode Fuzzy Hash: fbffd52bbafdab8eaa33673d74369d63bcf9bc1551bdd7e9b8d689e1d5a860b4
                              • Instruction Fuzzy Hash: 9C01BF75241304BFE750AFA5DC4DF577B6CFB8AB11F004411FA05DB291C6749800CB20
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: __alldvrm$_strrchr
                              • String ID: }}}$}}}$}}}
                              • API String ID: 1036877536-3712723652
                              • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                              • Instruction ID: 2ef9044cc96cb930592fc49d528f646039efd0b3cf06b1c9450ee25cef0daeb1
                              • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                              • Instruction Fuzzy Hash: 54A13672E023CA9FDB25CE1AC8957AEBBF4EF69350F1441ADE5859B282C23C9941C750
                              APIs
                                • Part of subcall function 0081D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 0081D501
                                • Part of subcall function 0081D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 0081D50F
                                • Part of subcall function 0081D4DC: CloseHandle.KERNEL32(00000000), ref: 0081D5DC
                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0083A16D
                              • GetLastError.KERNEL32 ref: 0083A180
                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0083A1B3
                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 0083A268
                              • GetLastError.KERNEL32(00000000), ref: 0083A273
                              • CloseHandle.KERNEL32(00000000), ref: 0083A2C4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                              • String ID: SeDebugPrivilege
                              • API String ID: 2533919879-2896544425
                              • Opcode ID: 7038e3876c954a1165d21933ded2b3adb27c224c5621ed6c7fdf5a6aeecb7a45
                              • Instruction ID: 4d846aa3c4f8722dd4e7e7ae55cdf7a52d50d44e2fa4fc403450ff3e8d7537ae
                              • Opcode Fuzzy Hash: 7038e3876c954a1165d21933ded2b3adb27c224c5621ed6c7fdf5a6aeecb7a45
                              • Instruction Fuzzy Hash: CA617C352042419FD724DF18C498F6ABBE5FF94318F18848CE4A68B7A2C776EC45CB92
                              APIs
                              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00843925
                              • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 0084393A
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00843954
                              • _wcslen.LIBCMT ref: 00843999
                              • SendMessageW.USER32(?,00001057,00000000,?), ref: 008439C6
                              • SendMessageW.USER32(?,00001061,?,0000000F), ref: 008439F4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessageSend$Window_wcslen
                              • String ID: SysListView32
                              • API String ID: 2147712094-78025650
                              • Opcode ID: 516584b5e9d54be3f3f86b86adc7f4aa4f35022470e1b525bffc4f1d72398f33
                              • Instruction ID: c4156df9ba1ecace648a7964666f7849b244d3472a945f105902a763cd32c8c1
                              • Opcode Fuzzy Hash: 516584b5e9d54be3f3f86b86adc7f4aa4f35022470e1b525bffc4f1d72398f33
                              • Instruction Fuzzy Hash: AB419071A0021DABEF219F64CC49FEA7BA9FF18354F10052AF958E7281D7759A84CB90
                              APIs
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0081BCFD
                              • IsMenu.USER32(00000000), ref: 0081BD1D
                              • CreatePopupMenu.USER32 ref: 0081BD53
                              • GetMenuItemCount.USER32(01745B40), ref: 0081BDA4
                              • InsertMenuItemW.USER32(01745B40,?,00000001,00000030), ref: 0081BDCC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Menu$Item$CountCreateInfoInsertPopup
                              • String ID: 0$2
                              • API String ID: 93392585-3793063076
                              • Opcode ID: d40a031f9b1c6e555172a7e0ff5f2f74f58140553fb3cbf8237a4a43a56fee47
                              • Instruction ID: 8c04d156cbcd072e3a0200ddd7f069fc3ae875498a4e437ceabaad1bdcd5e795
                              • Opcode Fuzzy Hash: d40a031f9b1c6e555172a7e0ff5f2f74f58140553fb3cbf8237a4a43a56fee47
                              • Instruction Fuzzy Hash: 6B519D70A002099BDB18CFA8E884BEEBBFCFF59354F144159E411D7291D7709981CB62
                              APIs
                              • _ValidateLocalCookies.LIBCMT ref: 007D2D4B
                              • ___except_validate_context_record.LIBVCRUNTIME ref: 007D2D53
                              • _ValidateLocalCookies.LIBCMT ref: 007D2DE1
                              • __IsNonwritableInCurrentImage.LIBCMT ref: 007D2E0C
                              • _ValidateLocalCookies.LIBCMT ref: 007D2E61
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                              • String ID: &H}$csm
                              • API String ID: 1170836740-1162412510
                              • Opcode ID: 8608dd33a8c4024f99c47c004bc79eaaa6db64ddcb8d5e521ab2ea8eeb40b62f
                              • Instruction ID: 118d084391ac4172cf6fee337a7ac770208e97e22df8aaa1233abafc2b610a67
                              • Opcode Fuzzy Hash: 8608dd33a8c4024f99c47c004bc79eaaa6db64ddcb8d5e521ab2ea8eeb40b62f
                              • Instruction Fuzzy Hash: 73418334A00209EBCF10DF68C849A9EBBB5BF55325F148156E814AB393D739EA07CBD1
                              APIs
                              • LoadIconW.USER32(00000000,00007F03), ref: 0081C913
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: IconLoad
                              • String ID: blank$info$question$stop$warning
                              • API String ID: 2457776203-404129466
                              • Opcode ID: 2ae56a1f4dc3212ac7c34fc668664f4e552b34b3bb489755a5fd78101758795b
                              • Instruction ID: 9807f232328a5f0a175306db4e8cf3e36ccffc431eef0a70c28afb61f8944fc9
                              • Opcode Fuzzy Hash: 2ae56a1f4dc3212ac7c34fc668664f4e552b34b3bb489755a5fd78101758795b
                              • Instruction Fuzzy Hash: 3F11EB316C970ABBE7055B64DCC3DEE6BACFF153A8B10402BF504EA382E7749D805268
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                              • String ID: 0.0.0.0
                              • API String ID: 642191829-3771769585
                              • Opcode ID: 7341adfd98c4d3630dbc102563198110d322635cdaf5a0440e88c24756da5cb8
                              • Instruction ID: ff9669d03a003c2c052ca9fd71111b7b7fce2ec781579f1f722ec9a6799b6424
                              • Opcode Fuzzy Hash: 7341adfd98c4d3630dbc102563198110d322635cdaf5a0440e88c24756da5cb8
                              • Instruction Fuzzy Hash: 82110671904208ABCB20AB74DC4AFEE77BCFF11712F00016AF445EA191EF789AC1CA60
                              APIs
                                • Part of subcall function 007C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007C9BB2
                              • GetSystemMetrics.USER32(0000000F), ref: 00849FC7
                              • GetSystemMetrics.USER32(0000000F), ref: 00849FE7
                              • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0084A224
                              • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0084A242
                              • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0084A263
                              • ShowWindow.USER32(00000003,00000000), ref: 0084A282
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 0084A2A7
                              • DefDlgProcW.USER32(?,00000005,?,?), ref: 0084A2CA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                              • String ID:
                              • API String ID: 1211466189-0
                              • Opcode ID: cfa2600791feda47e4410ac7a1c10ca1013f761378e6637d5e52cee1dbe0d7db
                              • Instruction ID: 16be15c9631476998185123445340289ee5e948179f8a3665175c0a5948b9631
                              • Opcode Fuzzy Hash: cfa2600791feda47e4410ac7a1c10ca1013f761378e6637d5e52cee1dbe0d7db
                              • Instruction Fuzzy Hash: BEB1A831640229EFDF18CF68C9857AA7BB2FF48701F088169EC49DF295DB71AA40DB51
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _wcslen$LocalTime
                              • String ID:
                              • API String ID: 952045576-0
                              • Opcode ID: 04c5372de8eb1873e21e32fb3d03d5a2fb39121935eb3c7a8b5c5d4eb1ae946c
                              • Instruction ID: 389caaa2f7e6486d3cd412b7bc9ee63a3f130b795d9126dbcf6affb63562bb78
                              • Opcode Fuzzy Hash: 04c5372de8eb1873e21e32fb3d03d5a2fb39121935eb3c7a8b5c5d4eb1ae946c
                              • Instruction Fuzzy Hash: 38413066C10118B6CB11ABA4CC8A9CFB7BCBF45710F508567E914E3221EB38F655C7A5
                              APIs
                              • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0080682C,00000004,00000000,00000000), ref: 007CF953
                              • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,0080682C,00000004,00000000,00000000), ref: 0080F3D1
                              • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0080682C,00000004,00000000,00000000), ref: 0080F454
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ShowWindow
                              • String ID:
                              • API String ID: 1268545403-0
                              • Opcode ID: dcc60f7b1e1924092b7bd7857935c668a3cbd63d90f476103a4c1dca10821bc4
                              • Instruction ID: a6453ec4c8fbcb9c122900d419848f6c3bd1d1ff11f5d25f6df2d3bbed559c43
                              • Opcode Fuzzy Hash: dcc60f7b1e1924092b7bd7857935c668a3cbd63d90f476103a4c1dca10821bc4
                              • Instruction Fuzzy Hash: 5D410B31604640BECFB99B2D8C88F6A7B97BB57314F15843DE547D6AA1C639B880CB11
                              APIs
                              • DeleteObject.GDI32(00000000), ref: 00842D1B
                              • GetDC.USER32(00000000), ref: 00842D23
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00842D2E
                              • ReleaseDC.USER32(00000000,00000000), ref: 00842D3A
                              • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00842D76
                              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00842D87
                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00845A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00842DC2
                              • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00842DE1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                              • String ID:
                              • API String ID: 3864802216-0
                              • Opcode ID: 2a8bf2ac24aa6f3025763c7968ff8f80a9c87bca0a46c706d2a769a39dc1b95d
                              • Instruction ID: 8d1d835def44a4b617544cbfb1d019268fe8f89c87f6e9589d48514b21c2f79b
                              • Opcode Fuzzy Hash: 2a8bf2ac24aa6f3025763c7968ff8f80a9c87bca0a46c706d2a769a39dc1b95d
                              • Instruction Fuzzy Hash: C5318B76202618BBEB618F548C8AFEB3BADFB1A715F044055FE08DA291C6759C40CBA0
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _memcmp
                              • String ID:
                              • API String ID: 2931989736-0
                              • Opcode ID: 9b1c59b45cdc702fe540f14d4b847d40414fb1de738304dc1a0ade642da27afd
                              • Instruction ID: 9933a1819148baa94e5a3b837b3675173f2c4f3209ea0b72ae873b3b79142542
                              • Opcode Fuzzy Hash: 9b1c59b45cdc702fe540f14d4b847d40414fb1de738304dc1a0ade642da27afd
                              • Instruction Fuzzy Hash: 0F21A461640A1DFBD21456219E82FFA336CFFB1398F840025FE05DA782F768ED5085E5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID: NULL Pointer assignment$Not an Object type
                              • API String ID: 0-572801152
                              • Opcode ID: da6cc382f42540bc0aafdb1968fd08e0b0682d8ec6718eb771f79730019e961a
                              • Instruction ID: d87ce0b7debc63f3d11874e6f96025d6e8097110919a3ee400aabcfa78b44c87
                              • Opcode Fuzzy Hash: da6cc382f42540bc0aafdb1968fd08e0b0682d8ec6718eb771f79730019e961a
                              • Instruction Fuzzy Hash: 4DD1B171A0060A9FDF14CFA8C891BAEB7B5FF88344F148469E915EB281E771DD45CB90
                              APIs
                              • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,007F17FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 007F15CE
                              • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,007F17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 007F1651
                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,007F17FB,?,007F17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 007F16E4
                              • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,007F17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 007F16FB
                                • Part of subcall function 007E3820: RtlAllocateHeap.NTDLL(00000000,?,00881444,?,007CFDF5,?,?,007BA976,00000010,00881440,007B13FC,?,007B13C6,?,007B1129), ref: 007E3852
                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,007F17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 007F1777
                              • __freea.LIBCMT ref: 007F17A2
                              • __freea.LIBCMT ref: 007F17AE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                              • String ID:
                              • API String ID: 2829977744-0
                              • Opcode ID: 13f48d208eae259ae6b90c8f67263c1a8beb31bb93aa49b45ec4708bf5d1ee54
                              • Instruction ID: f960eb553dcd8e8399dd4a0c7bd2b636a07a0008b8c6d75e4a4fc859b04bd888
                              • Opcode Fuzzy Hash: 13f48d208eae259ae6b90c8f67263c1a8beb31bb93aa49b45ec4708bf5d1ee54
                              • Instruction Fuzzy Hash: 3B91D272E0020EDADB209E75C885AFE7BB5AF49310F980659EA05E7341DB3DCC40CBA0
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Variant$ClearInit
                              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                              • API String ID: 2610073882-625585964
                              • Opcode ID: 0a4dfeae11af0bc01e7e5733605be44dd13b2f6b04627bc95ea70524440fedb0
                              • Instruction ID: b69d16cf29bdf4d5597274a6f0b3bd00897730b82014934abe181b4b8a4ff24a
                              • Opcode Fuzzy Hash: 0a4dfeae11af0bc01e7e5733605be44dd13b2f6b04627bc95ea70524440fedb0
                              • Instruction Fuzzy Hash: 4C918071A00219ABDF20CFA4C849FAEBBB8FF86714F108559F515EB281D770A945CFA0
                              APIs
                              • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 0082125C
                              • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00821284
                              • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 008212A8
                              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 008212D8
                              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 0082135F
                              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 008213C4
                              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00821430
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ArraySafe$Data$Access$UnaccessVartype
                              • String ID:
                              • API String ID: 2550207440-0
                              • Opcode ID: 6baedcfb2dcb52a449c19a6e8ea6c4920b25094feb3bda93baa6ec8c69242a24
                              • Instruction ID: 69118c65de981e0fd4ed82761f028aa11aeaf672254865f0d3299f610373332c
                              • Opcode Fuzzy Hash: 6baedcfb2dcb52a449c19a6e8ea6c4920b25094feb3bda93baa6ec8c69242a24
                              • Instruction Fuzzy Hash: F391F875A00229DFDF10DF98E888BBEB7B6FF55314F204029E540E7291D778A981CB95
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ObjectSelect$BeginCreatePath
                              • String ID:
                              • API String ID: 3225163088-0
                              • Opcode ID: d1438ddd6a0d4058aef5065cda5dac30633742fd29149990b6214ed33295c35e
                              • Instruction ID: c39692197ff473fc4b91154692a539489bfa86297fe9fe4bd10bf905995b3f3f
                              • Opcode Fuzzy Hash: d1438ddd6a0d4058aef5065cda5dac30633742fd29149990b6214ed33295c35e
                              • Instruction Fuzzy Hash: 90912871D00219EFCB54CFA9CC88AEEBBB8FF49320F148459E515B7291D778AA51CB60
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 0083396B
                              • CharUpperBuffW.USER32(?,?), ref: 00833A7A
                              • _wcslen.LIBCMT ref: 00833A8A
                              • VariantClear.OLEAUT32(?), ref: 00833C1F
                                • Part of subcall function 00820CDF: VariantInit.OLEAUT32(00000000), ref: 00820D1F
                                • Part of subcall function 00820CDF: VariantCopy.OLEAUT32(?,?), ref: 00820D28
                                • Part of subcall function 00820CDF: VariantClear.OLEAUT32(?), ref: 00820D34
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                              • String ID: AUTOIT.ERROR$Incorrect Parameter format
                              • API String ID: 4137639002-1221869570
                              • Opcode ID: 6938be363450651657b940a4b5642adce8350f9ab51e42f3ba9d27e062ce3d29
                              • Instruction ID: 6daf9bec3c81aaeed986939b92f2ebdfce75beaf5306c47a06590a572782942d
                              • Opcode Fuzzy Hash: 6938be363450651657b940a4b5642adce8350f9ab51e42f3ba9d27e062ce3d29
                              • Instruction Fuzzy Hash: B19122746083059FC704EF28C48596ABBE4FF89314F14882DF89ADB351DB35EA45CB92
                              APIs
                                • Part of subcall function 0081000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0080FF41,80070057,?,?,?,0081035E), ref: 0081002B
                                • Part of subcall function 0081000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0080FF41,80070057,?,?), ref: 00810046
                                • Part of subcall function 0081000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0080FF41,80070057,?,?), ref: 00810054
                                • Part of subcall function 0081000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0080FF41,80070057,?), ref: 00810064
                              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00834C51
                              • _wcslen.LIBCMT ref: 00834D59
                              • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00834DCF
                              • CoTaskMemFree.OLE32(?), ref: 00834DDA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                              • String ID: NULL Pointer assignment
                              • API String ID: 614568839-2785691316
                              • Opcode ID: 8197c466b9303bf2e389d5a8b1627b59e7f71fae024a986f9e8e7a4a52c2cac5
                              • Instruction ID: ea7331fc2bc5830537dbbc4625f427f2d856cb5394e85750d15b112607c18346
                              • Opcode Fuzzy Hash: 8197c466b9303bf2e389d5a8b1627b59e7f71fae024a986f9e8e7a4a52c2cac5
                              • Instruction Fuzzy Hash: B4910271D0021DEBDF10DFA4C895AEEB7B8FF48314F10816AE915A7251EB34AA45CFA0
                              APIs
                              • GetMenu.USER32(?), ref: 00842183
                              • GetMenuItemCount.USER32(00000000), ref: 008421B5
                              • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 008421DD
                              • _wcslen.LIBCMT ref: 00842213
                              • GetMenuItemID.USER32(?,?), ref: 0084224D
                              • GetSubMenu.USER32(?,?), ref: 0084225B
                                • Part of subcall function 00813A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00813A57
                                • Part of subcall function 00813A3D: GetCurrentThreadId.KERNEL32 ref: 00813A5E
                                • Part of subcall function 00813A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,008125B3), ref: 00813A65
                              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 008422E3
                                • Part of subcall function 0081E97B: Sleep.KERNEL32 ref: 0081E9F3
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                              • String ID:
                              • API String ID: 4196846111-0
                              • Opcode ID: 801cb999564575c27da0f44324de32f8222f7569adf2228f86492fa83bb65746
                              • Instruction ID: e6cda4d440ac6c76116605662989f93abe92810b6398822c8ff8b9d760ee3586
                              • Opcode Fuzzy Hash: 801cb999564575c27da0f44324de32f8222f7569adf2228f86492fa83bb65746
                              • Instruction Fuzzy Hash: 1B718D35A04219EFCB10EF68C885AAEB7B5FF88314F548499F816EB341DB74A941CB90
                              APIs
                              • IsWindow.USER32(01745C08), ref: 00847F37
                              • IsWindowEnabled.USER32(01745C08), ref: 00847F43
                              • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 0084801E
                              • SendMessageW.USER32(01745C08,000000B0,?,?), ref: 00848051
                              • IsDlgButtonChecked.USER32(?,?), ref: 00848089
                              • GetWindowLongW.USER32(01745C08,000000EC), ref: 008480AB
                              • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 008480C3
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                              • String ID:
                              • API String ID: 4072528602-0
                              • Opcode ID: 315589bd96fecb5f8b0bed77a461c0223da951321f09e8f23d330467babf746d
                              • Instruction ID: 36cca413520b2b0f99ddd7e6c35bfe123b34de5d60a9fdc0c7cbeda76e369020
                              • Opcode Fuzzy Hash: 315589bd96fecb5f8b0bed77a461c0223da951321f09e8f23d330467babf746d
                              • Instruction Fuzzy Hash: 65717B34609648EFEF219F64CC84FAABBB9FF1A300F14445AE955D7261CB31AC49DB20
                              APIs
                              • GetParent.USER32(?), ref: 0081AEF9
                              • GetKeyboardState.USER32(?), ref: 0081AF0E
                              • SetKeyboardState.USER32(?), ref: 0081AF6F
                              • PostMessageW.USER32(?,00000101,00000010,?), ref: 0081AF9D
                              • PostMessageW.USER32(?,00000101,00000011,?), ref: 0081AFBC
                              • PostMessageW.USER32(?,00000101,00000012,?), ref: 0081AFFD
                              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 0081B020
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessagePost$KeyboardState$Parent
                              • String ID:
                              • API String ID: 87235514-0
                              • Opcode ID: 7c2ff83f1b8bb5f65496e3c68cdd68329b750ec523ddf89554eb63cc92962717
                              • Instruction ID: daaef3bf9fbe884a05e94011962fe118d78b88c63b485cab95f6d9b616464a8f
                              • Opcode Fuzzy Hash: 7c2ff83f1b8bb5f65496e3c68cdd68329b750ec523ddf89554eb63cc92962717
                              • Instruction Fuzzy Hash: 0951D3A06056D53DFB364234C845BFA7EADBF06304F088489F1D9D54C2D798A8C9D761
                              APIs
                              • GetParent.USER32(00000000), ref: 0081AD19
                              • GetKeyboardState.USER32(?), ref: 0081AD2E
                              • SetKeyboardState.USER32(?), ref: 0081AD8F
                              • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 0081ADBB
                              • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 0081ADD8
                              • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 0081AE17
                              • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 0081AE38
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessagePost$KeyboardState$Parent
                              • String ID:
                              • API String ID: 87235514-0
                              • Opcode ID: 66876ec56975f88d7a196934986750a947e2f527e023f05b9cf515eba92e285a
                              • Instruction ID: 64e42eea90bc66f171473a7e24b011b4b9dee5810eefa3c1de4163f44fdc658d
                              • Opcode Fuzzy Hash: 66876ec56975f88d7a196934986750a947e2f527e023f05b9cf515eba92e285a
                              • Instruction Fuzzy Hash: 2C51C5A15057D53DFB3A8264CC95BFA7E9CBF46304F088488E1D9C58C2D294ACD8D752
                              APIs
                              • GetConsoleCP.KERNEL32(007F3CD6,?,?,?,?,?,?,?,?,007E5BA3,?,?,007F3CD6,?,?), ref: 007E5470
                              • __fassign.LIBCMT ref: 007E54EB
                              • __fassign.LIBCMT ref: 007E5506
                              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,007F3CD6,00000005,00000000,00000000), ref: 007E552C
                              • WriteFile.KERNEL32(?,007F3CD6,00000000,007E5BA3,00000000,?,?,?,?,?,?,?,?,?,007E5BA3,?), ref: 007E554B
                              • WriteFile.KERNEL32(?,?,00000001,007E5BA3,00000000,?,?,?,?,?,?,?,?,?,007E5BA3,?), ref: 007E5584
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                              • String ID:
                              • API String ID: 1324828854-0
                              • Opcode ID: 68a802c488cecacd979064e183d00ecd0cc90d5eb5bf0403831b2718933f3c8c
                              • Instruction ID: dacc7c6475ec322bf08e78eeec23da1f53e2c8c9574a45080d5e5ac792db6e95
                              • Opcode Fuzzy Hash: 68a802c488cecacd979064e183d00ecd0cc90d5eb5bf0403831b2718933f3c8c
                              • Instruction Fuzzy Hash: DD51F370A016889FDB10CFA9D845AEEBBFAFF0D304F14401AF555E7292E734AA50CB60
                              APIs
                                • Part of subcall function 0083304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0083307A
                                • Part of subcall function 0083304E: _wcslen.LIBCMT ref: 0083309B
                              • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00831112
                              • WSAGetLastError.WSOCK32 ref: 00831121
                              • WSAGetLastError.WSOCK32 ref: 008311C9
                              • closesocket.WSOCK32(00000000), ref: 008311F9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                              • String ID:
                              • API String ID: 2675159561-0
                              • Opcode ID: aa80fb04d662afc9f981e1a1107a232f5b826f3ea205324764ac09d89f51b4fd
                              • Instruction ID: 8fc72b3eb03d402af1503b91e775391a531c19a66e874b557d7537fc45723185
                              • Opcode Fuzzy Hash: aa80fb04d662afc9f981e1a1107a232f5b826f3ea205324764ac09d89f51b4fd
                              • Instruction Fuzzy Hash: CF41C035600208AFDB109F18C889BEEBBA9FF85768F148059F915DB291C774AD41CBE1
                              APIs
                                • Part of subcall function 0081DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0081CF22,?), ref: 0081DDFD
                                • Part of subcall function 0081DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0081CF22,?), ref: 0081DE16
                              • lstrcmpiW.KERNEL32(?,?), ref: 0081CF45
                              • MoveFileW.KERNEL32(?,?), ref: 0081CF7F
                              • _wcslen.LIBCMT ref: 0081D005
                              • _wcslen.LIBCMT ref: 0081D01B
                              • SHFileOperationW.SHELL32(?), ref: 0081D061
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                              • String ID: \*.*
                              • API String ID: 3164238972-1173974218
                              • Opcode ID: 02ccf2360dced0eb2229c3ff1ece7d7324274acd33aa8fda42f86dc179f51871
                              • Instruction ID: b6d8cd6df0018168083554ed81900cc52b34d5308be313d6f0a8a5e3fcfb86c9
                              • Opcode Fuzzy Hash: 02ccf2360dced0eb2229c3ff1ece7d7324274acd33aa8fda42f86dc179f51871
                              • Instruction Fuzzy Hash: 55415FB18452199FDF12EFA4D985ADEB7BDFF08380F1000A6E505EB141EE74A689CB50
                              APIs
                              • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00842E1C
                              • GetWindowLongW.USER32(?,000000F0), ref: 00842E4F
                              • GetWindowLongW.USER32(?,000000F0), ref: 00842E84
                              • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00842EB6
                              • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00842EE0
                              • GetWindowLongW.USER32(?,000000F0), ref: 00842EF1
                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00842F0B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: LongWindow$MessageSend
                              • String ID:
                              • API String ID: 2178440468-0
                              • Opcode ID: 05960b333e27ea0bedafb902aafc1eb931dd9eebbd26dd56047a1d36ada3867f
                              • Instruction ID: db0c86f74fd0b533bcee217cc3ab0a5ff1fa3f74fdfeea95374af0de6c00b9bf
                              • Opcode Fuzzy Hash: 05960b333e27ea0bedafb902aafc1eb931dd9eebbd26dd56047a1d36ada3867f
                              • Instruction Fuzzy Hash: 47311234609248AFEB60CF58DC88F653BE8FB9A714F9501A4F915CB2B2CB71AC41DB01
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00817769
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0081778F
                              • SysAllocString.OLEAUT32(00000000), ref: 00817792
                              • SysAllocString.OLEAUT32(?), ref: 008177B0
                              • SysFreeString.OLEAUT32(?), ref: 008177B9
                              • StringFromGUID2.OLE32(?,?,00000028), ref: 008177DE
                              • SysAllocString.OLEAUT32(?), ref: 008177EC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                              • String ID:
                              • API String ID: 3761583154-0
                              • Opcode ID: bc35cb86fc725625e38f51081ab3baa72aa7ec1a2b3ec120432a7548d96acc49
                              • Instruction ID: c09d96912ef472a9659014b43281c070289188b6ff4d46ee32eca98d83a8cad1
                              • Opcode Fuzzy Hash: bc35cb86fc725625e38f51081ab3baa72aa7ec1a2b3ec120432a7548d96acc49
                              • Instruction Fuzzy Hash: DD219C7A605219AFDB10AFA8CC88DFA73ACFF09364B048429FA15DB191D6749C81C764
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00817842
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00817868
                              • SysAllocString.OLEAUT32(00000000), ref: 0081786B
                              • SysAllocString.OLEAUT32 ref: 0081788C
                              • SysFreeString.OLEAUT32 ref: 00817895
                              • StringFromGUID2.OLE32(?,?,00000028), ref: 008178AF
                              • SysAllocString.OLEAUT32(?), ref: 008178BD
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                              • String ID:
                              • API String ID: 3761583154-0
                              • Opcode ID: 882e7b2b65a268c5209c3315800dece2ce73ae4b4aa70e6f27b9d1975da12d52
                              • Instruction ID: 15a0a2aa352e7835d3628aaa5ccc35edd1ae092a56bd61a10fab9e2e7b81d063
                              • Opcode Fuzzy Hash: 882e7b2b65a268c5209c3315800dece2ce73ae4b4aa70e6f27b9d1975da12d52
                              • Instruction Fuzzy Hash: F0213E75609208AF9B10AFA8DC88DEA77BCFF097607108139F915CB2A1D674DC81CB78
                              APIs
                              • GetStdHandle.KERNEL32(0000000C), ref: 008204F2
                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0082052E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CreateHandlePipe
                              • String ID: nul
                              • API String ID: 1424370930-2873401336
                              • Opcode ID: 4eadd0d0f406ed8b37d85d1a844c9417d68d7bf44d1dd90423ea920de8a05be2
                              • Instruction ID: 8f387ed2f0c2db72fc2c2410181b423b9adc0da78c6ef4113ae05e63b9ebc45c
                              • Opcode Fuzzy Hash: 4eadd0d0f406ed8b37d85d1a844c9417d68d7bf44d1dd90423ea920de8a05be2
                              • Instruction Fuzzy Hash: 9F216275600329ABDB209F69ED44A5A77F8FF45724F204A19F8A1E62E1D7B09980CF60
                              APIs
                              • GetStdHandle.KERNEL32(000000F6), ref: 008205C6
                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00820601
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CreateHandlePipe
                              • String ID: nul
                              • API String ID: 1424370930-2873401336
                              • Opcode ID: d1d30adf5126f0eb903041bf036a9491207d0c5c8829c9e4900feedd0499b632
                              • Instruction ID: 0a50b54d4eef082041caebc020258a3c34bedfe85ce6e8c1ce5863e85a8a15e9
                              • Opcode Fuzzy Hash: d1d30adf5126f0eb903041bf036a9491207d0c5c8829c9e4900feedd0499b632
                              • Instruction Fuzzy Hash: 28216775500325AFDB209F69EC44A5A77E8FF95724F200A19F8A1E72E6D7B099A0CF10
                              APIs
                                • Part of subcall function 007B600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 007B604C
                                • Part of subcall function 007B600E: GetStockObject.GDI32(00000011), ref: 007B6060
                                • Part of subcall function 007B600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 007B606A
                              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00844112
                              • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0084411F
                              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0084412A
                              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00844139
                              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00844145
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessageSend$CreateObjectStockWindow
                              • String ID: Msctls_Progress32
                              • API String ID: 1025951953-3636473452
                              • Opcode ID: 74233505dac18087fe67519f97f4bef570f99e2ec352a1962b501147ec7b8ae8
                              • Instruction ID: 48f1f3db62b34d7c1d21f2766930cbb49648fec5eaff06b5cc8e436533e29a80
                              • Opcode Fuzzy Hash: 74233505dac18087fe67519f97f4bef570f99e2ec352a1962b501147ec7b8ae8
                              • Instruction Fuzzy Hash: B41190B214021DBEEF119E64CC86EE77F5DFF18798F014111BA18E2150CA769C21DBA4
                              APIs
                                • Part of subcall function 007ED7A3: _free.LIBCMT ref: 007ED7CC
                              • _free.LIBCMT ref: 007ED82D
                                • Part of subcall function 007E29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007ED7D1,00000000,00000000,00000000,00000000,?,007ED7F8,00000000,00000007,00000000,?,007EDBF5,00000000), ref: 007E29DE
                                • Part of subcall function 007E29C8: GetLastError.KERNEL32(00000000,?,007ED7D1,00000000,00000000,00000000,00000000,?,007ED7F8,00000000,00000007,00000000,?,007EDBF5,00000000,00000000), ref: 007E29F0
                              • _free.LIBCMT ref: 007ED838
                              • _free.LIBCMT ref: 007ED843
                              • _free.LIBCMT ref: 007ED897
                              • _free.LIBCMT ref: 007ED8A2
                              • _free.LIBCMT ref: 007ED8AD
                              • _free.LIBCMT ref: 007ED8B8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                              • Instruction ID: bb49280d3295ce41be947cc3099dc98e118f2387f72571b85a4e8dd66a6e4271
                              • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                              • Instruction Fuzzy Hash: 3E112171542B88EAD531BFB2CC4FFCB7BDC6F08700F404825B699A64A3DA6DB9064A50
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0081DA74
                              • LoadStringW.USER32(00000000), ref: 0081DA7B
                              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0081DA91
                              • LoadStringW.USER32(00000000), ref: 0081DA98
                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0081DADC
                              Strings
                              • %s (%d) : ==> %s: %s %s, xrefs: 0081DAB9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: HandleLoadModuleString$Message
                              • String ID: %s (%d) : ==> %s: %s %s
                              • API String ID: 4072794657-3128320259
                              • Opcode ID: 0c10b0d34af12b616334150b5399298cc02a490a04e45654805d7876532d5ec1
                              • Instruction ID: 397092b9d2479e009854f95dc3065eeb54fcf66dcdef4eb4466dc10a41d40ec7
                              • Opcode Fuzzy Hash: 0c10b0d34af12b616334150b5399298cc02a490a04e45654805d7876532d5ec1
                              • Instruction Fuzzy Hash: 6D016DF69002187FE750EBE49D89EEB376CFB09305F404496B746E2041EA749E848F74
                              APIs
                              • InterlockedExchange.KERNEL32(01750EC8,01750EC8), ref: 0082097B
                              • EnterCriticalSection.KERNEL32(01750EA8,00000000), ref: 0082098D
                              • TerminateThread.KERNEL32(?,000001F6), ref: 0082099B
                              • WaitForSingleObject.KERNEL32(?,000003E8), ref: 008209A9
                              • CloseHandle.KERNEL32(?), ref: 008209B8
                              • InterlockedExchange.KERNEL32(01750EC8,000001F6), ref: 008209C8
                              • LeaveCriticalSection.KERNEL32(01750EA8), ref: 008209CF
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                              • String ID:
                              • API String ID: 3495660284-0
                              • Opcode ID: f8f19885ec25f99b793cb3409d946e5655ed91dabc2f03c6761e76172889a649
                              • Instruction ID: c27ea578c84097ac68dfa3844e3a88c0e6e700d7df2165cc86b00996453fc88a
                              • Opcode Fuzzy Hash: f8f19885ec25f99b793cb3409d946e5655ed91dabc2f03c6761e76172889a649
                              • Instruction Fuzzy Hash: EFF0EC36543A22BBD7915FA4EE8DBD6BB39FF06702F402025F202908A1C7B594A5CF90
                              APIs
                              • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00831DC0
                              • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00831DE1
                              • WSAGetLastError.WSOCK32 ref: 00831DF2
                              • htons.WSOCK32(?,?,?,?,?), ref: 00831EDB
                              • inet_ntoa.WSOCK32(?), ref: 00831E8C
                                • Part of subcall function 008139E8: _strlen.LIBCMT ref: 008139F2
                                • Part of subcall function 00833224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,0082EC0C), ref: 00833240
                              • _strlen.LIBCMT ref: 00831F35
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                              • String ID:
                              • API String ID: 3203458085-0
                              • Opcode ID: ea767f279a429b7ecf9b60dbdcca3f1969ed6bae1aa41528722976ae23e0aa7a
                              • Instruction ID: 24f9ec1f9ee6fdc7d3b0b1df1fee2a43731d8519edc6804243d9a3bda527edaf
                              • Opcode Fuzzy Hash: ea767f279a429b7ecf9b60dbdcca3f1969ed6bae1aa41528722976ae23e0aa7a
                              • Instruction Fuzzy Hash: B6B1CE30204340AFC724DF24C889F6A7BA5FF85718F54895CF5569B2A2CB75ED42CB92
                              APIs
                              • GetClientRect.USER32(?,?), ref: 007B5D30
                              • GetWindowRect.USER32(?,?), ref: 007B5D71
                              • ScreenToClient.USER32(?,?), ref: 007B5D99
                              • GetClientRect.USER32(?,?), ref: 007B5ED7
                              • GetWindowRect.USER32(?,?), ref: 007B5EF8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Rect$Client$Window$Screen
                              • String ID:
                              • API String ID: 1296646539-0
                              • Opcode ID: 4d16a9b7c4e20251a851246524c987ba5d43520c1eeac7b6ca8907a455d86baf
                              • Instruction ID: 735e8d0b6caff71039bd0a7ef852065b70e4b6c7056a287e9183832cdee80c16
                              • Opcode Fuzzy Hash: 4d16a9b7c4e20251a851246524c987ba5d43520c1eeac7b6ca8907a455d86baf
                              • Instruction Fuzzy Hash: 00B15739A00A4ADBDB10CFA9C4807FAB7F1FF58310F14851AE9A9D7250DB38EA51DB54
                              APIs
                              • __allrem.LIBCMT ref: 007E00BA
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007E00D6
                              • __allrem.LIBCMT ref: 007E00ED
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007E010B
                              • __allrem.LIBCMT ref: 007E0122
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007E0140
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                              • String ID:
                              • API String ID: 1992179935-0
                              • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                              • Instruction ID: b20514696396fda7d49a5843c09301fa8ca21e88b1e6ecd21a39ffc6a3bbf7db
                              • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                              • Instruction Fuzzy Hash: 49810672602746EBE7209F2ACC45B6F73F9AF49324F24453AF511DA381E7B8D9408790
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,007D82D9,007D82D9,?,?,?,007E644F,00000001,00000001,8BE85006), ref: 007E6258
                              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,007E644F,00000001,00000001,8BE85006,?,?,?), ref: 007E62DE
                              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 007E63D8
                              • __freea.LIBCMT ref: 007E63E5
                                • Part of subcall function 007E3820: RtlAllocateHeap.NTDLL(00000000,?,00881444,?,007CFDF5,?,?,007BA976,00000010,00881440,007B13FC,?,007B13C6,?,007B1129), ref: 007E3852
                              • __freea.LIBCMT ref: 007E63EE
                              • __freea.LIBCMT ref: 007E6413
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide__freea$AllocateHeap
                              • String ID:
                              • API String ID: 1414292761-0
                              • Opcode ID: 9402296ca708fc4792ad87e211bd88c132335c43ffb9a3d687f62096d0bfe413
                              • Instruction ID: 156c82dfe7b9aa2514b5020d008673c770ba74f8bdd7a0ea57b22a5bbd12d1d8
                              • Opcode Fuzzy Hash: 9402296ca708fc4792ad87e211bd88c132335c43ffb9a3d687f62096d0bfe413
                              • Instruction Fuzzy Hash: 7E510472602296ABDB258F66CC85EBF77A9EF58790F144629FD05D7180EB38DC40C6A0
                              APIs
                                • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                • Part of subcall function 0083C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0083B6AE,?,?), ref: 0083C9B5
                                • Part of subcall function 0083C998: _wcslen.LIBCMT ref: 0083C9F1
                                • Part of subcall function 0083C998: _wcslen.LIBCMT ref: 0083CA68
                                • Part of subcall function 0083C998: _wcslen.LIBCMT ref: 0083CA9E
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0083BCCA
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0083BD25
                              • RegCloseKey.ADVAPI32(00000000), ref: 0083BD6A
                              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0083BD99
                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0083BDF3
                              • RegCloseKey.ADVAPI32(?), ref: 0083BDFF
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                              • String ID:
                              • API String ID: 1120388591-0
                              • Opcode ID: e0a1402e4c48c0bffcc741d21e5fa45a366339bb88833c57e0bda742dc4c5d4a
                              • Instruction ID: 2a2830a9a89c550ffab2c42ac810b7802420bb4711ecf27d7a727d71da4d3fae
                              • Opcode Fuzzy Hash: e0a1402e4c48c0bffcc741d21e5fa45a366339bb88833c57e0bda742dc4c5d4a
                              • Instruction Fuzzy Hash: 7281A070208241EFD714DF24C895E6ABBE5FF84308F14895DF6598B2A2DB31ED45CB92
                              APIs
                              • VariantInit.OLEAUT32(00000035), ref: 0080F7B9
                              • SysAllocString.OLEAUT32(00000001), ref: 0080F860
                              • VariantCopy.OLEAUT32(0080FA64,00000000), ref: 0080F889
                              • VariantClear.OLEAUT32(0080FA64), ref: 0080F8AD
                              • VariantCopy.OLEAUT32(0080FA64,00000000), ref: 0080F8B1
                              • VariantClear.OLEAUT32(?), ref: 0080F8BB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Variant$ClearCopy$AllocInitString
                              • String ID:
                              • API String ID: 3859894641-0
                              • Opcode ID: c0daa87be509465dc15cb7dc44de345f60b467517157a08ccb9cd5abaf162445
                              • Instruction ID: 4b932705aeb3ec34ec0f726314d81d7ebfaa5aede649a36723e624c1718585a2
                              • Opcode Fuzzy Hash: c0daa87be509465dc15cb7dc44de345f60b467517157a08ccb9cd5abaf162445
                              • Instruction Fuzzy Hash: E7511731600314EADFB0AB65DC95B69B7A8FF45314B20C42AEA02DF6D3D7748C40C796
                              APIs
                                • Part of subcall function 007B7620: _wcslen.LIBCMT ref: 007B7625
                                • Part of subcall function 007B6B57: _wcslen.LIBCMT ref: 007B6B6A
                              • GetOpenFileNameW.COMDLG32(00000058), ref: 008294E5
                              • _wcslen.LIBCMT ref: 00829506
                              • _wcslen.LIBCMT ref: 0082952D
                              • GetSaveFileNameW.COMDLG32(00000058), ref: 00829585
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _wcslen$FileName$OpenSave
                              • String ID: X
                              • API String ID: 83654149-3081909835
                              • Opcode ID: e2b07fec77a46ba926aa3e5e5b26b60525466e101fa89309978cc10306fee323
                              • Instruction ID: 2fbcf54583fa761b377acb6f7820c5eccfc9df1326cc8bcf9d45b17c50c0e9f8
                              • Opcode Fuzzy Hash: e2b07fec77a46ba926aa3e5e5b26b60525466e101fa89309978cc10306fee323
                              • Instruction Fuzzy Hash: 71E1AE31604310DFC724EF24D889BAAB7E4FF84314F14896DE9999B2A2DB34DD45CB92
                              APIs
                                • Part of subcall function 007C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007C9BB2
                              • BeginPaint.USER32(?,?,?), ref: 007C9241
                              • GetWindowRect.USER32(?,?), ref: 007C92A5
                              • ScreenToClient.USER32(?,?), ref: 007C92C2
                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 007C92D3
                              • EndPaint.USER32(?,?,?,?,?), ref: 007C9321
                              • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 008071EA
                                • Part of subcall function 007C9339: BeginPath.GDI32(00000000), ref: 007C9357
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                              • String ID:
                              • API String ID: 3050599898-0
                              • Opcode ID: e331c05b1789766830afaba4f11a83c2b7602612c1e4d8683a46b1080adbbe3f
                              • Instruction ID: ac66086d4325e7e2a011fe797acfbd339b212d36ffc8b43932e60ec032e0dff3
                              • Opcode Fuzzy Hash: e331c05b1789766830afaba4f11a83c2b7602612c1e4d8683a46b1080adbbe3f
                              • Instruction Fuzzy Hash: 1E418C70505201EFDB51DF28CC88FAA7BA8FB56320F14066DFA95C72E1CB35A846DB61
                              APIs
                              • InterlockedExchange.KERNEL32(?,000001F5), ref: 0082080C
                              • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00820847
                              • EnterCriticalSection.KERNEL32(?), ref: 00820863
                              • LeaveCriticalSection.KERNEL32(?), ref: 008208DC
                              • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 008208F3
                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00820921
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                              • String ID:
                              • API String ID: 3368777196-0
                              • Opcode ID: afed01b1b1b4e6232a8317980d632a37be0345a4b3b6111256bbbe8d22c4da5e
                              • Instruction ID: 05cd6cd3e21b83c3ee9e1bfccf5d61e33f8d31a31e4c79350daf2c97486b4793
                              • Opcode Fuzzy Hash: afed01b1b1b4e6232a8317980d632a37be0345a4b3b6111256bbbe8d22c4da5e
                              • Instruction Fuzzy Hash: F6416B71900215EBDF14AF64DC89A6A77B9FF04300F1440A9ED04DA297DB74DEA1DFA4
                              APIs
                              • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,0080F3AB,00000000,?,?,00000000,?,0080682C,00000004,00000000,00000000), ref: 0084824C
                              • EnableWindow.USER32(?,00000000), ref: 00848272
                              • ShowWindow.USER32(FFFFFFFF,00000000), ref: 008482D1
                              • ShowWindow.USER32(?,00000004), ref: 008482E5
                              • EnableWindow.USER32(?,00000001), ref: 0084830B
                              • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0084832F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Window$Show$Enable$MessageSend
                              • String ID:
                              • API String ID: 642888154-0
                              • Opcode ID: d34b490438f3b770e3ca7d68df8556ec132c2bfecfd2a476fa43e1cda6e6b118
                              • Instruction ID: 560e613173ccbea6f468740666c0c89179e7c25fd6238db91fbc56e709dabd04
                              • Opcode Fuzzy Hash: d34b490438f3b770e3ca7d68df8556ec132c2bfecfd2a476fa43e1cda6e6b118
                              • Instruction Fuzzy Hash: BB41A534601658EFDF51CF29CC99BE87BE5FB0A714F185269E5188B262CB71AC41CB50
                              APIs
                              • IsWindowVisible.USER32(?), ref: 00814C95
                              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00814CB2
                              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00814CEA
                              • _wcslen.LIBCMT ref: 00814D08
                              • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00814D10
                              • _wcsstr.LIBVCRUNTIME ref: 00814D1A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                              • String ID:
                              • API String ID: 72514467-0
                              • Opcode ID: 5907559136ce51b66fa596a98554a82302cda54c0ca30aa4e96fe5e557e0857f
                              • Instruction ID: dafa1353e084389a723a73f2631bd3020530227d14f701c609522a2e58ba2d6b
                              • Opcode Fuzzy Hash: 5907559136ce51b66fa596a98554a82302cda54c0ca30aa4e96fe5e557e0857f
                              • Instruction Fuzzy Hash: 9E213876205204BBEB555B39EC09EBB7BACEF45750F10907EF809CA192EA75DC81D2A0
                              APIs
                                • Part of subcall function 007B3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007B3A97,?,?,007B2E7F,?,?,?,00000000), ref: 007B3AC2
                              • _wcslen.LIBCMT ref: 0082587B
                              • CoInitialize.OLE32(00000000), ref: 00825995
                              • CoCreateInstance.OLE32(0084FCF8,00000000,00000001,0084FB68,?), ref: 008259AE
                              • CoUninitialize.OLE32 ref: 008259CC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                              • String ID: .lnk
                              • API String ID: 3172280962-24824748
                              • Opcode ID: f07f93dbc57686f00b6ebbb5e2df5cd26396f75515e79a0778075418720a209a
                              • Instruction ID: 3aa551f535abcae5cf4e8a6e1f23ddd9778886301623694da6f0f7d8d77352cb
                              • Opcode Fuzzy Hash: f07f93dbc57686f00b6ebbb5e2df5cd26396f75515e79a0778075418720a209a
                              • Instruction Fuzzy Hash: 6CD15071608611DFC714DF24D488A6ABBE5FF89720F148859F88ADB361DB31EC85CB92
                              APIs
                                • Part of subcall function 00810FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00810FCA
                                • Part of subcall function 00810FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00810FD6
                                • Part of subcall function 00810FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00810FE5
                                • Part of subcall function 00810FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00810FEC
                                • Part of subcall function 00810FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00811002
                              • GetLengthSid.ADVAPI32(?,00000000,00811335), ref: 008117AE
                              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 008117BA
                              • HeapAlloc.KERNEL32(00000000), ref: 008117C1
                              • CopySid.ADVAPI32(00000000,00000000,?), ref: 008117DA
                              • GetProcessHeap.KERNEL32(00000000,00000000,00811335), ref: 008117EE
                              • HeapFree.KERNEL32(00000000), ref: 008117F5
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                              • String ID:
                              • API String ID: 3008561057-0
                              • Opcode ID: 43388ad88ae111a0e3ddeab9fe74fcf3b32928b59066d5211acfefd5fbdad174
                              • Instruction ID: 1791a53b9c0f37753701697067b9e25a0c276fe39f103af1701c0a300f2c51dc
                              • Opcode Fuzzy Hash: 43388ad88ae111a0e3ddeab9fe74fcf3b32928b59066d5211acfefd5fbdad174
                              • Instruction Fuzzy Hash: BB118636602609EBDF109FA4CC49FEE7BADFF42359F104818E581E7294C736A980CB60
                              APIs
                              • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 008114FF
                              • OpenProcessToken.ADVAPI32(00000000), ref: 00811506
                              • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00811515
                              • CloseHandle.KERNEL32(00000004), ref: 00811520
                              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0081154F
                              • DestroyEnvironmentBlock.USERENV(00000000), ref: 00811563
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                              • String ID:
                              • API String ID: 1413079979-0
                              • Opcode ID: a206740ca971809b4b692bdef07b1e2c230afe89498ca4c7da505547bb625867
                              • Instruction ID: befebe8f913ca5f7072692a5b3c4c8e4d74bc3703ab63a3da87fb2a367805a30
                              • Opcode Fuzzy Hash: a206740ca971809b4b692bdef07b1e2c230afe89498ca4c7da505547bb625867
                              • Instruction Fuzzy Hash: BC11297660220DABDF118F98DD49FDE7BAEFF49744F044015FA05A2160C3758EA0DB61
                              APIs
                              • GetLastError.KERNEL32(?,?,007D3379,007D2FE5), ref: 007D3390
                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 007D339E
                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 007D33B7
                              • SetLastError.KERNEL32(00000000,?,007D3379,007D2FE5), ref: 007D3409
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ErrorLastValue___vcrt_
                              • String ID:
                              • API String ID: 3852720340-0
                              • Opcode ID: 8f679d1fc18ddb6b33a6122ef1b81c0675551b63e3e46570032e7ed149332895
                              • Instruction ID: 5a2af98d07fef3641b7fd9a02d44239554d3a57a71ada4ed1d44270af326a66c
                              • Opcode Fuzzy Hash: 8f679d1fc18ddb6b33a6122ef1b81c0675551b63e3e46570032e7ed149332895
                              • Instruction Fuzzy Hash: 3D012432209711FEAA242BB4BC8D5262AB8FB05379320022FF414963F1EF198D819186
                              APIs
                              • GetLastError.KERNEL32(?,?,007E5686,007F3CD6,?,00000000,?,007E5B6A,?,?,?,?,?,007DE6D1,?,00878A48), ref: 007E2D78
                              • _free.LIBCMT ref: 007E2DAB
                              • _free.LIBCMT ref: 007E2DD3
                              • SetLastError.KERNEL32(00000000,?,?,?,?,007DE6D1,?,00878A48,00000010,007B4F4A,?,?,00000000,007F3CD6), ref: 007E2DE0
                              • SetLastError.KERNEL32(00000000,?,?,?,?,007DE6D1,?,00878A48,00000010,007B4F4A,?,?,00000000,007F3CD6), ref: 007E2DEC
                              • _abort.LIBCMT ref: 007E2DF2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ErrorLast$_free$_abort
                              • String ID:
                              • API String ID: 3160817290-0
                              • Opcode ID: 30691485b4a6b20d126be4be2b8801a9c5ac44aa787ae20c930edb3673c64dcb
                              • Instruction ID: dcd59a9627bac9f6fcdb89895675d94b15d61b2987c9438e7278907d289b71f5
                              • Opcode Fuzzy Hash: 30691485b4a6b20d126be4be2b8801a9c5ac44aa787ae20c930edb3673c64dcb
                              • Instruction Fuzzy Hash: 8DF0F935607580B7C25267376C0EA1A265DBBCA7A4F314119F624D32A3EE2C88034160
                              APIs
                                • Part of subcall function 007C9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 007C9693
                                • Part of subcall function 007C9639: SelectObject.GDI32(?,00000000), ref: 007C96A2
                                • Part of subcall function 007C9639: BeginPath.GDI32(?), ref: 007C96B9
                                • Part of subcall function 007C9639: SelectObject.GDI32(?,00000000), ref: 007C96E2
                              • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00848A4E
                              • LineTo.GDI32(?,00000003,00000000), ref: 00848A62
                              • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00848A70
                              • LineTo.GDI32(?,00000000,00000003), ref: 00848A80
                              • EndPath.GDI32(?), ref: 00848A90
                              • StrokePath.GDI32(?), ref: 00848AA0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                              • String ID:
                              • API String ID: 43455801-0
                              • Opcode ID: 3d321a40a4a2f199871ad92441e7804a5175939dfea7f1ba3df9303118f39fef
                              • Instruction ID: 6fc316a5b477960c6d52a3f73b5bf95c4b115089fbf2906a7f119267e4524209
                              • Opcode Fuzzy Hash: 3d321a40a4a2f199871ad92441e7804a5175939dfea7f1ba3df9303118f39fef
                              • Instruction Fuzzy Hash: F411057600111CFFEF129F94DC88EAA7F6CFB09394F048022FA199A1A1C771AD55DBA0
                              APIs
                              • GetDC.USER32(00000000), ref: 00815218
                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 00815229
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00815230
                              • ReleaseDC.USER32(00000000,00000000), ref: 00815238
                              • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0081524F
                              • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00815261
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CapsDevice$Release
                              • String ID:
                              • API String ID: 1035833867-0
                              • Opcode ID: 2b35a14a6b9404fa82cd2ee3cf8cede32e987296bda9735f90f77c51db30cb75
                              • Instruction ID: 26fcf05aff55e071b714a06cb8017ff89b591e320e8addc1cc98217dd0ef9d72
                              • Opcode Fuzzy Hash: 2b35a14a6b9404fa82cd2ee3cf8cede32e987296bda9735f90f77c51db30cb75
                              • Instruction Fuzzy Hash: B1014F75A01719BBEB109BA69C49A5EBFBCFF49751F048066FA04E7291DA709800CFA0
                              APIs
                              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 007B1BF4
                              • MapVirtualKeyW.USER32(00000010,00000000), ref: 007B1BFC
                              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 007B1C07
                              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 007B1C12
                              • MapVirtualKeyW.USER32(00000011,00000000), ref: 007B1C1A
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 007B1C22
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Virtual
                              • String ID:
                              • API String ID: 4278518827-0
                              • Opcode ID: 63b053ac44c51eae03ab861f12dd4979592de3ca2760f43d626d9661ffc6f3f0
                              • Instruction ID: 3f8686ace90b27130a065b1dffd0cc3d05dc5a0dd8acd1c2a841b472654460b8
                              • Opcode Fuzzy Hash: 63b053ac44c51eae03ab861f12dd4979592de3ca2760f43d626d9661ffc6f3f0
                              • Instruction Fuzzy Hash: B10167B0902B5ABDE3008F6A8C85B52FFA8FF19354F00411BA15C4BA42C7F5A864CFE5
                              APIs
                              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0081EB30
                              • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0081EB46
                              • GetWindowThreadProcessId.USER32(?,?), ref: 0081EB55
                              • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0081EB64
                              • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0081EB6E
                              • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0081EB75
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                              • String ID:
                              • API String ID: 839392675-0
                              • Opcode ID: e66797af8c43b99b37343f043edbcd3cdcb46727e616ce3037a06bf5ea47335d
                              • Instruction ID: 901d6b6c9596cd258f93bb76504fc56fc0e80b314647739ba9a3f5df6893303c
                              • Opcode Fuzzy Hash: e66797af8c43b99b37343f043edbcd3cdcb46727e616ce3037a06bf5ea47335d
                              • Instruction Fuzzy Hash: D1F0BEBA202158BBE7605B629C0EEEF3E7CFFCBB11F004158FA02E1090D7A01A01C6B4
                              APIs
                              • GetClientRect.USER32(?), ref: 00807452
                              • SendMessageW.USER32(?,00001328,00000000,?), ref: 00807469
                              • GetWindowDC.USER32(?), ref: 00807475
                              • GetPixel.GDI32(00000000,?,?), ref: 00807484
                              • ReleaseDC.USER32(?,00000000), ref: 00807496
                              • GetSysColor.USER32(00000005), ref: 008074B0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ClientColorMessagePixelRectReleaseSendWindow
                              • String ID:
                              • API String ID: 272304278-0
                              • Opcode ID: acb979966e7a7a8ae8b3401b6dc3d0b94f7d225158ff5ee21d12e7a87cc43d1b
                              • Instruction ID: a1a110e5c03d7311928d127f5015a7cefbee78a13102714282868b4eb6ec928e
                              • Opcode Fuzzy Hash: acb979966e7a7a8ae8b3401b6dc3d0b94f7d225158ff5ee21d12e7a87cc43d1b
                              • Instruction Fuzzy Hash: 6D018635801605EFEB905FA4DC08BAE7BB9FB05321F224068FA16A21A1CB312E41EB14
                              APIs
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0081187F
                              • UnloadUserProfile.USERENV(?,?), ref: 0081188B
                              • CloseHandle.KERNEL32(?), ref: 00811894
                              • CloseHandle.KERNEL32(?), ref: 0081189C
                              • GetProcessHeap.KERNEL32(00000000,?), ref: 008118A5
                              • HeapFree.KERNEL32(00000000), ref: 008118AC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                              • String ID:
                              • API String ID: 146765662-0
                              • Opcode ID: 16a481885e78c2fa61b1b01d01873b95588c74c7b80c024a57098c4260f90122
                              • Instruction ID: 1c0937363f03f0a46bf8fc9774ef32a150b21399f27d2067bf766a607b505bf1
                              • Opcode Fuzzy Hash: 16a481885e78c2fa61b1b01d01873b95588c74c7b80c024a57098c4260f90122
                              • Instruction Fuzzy Hash: B1E0E53A206101BBDB415FA5ED0C90AFF3DFF4AB22B108220F22581170CB329420DF50
                              APIs
                                • Part of subcall function 007B7620: _wcslen.LIBCMT ref: 007B7625
                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0081C6EE
                              • _wcslen.LIBCMT ref: 0081C735
                              • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0081C79C
                              • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0081C7CA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ItemMenu$Info_wcslen$Default
                              • String ID: 0
                              • API String ID: 1227352736-4108050209
                              • Opcode ID: 909ec0e879a04abd3163d2494ab4493a81a32f65c3ab4f9435e5c216a945ddeb
                              • Instruction ID: eb8bf6c51b4bbe777219372a5a75404beadabe73d54c1f13d426a15ea12e24b4
                              • Opcode Fuzzy Hash: 909ec0e879a04abd3163d2494ab4493a81a32f65c3ab4f9435e5c216a945ddeb
                              • Instruction Fuzzy Hash: FE51AD716843019BD714AF28C889BEA77ECFF59314F040A2DF996D21E1DBA4D984CB52
                              APIs
                              • ShellExecuteExW.SHELL32(0000003C), ref: 0083AEA3
                                • Part of subcall function 007B7620: _wcslen.LIBCMT ref: 007B7625
                              • GetProcessId.KERNEL32(00000000), ref: 0083AF38
                              • CloseHandle.KERNEL32(00000000), ref: 0083AF67
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CloseExecuteHandleProcessShell_wcslen
                              • String ID: <$@
                              • API String ID: 146682121-1426351568
                              • Opcode ID: 55f2c6bdc8518e5e7b8c9020cb6ac88392c8c49f369e0b82041d814d904c7282
                              • Instruction ID: 0e93e18584d8fd4e031ba74f8871918c6b0a72136bb4e8682d7f72f6ddc2bcfa
                              • Opcode Fuzzy Hash: 55f2c6bdc8518e5e7b8c9020cb6ac88392c8c49f369e0b82041d814d904c7282
                              • Instruction Fuzzy Hash: 87718A75A00619DFCB18DF54C489A9EBBF4FF48314F048499E856AB3A2CB78ED41CB91
                              APIs
                              • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00817206
                              • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0081723C
                              • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0081724D
                              • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 008172CF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ErrorMode$AddressCreateInstanceProc
                              • String ID: DllGetClassObject
                              • API String ID: 753597075-1075368562
                              • Opcode ID: 38a6ffc5ca8cbca647b1fc7f10cd762c66a8f94732e9ebd2ada5964b33278f4b
                              • Instruction ID: 1ca5c98b3e6a3f8f05037f39f97756a81cdd12291725abb556c542c6cfa0c9e7
                              • Opcode Fuzzy Hash: 38a6ffc5ca8cbca647b1fc7f10cd762c66a8f94732e9ebd2ada5964b33278f4b
                              • Instruction Fuzzy Hash: D9412971A04205AFDB15CF54C884ADA7BBDFF49314B1480ADBD0ADF20AD7B1D985CBA0
                              APIs
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00843E35
                              • IsMenu.USER32(?), ref: 00843E4A
                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00843E92
                              • DrawMenuBar.USER32 ref: 00843EA5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Menu$Item$DrawInfoInsert
                              • String ID: 0
                              • API String ID: 3076010158-4108050209
                              • Opcode ID: 45180c6f9bd4b2ccfb32527353aac6a5f9f7ddb61013cd8a837b161c1244ee81
                              • Instruction ID: b52c46acbfc5dd71368a9f03236ddabf6cb1de7dcc274b189626b5d1a03da5cf
                              • Opcode Fuzzy Hash: 45180c6f9bd4b2ccfb32527353aac6a5f9f7ddb61013cd8a837b161c1244ee81
                              • Instruction Fuzzy Hash: CF414575A0220DEFDB10EF64D884AAABBB9FF49354F044129E915EB650D730AE45CF60
                              APIs
                                • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                • Part of subcall function 00813CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00813CCA
                              • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00811E66
                              • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00811E79
                              • SendMessageW.USER32(?,00000189,?,00000000), ref: 00811EA9
                                • Part of subcall function 007B6B57: _wcslen.LIBCMT ref: 007B6B6A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessageSend$_wcslen$ClassName
                              • String ID: ComboBox$ListBox
                              • API String ID: 2081771294-1403004172
                              • Opcode ID: 0163a0b856274115527c463ab6c6aa0d95de3b7a0fda01019a2ea9bc08f0663a
                              • Instruction ID: 6dd28082749322f52527f9083762dc85afc477b2eb9fa2f146637e5ffa25ed64
                              • Opcode Fuzzy Hash: 0163a0b856274115527c463ab6c6aa0d95de3b7a0fda01019a2ea9bc08f0663a
                              • Instruction Fuzzy Hash: 6B210771A00108BADF14ABA4DC4DDFFB7BDFF45354B104119FA26E71E1DB3849459620
                              APIs
                              • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00842F8D
                              • LoadLibraryW.KERNEL32(?), ref: 00842F94
                              • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00842FA9
                              • DestroyWindow.USER32(?), ref: 00842FB1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessageSend$DestroyLibraryLoadWindow
                              • String ID: SysAnimate32
                              • API String ID: 3529120543-1011021900
                              • Opcode ID: 62840c4a7149199b99da4e1aa952f25cc0ae62149e190b09335d082f571e427d
                              • Instruction ID: d45e6647133c00990e823b7ae1700e6fe0e827252d86e0245c9451369a3b9770
                              • Opcode Fuzzy Hash: 62840c4a7149199b99da4e1aa952f25cc0ae62149e190b09335d082f571e427d
                              • Instruction Fuzzy Hash: 5821AE7120820DABEB205F64DC84EBB77BDFB69364F904218F950D2190DB71DC559760
                              APIs
                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,007D4D1E,007E28E9,?,007D4CBE,007E28E9,008788B8,0000000C,007D4E15,007E28E9,00000002), ref: 007D4D8D
                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 007D4DA0
                              • FreeLibrary.KERNEL32(00000000,?,?,?,007D4D1E,007E28E9,?,007D4CBE,007E28E9,008788B8,0000000C,007D4E15,007E28E9,00000002,00000000), ref: 007D4DC3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: AddressFreeHandleLibraryModuleProc
                              • String ID: CorExitProcess$mscoree.dll
                              • API String ID: 4061214504-1276376045
                              • Opcode ID: 8400c6adf447e1ce7be9f633a421b9195ce8996fef8a6b3035f2c9ce3c026de3
                              • Instruction ID: 009cc838ae82663efe9e218ba111b8a39ed9961825e89eb936bcd1728044c400
                              • Opcode Fuzzy Hash: 8400c6adf447e1ce7be9f633a421b9195ce8996fef8a6b3035f2c9ce3c026de3
                              • Instruction Fuzzy Hash: A6F04F35A41208BBDB519F90DC49BADBFB9FF48756F0000A9F909A2360DB359940CED0
                              APIs
                              • LoadLibraryA.KERNEL32 ref: 0080D3AD
                              • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0080D3BF
                              • FreeLibrary.KERNEL32(00000000), ref: 0080D3E5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Library$AddressFreeLoadProc
                              • String ID: GetSystemWow64DirectoryW$X64
                              • API String ID: 145871493-2590602151
                              • Opcode ID: 803d85b4c19a42dda54a395bf521526526d6d7a17e6ad91fb263cb61b7087ae2
                              • Instruction ID: 50cf7d2b85a3fb04d981a5bf85736a1ed49d82a929f3706e93277faa45b8956b
                              • Opcode Fuzzy Hash: 803d85b4c19a42dda54a395bf521526526d6d7a17e6ad91fb263cb61b7087ae2
                              • Instruction Fuzzy Hash: 9EF05C75407714EBD7F117904C08A197718FF11705B558059F801E12C9EB24DD44C795
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,?,007B4EDD,?,00881418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007B4E9C
                              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 007B4EAE
                              • FreeLibrary.KERNEL32(00000000,?,?,007B4EDD,?,00881418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007B4EC0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Library$AddressFreeLoadProc
                              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                              • API String ID: 145871493-3689287502
                              • Opcode ID: 91501abc1e4e3c3b6cebd153be5206cabbfd4d53cfcfcd39315af6641b26217c
                              • Instruction ID: 2cf28801316f23443af8c7466a14622f30a442b876fc85099be98b51582b6bda
                              • Opcode Fuzzy Hash: 91501abc1e4e3c3b6cebd153be5206cabbfd4d53cfcfcd39315af6641b26217c
                              • Instruction Fuzzy Hash: 05E01D39A036225BD3B11B296C19B9F755CFF82F667050115FD05D2256DB6CCD01C5A1
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,?,007F3CDE,?,00881418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007B4E62
                              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 007B4E74
                              • FreeLibrary.KERNEL32(00000000,?,?,007F3CDE,?,00881418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007B4E87
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Library$AddressFreeLoadProc
                              • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                              • API String ID: 145871493-1355242751
                              • Opcode ID: 7891c0e88bb014a026f9a1884b5abb12965c8ba9d4e8197aa0781b516d3ca84e
                              • Instruction ID: 9e149030d5132c0ccb954c4f8892cf3a71f8393d6646c3f192616eb68c94063c
                              • Opcode Fuzzy Hash: 7891c0e88bb014a026f9a1884b5abb12965c8ba9d4e8197aa0781b516d3ca84e
                              • Instruction Fuzzy Hash: 97D01239503A615756A21B256C1CECB7B1CFF86B653054515B905E2215CF69CD01C5E1
                              APIs
                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00822C05
                              • DeleteFileW.KERNEL32(?), ref: 00822C87
                              • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00822C9D
                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00822CAE
                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00822CC0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: File$Delete$Copy
                              • String ID:
                              • API String ID: 3226157194-0
                              • Opcode ID: 15e3b36c2fbdede226f6b9ee445cf85b8cc83fe2dcf617b5ec7a7c476fea1a03
                              • Instruction ID: 63e30089b1e106abe8d7d06f8cbb448471273090a60a21a06621a022785827c6
                              • Opcode Fuzzy Hash: 15e3b36c2fbdede226f6b9ee445cf85b8cc83fe2dcf617b5ec7a7c476fea1a03
                              • Instruction Fuzzy Hash: BFB14E71900129ABDF21EBA4DC89EDEB77DFF49350F1040A6F509E6251EA349A848B61
                              APIs
                              • GetCurrentProcessId.KERNEL32 ref: 0083A427
                              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0083A435
                              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0083A468
                              • CloseHandle.KERNEL32(?), ref: 0083A63D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Process$CloseCountersCurrentHandleOpen
                              • String ID:
                              • API String ID: 3488606520-0
                              • Opcode ID: 60f922a95c2249ce0db227c371199d53537d4d707d0c83f6ba1aab96960eadcf
                              • Instruction ID: e88a837d78b4ac00a62b3dc50a748321c95022841be92e8bd062cacdef286bf5
                              • Opcode Fuzzy Hash: 60f922a95c2249ce0db227c371199d53537d4d707d0c83f6ba1aab96960eadcf
                              • Instruction Fuzzy Hash: 15A18B71604300AFD724DF24C886F2AB7E5AF84714F14885DF99ADB292DBB4ED41CB92
                              APIs
                              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00853700), ref: 007EBB91
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,0088121C,000000FF,00000000,0000003F,00000000,?,?), ref: 007EBC09
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00881270,000000FF,?,0000003F,00000000,?), ref: 007EBC36
                              • _free.LIBCMT ref: 007EBB7F
                                • Part of subcall function 007E29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007ED7D1,00000000,00000000,00000000,00000000,?,007ED7F8,00000000,00000007,00000000,?,007EDBF5,00000000), ref: 007E29DE
                                • Part of subcall function 007E29C8: GetLastError.KERNEL32(00000000,?,007ED7D1,00000000,00000000,00000000,00000000,?,007ED7F8,00000000,00000007,00000000,?,007EDBF5,00000000,00000000), ref: 007E29F0
                              • _free.LIBCMT ref: 007EBD4B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                              • String ID:
                              • API String ID: 1286116820-0
                              • Opcode ID: fcf0fb82c6287e71868a296efed0f754408fb048da87c9f7d0621dfedb676e9d
                              • Instruction ID: 2fcc91935c9eae57e1f9454c71886fc0123a347d5135a8e6ac745fa33e5973bb
                              • Opcode Fuzzy Hash: fcf0fb82c6287e71868a296efed0f754408fb048da87c9f7d0621dfedb676e9d
                              • Instruction Fuzzy Hash: 7F51FB71905249DFCB10EF6A9C899AFBFBCFF48310F10026AE554D72A1EB349D418BA0
                              APIs
                                • Part of subcall function 0081DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0081CF22,?), ref: 0081DDFD
                                • Part of subcall function 0081DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0081CF22,?), ref: 0081DE16
                                • Part of subcall function 0081E199: GetFileAttributesW.KERNEL32(?,0081CF95), ref: 0081E19A
                              • lstrcmpiW.KERNEL32(?,?), ref: 0081E473
                              • MoveFileW.KERNEL32(?,?), ref: 0081E4AC
                              • _wcslen.LIBCMT ref: 0081E5EB
                              • _wcslen.LIBCMT ref: 0081E603
                              • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 0081E650
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                              • String ID:
                              • API String ID: 3183298772-0
                              • Opcode ID: 51147a078b55d69c0d916ce7ce82d8b678ecd426660258f6de41b1658309781f
                              • Instruction ID: 26cac6b81c3406e3b3c6c13bf8bc32650a8d8f255ae7dd6e01368d19f0ea68fa
                              • Opcode Fuzzy Hash: 51147a078b55d69c0d916ce7ce82d8b678ecd426660258f6de41b1658309781f
                              • Instruction Fuzzy Hash: 765162B24087459BC724DBA4DC859DBB3ECEF85340F00491EFA89D3151EF74A688C76A
                              APIs
                                • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                • Part of subcall function 0083C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0083B6AE,?,?), ref: 0083C9B5
                                • Part of subcall function 0083C998: _wcslen.LIBCMT ref: 0083C9F1
                                • Part of subcall function 0083C998: _wcslen.LIBCMT ref: 0083CA68
                                • Part of subcall function 0083C998: _wcslen.LIBCMT ref: 0083CA9E
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0083BAA5
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0083BB00
                              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0083BB63
                              • RegCloseKey.ADVAPI32(?,?), ref: 0083BBA6
                              • RegCloseKey.ADVAPI32(00000000), ref: 0083BBB3
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                              • String ID:
                              • API String ID: 826366716-0
                              • Opcode ID: 976e26c04b20bc5a12d954d09e38dc3fbec1d8eeaebcadf6e6dbb938daf35e18
                              • Instruction ID: 915a1bf8fdf480946be1e8e1bf6379da5583708308921a02e4bb1aa5b71d09d6
                              • Opcode Fuzzy Hash: 976e26c04b20bc5a12d954d09e38dc3fbec1d8eeaebcadf6e6dbb938daf35e18
                              • Instruction Fuzzy Hash: D161BE71209241EFC314DF24C494E6ABBE9FF84318F14899CF5998B2A2DB31ED45CB92
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 00818BCD
                              • VariantClear.OLEAUT32 ref: 00818C3E
                              • VariantClear.OLEAUT32 ref: 00818C9D
                              • VariantClear.OLEAUT32(?), ref: 00818D10
                              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00818D3B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Variant$Clear$ChangeInitType
                              • String ID:
                              • API String ID: 4136290138-0
                              • Opcode ID: a192d7347853d5542ce2014cbe6a5da05734a6ca6751ca69ea49e780e344b7ca
                              • Instruction ID: 0717e7c583a6d0fa4bff7d2146e98a97055155ff2052df60ec8de89695b084e9
                              • Opcode Fuzzy Hash: a192d7347853d5542ce2014cbe6a5da05734a6ca6751ca69ea49e780e344b7ca
                              • Instruction Fuzzy Hash: 0A5167B5A00219EFCB10CF68D884AAAB7F8FF89314B158559F909DB350E730E911CF90
                              APIs
                              • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00828BAE
                              • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00828BDA
                              • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00828C32
                              • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00828C57
                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00828C5F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: PrivateProfile$SectionWrite$String
                              • String ID:
                              • API String ID: 2832842796-0
                              • Opcode ID: 68eac955741aea3c1e7edd091c72f9b7c0d8a720f5ef99a82b81590ed43611da
                              • Instruction ID: fa45f049807b4b4658e5e3b8ac8dea22e9d34fc12c947db5d23689723375dc57
                              • Opcode Fuzzy Hash: 68eac955741aea3c1e7edd091c72f9b7c0d8a720f5ef99a82b81590ed43611da
                              • Instruction Fuzzy Hash: 75514A35A00215EFCB15DF64C885EA9BBF5FF49314F088498E849AB362DB35ED51CBA0
                              APIs
                              • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00838F40
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00838FD0
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00838FEC
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00839032
                              • FreeLibrary.KERNEL32(00000000), ref: 00839052
                                • Part of subcall function 007CF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00821043,?,7644E610), ref: 007CF6E6
                                • Part of subcall function 007CF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,0080FA64,00000000,00000000,?,?,00821043,?,7644E610,?,0080FA64), ref: 007CF70D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                              • String ID:
                              • API String ID: 666041331-0
                              • Opcode ID: 60b51738f433137863be13f074e00037ba21b3dfdb835d238feef0e5b49281e2
                              • Instruction ID: a0350f6636dbbd63f69f6436dd1a36ffdc0ec5de9dcb23ca5d10eb111f0f1044
                              • Opcode Fuzzy Hash: 60b51738f433137863be13f074e00037ba21b3dfdb835d238feef0e5b49281e2
                              • Instruction Fuzzy Hash: FE514834605205DFCB14DF68C4989ADBBF1FF89314F0480A8E90AAB362DB75ED85CB90
                              APIs
                              • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00846C33
                              • SetWindowLongW.USER32(?,000000EC,?), ref: 00846C4A
                              • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00846C73
                              • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0082AB79,00000000,00000000), ref: 00846C98
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00846CC7
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Window$Long$MessageSendShow
                              • String ID:
                              • API String ID: 3688381893-0
                              • Opcode ID: 0bd301e41e89acbcd5a0d1cf7fe45fc9cea840b2b52f67f29b0494202971e972
                              • Instruction ID: bf290d726349df6672adf69598dc108a22ab4fab9ab384f58dcfef6a0b400646
                              • Opcode Fuzzy Hash: 0bd301e41e89acbcd5a0d1cf7fe45fc9cea840b2b52f67f29b0494202971e972
                              • Instruction Fuzzy Hash: EB41D935A0410CAFD724CF68CC98FA57BA9FB0B364F150258F895D72E0E771AD61DA41
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: 0eb78f96a2d8b70f85663c875dd3ea4a588c74c1f7e835f28c071646dbfae687
                              • Instruction ID: a2ace22b2959035da55e73dfb98ff87d8fb33481e20233f5ce4637c4b0a496d2
                              • Opcode Fuzzy Hash: 0eb78f96a2d8b70f85663c875dd3ea4a588c74c1f7e835f28c071646dbfae687
                              • Instruction Fuzzy Hash: FB41E232A01204DFCB24DF79C885A5DB3B9EF89310F1545ADE515EB392EA35EE02CB80
                              APIs
                              • GetCursorPos.USER32(?), ref: 007C9141
                              • ScreenToClient.USER32(00000000,?), ref: 007C915E
                              • GetAsyncKeyState.USER32(00000001), ref: 007C9183
                              • GetAsyncKeyState.USER32(00000002), ref: 007C919D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: AsyncState$ClientCursorScreen
                              • String ID:
                              • API String ID: 4210589936-0
                              • Opcode ID: c7a1f87ea00286cef786fa22f82dcbcdb86e55a9ef9ba07dfde3bf59a246bcbc
                              • Instruction ID: 53753f3889a0405dc13dd51329f2ab2f2b46feab1224bd42bfdc1a860809580f
                              • Opcode Fuzzy Hash: c7a1f87ea00286cef786fa22f82dcbcdb86e55a9ef9ba07dfde3bf59a246bcbc
                              • Instruction Fuzzy Hash: 0C416C31A0860AFBDF559F68C849BEEB774FB05324F248229E529A32E0C7346950CB91
                              APIs
                              • GetInputState.USER32 ref: 008238CB
                              • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00823922
                              • TranslateMessage.USER32(?), ref: 0082394B
                              • DispatchMessageW.USER32(?), ref: 00823955
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00823966
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                              • String ID:
                              • API String ID: 2256411358-0
                              • Opcode ID: 4894f866e29422d1f4e86404c3d0eb82b22f019ffc277909dcf7b52d18bac3a0
                              • Instruction ID: 83b34daef70e1c388b4c92db7a439930e9093cfff362392c97868da0fd45ed9a
                              • Opcode Fuzzy Hash: 4894f866e29422d1f4e86404c3d0eb82b22f019ffc277909dcf7b52d18bac3a0
                              • Instruction Fuzzy Hash: 6831C6709043659EEF25CB38A869BB67FACFB07304F04056DE462D65A0E7BCA6C5CB11
                              APIs
                              • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,0082C21E,00000000), ref: 0082CF38
                              • InternetReadFile.WININET(?,00000000,?,?), ref: 0082CF6F
                              • GetLastError.KERNEL32(?,00000000,?,?,?,0082C21E,00000000), ref: 0082CFB4
                              • SetEvent.KERNEL32(?,?,00000000,?,?,?,0082C21E,00000000), ref: 0082CFC8
                              • SetEvent.KERNEL32(?,?,00000000,?,?,?,0082C21E,00000000), ref: 0082CFF2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                              • String ID:
                              • API String ID: 3191363074-0
                              • Opcode ID: 06069243fbcf16e9e9c65bb3c458772b86eb8b7d418ed88310df9861d4023012
                              • Instruction ID: bc3f59297ca6893e6a1530d6481a83bac904f5691e828558d9d1594bb90b8d49
                              • Opcode Fuzzy Hash: 06069243fbcf16e9e9c65bb3c458772b86eb8b7d418ed88310df9861d4023012
                              • Instruction Fuzzy Hash: 12314C71600615EFDB20DFA5E984ABFBBFAFB15354B10442EF516D2150DBB0AE80DB60
                              APIs
                              • GetWindowRect.USER32(?,?), ref: 00811915
                              • PostMessageW.USER32(00000001,00000201,00000001), ref: 008119C1
                              • Sleep.KERNEL32(00000000,?,?,?), ref: 008119C9
                              • PostMessageW.USER32(00000001,00000202,00000000), ref: 008119DA
                              • Sleep.KERNEL32(00000000,?,?,?,?), ref: 008119E2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessagePostSleep$RectWindow
                              • String ID:
                              • API String ID: 3382505437-0
                              • Opcode ID: 9ac17af2adc12d955f4c2c8da24d0e2a6d1db0afabe856773213eb118223bd26
                              • Instruction ID: 53003239f63097f18dc77db06ff1d4ddf5325693e3a1fbcb74e5d9ae406b500b
                              • Opcode Fuzzy Hash: 9ac17af2adc12d955f4c2c8da24d0e2a6d1db0afabe856773213eb118223bd26
                              • Instruction Fuzzy Hash: 40318A75A00219AFCB00CFA8C999ADE3BB9FF05315F108229FA21E72D1C7709984CB91
                              APIs
                              • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00845745
                              • SendMessageW.USER32(?,00001074,?,00000001), ref: 0084579D
                              • _wcslen.LIBCMT ref: 008457AF
                              • _wcslen.LIBCMT ref: 008457BA
                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00845816
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessageSend$_wcslen
                              • String ID:
                              • API String ID: 763830540-0
                              • Opcode ID: 1dd6da03817f53a8a0e6af1bad776a351c0ddc6e953d428ac5c19a5d563f32e6
                              • Instruction ID: fa9c51b16bf1c031e6374f46f664e51548d8e4c4e0cd00c7353d73df8f0b3b50
                              • Opcode Fuzzy Hash: 1dd6da03817f53a8a0e6af1bad776a351c0ddc6e953d428ac5c19a5d563f32e6
                              • Instruction Fuzzy Hash: 7C21A57590461CEBDB209F64CC85AEE7BBCFF15328F108226E929EA181D7709985CF50
                              APIs
                              • GetSysColor.USER32(00000008), ref: 007C98CC
                              • SetTextColor.GDI32(?,?), ref: 007C98D6
                              • SetBkMode.GDI32(?,00000001), ref: 007C98E9
                              • GetStockObject.GDI32(00000005), ref: 007C98F1
                              • GetWindowLongW.USER32(?,000000EB), ref: 007C9952
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Color$LongModeObjectStockTextWindow
                              • String ID:
                              • API String ID: 1860813098-0
                              • Opcode ID: c4ed082e7e131905690d74d6f5a63ff9b4ed92afd4dc3dd7b5dcfad2ffd47669
                              • Instruction ID: 459d8688670ddd7a197c83ef38b021c48ac8ab32e0af3e4620f31a56cfac5fce
                              • Opcode Fuzzy Hash: c4ed082e7e131905690d74d6f5a63ff9b4ed92afd4dc3dd7b5dcfad2ffd47669
                              • Instruction Fuzzy Hash: DA2147314462909FCBA24F34EC5CFE53FA4AF67321F09018EE6928B1E2D7396941CB10
                              APIs
                              • IsWindow.USER32(00000000), ref: 00830951
                              • GetForegroundWindow.USER32 ref: 00830968
                              • GetDC.USER32(00000000), ref: 008309A4
                              • GetPixel.GDI32(00000000,?,00000003), ref: 008309B0
                              • ReleaseDC.USER32(00000000,00000003), ref: 008309E8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Window$ForegroundPixelRelease
                              • String ID:
                              • API String ID: 4156661090-0
                              • Opcode ID: fad088969bae27dec0015164babe6d7ddea8e4be3ed3f0492359b1ebcb207726
                              • Instruction ID: 0aeea945fbd0d7a8874ef899441b9a99aabc184ccc356da6eecc438e4b021767
                              • Opcode Fuzzy Hash: fad088969bae27dec0015164babe6d7ddea8e4be3ed3f0492359b1ebcb207726
                              • Instruction Fuzzy Hash: A0219239A00214AFD714EF68D848AAEBBE9FF49700F04806DE846D7362CB74AD44CB90
                              APIs
                              • GetEnvironmentStringsW.KERNEL32 ref: 007ECDC6
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 007ECDE9
                                • Part of subcall function 007E3820: RtlAllocateHeap.NTDLL(00000000,?,00881444,?,007CFDF5,?,?,007BA976,00000010,00881440,007B13FC,?,007B13C6,?,007B1129), ref: 007E3852
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 007ECE0F
                              • _free.LIBCMT ref: 007ECE22
                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 007ECE31
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                              • String ID:
                              • API String ID: 336800556-0
                              • Opcode ID: 33aceb5797cb3254fc29298eab8c0a9a4fcdae383b1d93a68b22f95d3662e208
                              • Instruction ID: 3f4d337ff001e79b0e2f16a6c807ff4035643e2d2ce196f07aea564aa84c5f84
                              • Opcode Fuzzy Hash: 33aceb5797cb3254fc29298eab8c0a9a4fcdae383b1d93a68b22f95d3662e208
                              • Instruction Fuzzy Hash: 8E01847A6032957F23261ABB6C8DD7B796DEECBBA1315012DF905D7201EA698D0381B0
                              APIs
                              • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 007C9693
                              • SelectObject.GDI32(?,00000000), ref: 007C96A2
                              • BeginPath.GDI32(?), ref: 007C96B9
                              • SelectObject.GDI32(?,00000000), ref: 007C96E2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ObjectSelect$BeginCreatePath
                              • String ID:
                              • API String ID: 3225163088-0
                              • Opcode ID: b42091aa466ea46f667b2776bdd57513d1511fca4c010dcca144438f9a1a5a80
                              • Instruction ID: 1c4e9ed553ffd97d0fef64e10dfb18dad075f3b0158eb04e6aff39dba5337549
                              • Opcode Fuzzy Hash: b42091aa466ea46f667b2776bdd57513d1511fca4c010dcca144438f9a1a5a80
                              • Instruction Fuzzy Hash: 58215B30802305EBDF519F68EC1CBA97FACBB51765F50421EF910A61F0DB78A892CB94
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _memcmp
                              • String ID:
                              • API String ID: 2931989736-0
                              • Opcode ID: c7d7e5386ca98366bc7bcdfea1c093dc8d2f8b73e55b4e78a695707d4bc12b90
                              • Instruction ID: 25413c5e84caaaa0e60dcf7b542649df44b55df32e25dd2d924a241bb88e8c26
                              • Opcode Fuzzy Hash: c7d7e5386ca98366bc7bcdfea1c093dc8d2f8b73e55b4e78a695707d4bc12b90
                              • Instruction Fuzzy Hash: 550192A564161DFAE20855109D83EFA635CFFA13A8B404425FE14DA382F664ED9086A0
                              APIs
                              • GetLastError.KERNEL32(?,?,?,007DF2DE,007E3863,00881444,?,007CFDF5,?,?,007BA976,00000010,00881440,007B13FC,?,007B13C6), ref: 007E2DFD
                              • _free.LIBCMT ref: 007E2E32
                              • _free.LIBCMT ref: 007E2E59
                              • SetLastError.KERNEL32(00000000,007B1129), ref: 007E2E66
                              • SetLastError.KERNEL32(00000000,007B1129), ref: 007E2E6F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ErrorLast$_free
                              • String ID:
                              • API String ID: 3170660625-0
                              • Opcode ID: df45c3b02200e14756d5238aba1600b52b08895b55219034174a70bf49f27482
                              • Instruction ID: 521cf5eebcaeb6d580a6a3d346326abb610d3a6f98020daf690945c2b78d19fc
                              • Opcode Fuzzy Hash: df45c3b02200e14756d5238aba1600b52b08895b55219034174a70bf49f27482
                              • Instruction Fuzzy Hash: 3001F436207690A7C61227776C4ED2B265DBBCE7A5B214028F425E32A3EA2CCC034520
                              APIs
                              • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0080FF41,80070057,?,?,?,0081035E), ref: 0081002B
                              • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0080FF41,80070057,?,?), ref: 00810046
                              • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0080FF41,80070057,?,?), ref: 00810054
                              • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0080FF41,80070057,?), ref: 00810064
                              • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0080FF41,80070057,?,?), ref: 00810070
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: From$Prog$FreeStringTasklstrcmpi
                              • String ID:
                              • API String ID: 3897988419-0
                              • Opcode ID: 96e983b06c80bb4208fd40589a61af3a1b8881d834301e66dc24c616ca5249da
                              • Instruction ID: 64bdcb67ccf686346d9b879e84e4b9dc447b9c5ab1003b6c487e764d4845096f
                              • Opcode Fuzzy Hash: 96e983b06c80bb4208fd40589a61af3a1b8881d834301e66dc24c616ca5249da
                              • Instruction Fuzzy Hash: BE018F7A601608BFDB504F68DC04BEA7AADFF48791F144124F905D2211E7B1DE80CBA0
                              APIs
                              • QueryPerformanceCounter.KERNEL32(?), ref: 0081E997
                              • QueryPerformanceFrequency.KERNEL32(?), ref: 0081E9A5
                              • Sleep.KERNEL32(00000000), ref: 0081E9AD
                              • QueryPerformanceCounter.KERNEL32(?), ref: 0081E9B7
                              • Sleep.KERNEL32 ref: 0081E9F3
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: PerformanceQuery$CounterSleep$Frequency
                              • String ID:
                              • API String ID: 2833360925-0
                              • Opcode ID: 5231acbe761e7f8d81d2d6ec7d405eb1b813db9adbe56b3f7e54c47b760429ce
                              • Instruction ID: edec36c4912ebf244bc602849d9cdb259264adeb50844a12292837b97211c565
                              • Opcode Fuzzy Hash: 5231acbe761e7f8d81d2d6ec7d405eb1b813db9adbe56b3f7e54c47b760429ce
                              • Instruction Fuzzy Hash: 9201203580262DDBCF40ABA4D849AEDBF7CFF0A700F000546E902B2241DB309690CBA2
                              APIs
                              • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00811114
                              • GetLastError.KERNEL32(?,00000000,00000000,?,?,00810B9B,?,?,?), ref: 00811120
                              • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00810B9B,?,?,?), ref: 0081112F
                              • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00810B9B,?,?,?), ref: 00811136
                              • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0081114D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                              • String ID:
                              • API String ID: 842720411-0
                              • Opcode ID: cb6f4c165fb0fb4777619a384924a86f03e72a424da3677912162897220db374
                              • Instruction ID: 4948babb6b55032bf9debff093acc5b7f3d2f3789d98eebd645afd4b7d59864a
                              • Opcode Fuzzy Hash: cb6f4c165fb0fb4777619a384924a86f03e72a424da3677912162897220db374
                              • Instruction Fuzzy Hash: 37011D79101205BFDB514FA5DC4DAAA7B6EFF86364B104419FA45D7360DA31DC40DA60
                              APIs
                              • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00810FCA
                              • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00810FD6
                              • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00810FE5
                              • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00810FEC
                              • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00811002
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: HeapInformationToken$AllocErrorLastProcess
                              • String ID:
                              • API String ID: 44706859-0
                              • Opcode ID: 567998ea6ecc569b2c923c110b2fb9ce9f7666ecd1e892198d061c37184415d0
                              • Instruction ID: ccb2c210ecf68ee371e23e2ba8fff4d4b211dd63b5159a1e00ef72f49331ce83
                              • Opcode Fuzzy Hash: 567998ea6ecc569b2c923c110b2fb9ce9f7666ecd1e892198d061c37184415d0
                              • Instruction Fuzzy Hash: 62F06D39602701EBDB214FA4DC4DF963BADFF8ABA2F104415FA45C7251CA70DC80CA60
                              APIs
                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0081102A
                              • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00811036
                              • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00811045
                              • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0081104C
                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00811062
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: HeapInformationToken$AllocErrorLastProcess
                              • String ID:
                              • API String ID: 44706859-0
                              • Opcode ID: 7fe515ebbb15722272c67178beac765ac5fc3883313d04f2c9e8ba271953a579
                              • Instruction ID: 2bcc944d465dc3453d9a31218299b08047f1b907c3da8dc3b30b59fb1ac4fd26
                              • Opcode Fuzzy Hash: 7fe515ebbb15722272c67178beac765ac5fc3883313d04f2c9e8ba271953a579
                              • Instruction Fuzzy Hash: 4CF06D39602701EBDB219FA5EC4DF963BADFF8A761F100415FA45C7250CA70D880CA60
                              APIs
                              • CloseHandle.KERNEL32(?,?,?,?,0082017D,?,008232FC,?,00000001,007F2592,?), ref: 00820324
                              • CloseHandle.KERNEL32(?,?,?,?,0082017D,?,008232FC,?,00000001,007F2592,?), ref: 00820331
                              • CloseHandle.KERNEL32(?,?,?,?,0082017D,?,008232FC,?,00000001,007F2592,?), ref: 0082033E
                              • CloseHandle.KERNEL32(?,?,?,?,0082017D,?,008232FC,?,00000001,007F2592,?), ref: 0082034B
                              • CloseHandle.KERNEL32(?,?,?,?,0082017D,?,008232FC,?,00000001,007F2592,?), ref: 00820358
                              • CloseHandle.KERNEL32(?,?,?,?,0082017D,?,008232FC,?,00000001,007F2592,?), ref: 00820365
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CloseHandle
                              • String ID:
                              • API String ID: 2962429428-0
                              • Opcode ID: df780eb3b1c922f1286d6ed0b8409bec9e61ab02a9f457bb54375860e4e4e8bd
                              • Instruction ID: 0c63a696e60e79dc9cb794e17bf8f878aa9cfbcbd47e62372855c1293170ac94
                              • Opcode Fuzzy Hash: df780eb3b1c922f1286d6ed0b8409bec9e61ab02a9f457bb54375860e4e4e8bd
                              • Instruction Fuzzy Hash: B101A272801B259FC7309F66E880412FBF9FF503153158A3FD19692A32C371A994CF80
                              APIs
                              • _free.LIBCMT ref: 007ED752
                                • Part of subcall function 007E29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007ED7D1,00000000,00000000,00000000,00000000,?,007ED7F8,00000000,00000007,00000000,?,007EDBF5,00000000), ref: 007E29DE
                                • Part of subcall function 007E29C8: GetLastError.KERNEL32(00000000,?,007ED7D1,00000000,00000000,00000000,00000000,?,007ED7F8,00000000,00000007,00000000,?,007EDBF5,00000000,00000000), ref: 007E29F0
                              • _free.LIBCMT ref: 007ED764
                              • _free.LIBCMT ref: 007ED776
                              • _free.LIBCMT ref: 007ED788
                              • _free.LIBCMT ref: 007ED79A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: b69ccbe27691a6ec38b43fee12e742f1ca277f1da36e9e5f952b85330fe1c2ec
                              • Instruction ID: bd6ebfb9ac73924f51d1c557277c2270fc09ce7cbed4464583d9af027d63b1f6
                              • Opcode Fuzzy Hash: b69ccbe27691a6ec38b43fee12e742f1ca277f1da36e9e5f952b85330fe1c2ec
                              • Instruction Fuzzy Hash: D7F01232546288AB8671EB66F9CAC1A7BDDBB4C710B951819F058E7517C73CFCC08A64
                              APIs
                              • GetDlgItem.USER32(?,000003E9), ref: 00815C58
                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 00815C6F
                              • MessageBeep.USER32(00000000), ref: 00815C87
                              • KillTimer.USER32(?,0000040A), ref: 00815CA3
                              • EndDialog.USER32(?,00000001), ref: 00815CBD
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: BeepDialogItemKillMessageTextTimerWindow
                              • String ID:
                              • API String ID: 3741023627-0
                              • Opcode ID: 16a0ae5c4d2fb85fe2779daa1bf284a94340040d0ceeb1ee761a69c692672ea0
                              • Instruction ID: 627e3dc209650ed2377011df1c5101c19bfdd2a64e2d2a11bb0c088bb66bd2da
                              • Opcode Fuzzy Hash: 16a0ae5c4d2fb85fe2779daa1bf284a94340040d0ceeb1ee761a69c692672ea0
                              • Instruction Fuzzy Hash: D6016D74501B04EBEB205F50DD5EFE677BCFF51B05F010559A692A10E1DBF4AA84CA90
                              APIs
                              • _free.LIBCMT ref: 007E22BE
                                • Part of subcall function 007E29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007ED7D1,00000000,00000000,00000000,00000000,?,007ED7F8,00000000,00000007,00000000,?,007EDBF5,00000000), ref: 007E29DE
                                • Part of subcall function 007E29C8: GetLastError.KERNEL32(00000000,?,007ED7D1,00000000,00000000,00000000,00000000,?,007ED7F8,00000000,00000007,00000000,?,007EDBF5,00000000,00000000), ref: 007E29F0
                              • _free.LIBCMT ref: 007E22D0
                              • _free.LIBCMT ref: 007E22E3
                              • _free.LIBCMT ref: 007E22F4
                              • _free.LIBCMT ref: 007E2305
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 472bfd149c02a6b76c73b535e97fe7867db6861468b3eff27b41f24d0901512c
                              • Instruction ID: cd97b96eb10b8c821550071798ada21c1691fc384d3c32d3a7ed59b2041cd924
                              • Opcode Fuzzy Hash: 472bfd149c02a6b76c73b535e97fe7867db6861468b3eff27b41f24d0901512c
                              • Instruction Fuzzy Hash: 1CF030714021548B8A22AF59BC0A8083B6CFB1C760702551AF514E72B7CB3854539FA5
                              APIs
                              • EndPath.GDI32(?), ref: 007C95D4
                              • StrokeAndFillPath.GDI32(?,?,008071F7,00000000,?,?,?), ref: 007C95F0
                              • SelectObject.GDI32(?,00000000), ref: 007C9603
                              • DeleteObject.GDI32 ref: 007C9616
                              • StrokePath.GDI32(?), ref: 007C9631
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Path$ObjectStroke$DeleteFillSelect
                              • String ID:
                              • API String ID: 2625713937-0
                              • Opcode ID: 6eb0c816d0a68dbc80c67721d84fa3572191dbeab04b35dca851d55096734527
                              • Instruction ID: 1e9463c47b0783279e18cc86912bea91b78c9048441a6df0216494a48cf85610
                              • Opcode Fuzzy Hash: 6eb0c816d0a68dbc80c67721d84fa3572191dbeab04b35dca851d55096734527
                              • Instruction Fuzzy Hash: C7F04934006A08EBDFA65F69ED1CBA43F69BB02322F448218F525650F0DB3499A2DF20
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: __freea$_free
                              • String ID: a/p$am/pm
                              • API String ID: 3432400110-3206640213
                              • Opcode ID: 98798344badbd48bda0d0f144e126e0b5095605fee537814fbbcf2a6dcf91ed8
                              • Instruction ID: 3db4e4a99945eb99a5924fc0ee9c9661e8a8a4c076818f38f0d67e60aeb86a7a
                              • Opcode Fuzzy Hash: 98798344badbd48bda0d0f144e126e0b5095605fee537814fbbcf2a6dcf91ed8
                              • Instruction Fuzzy Hash: 2DD11771A02285CACB249F6AC85BBFEB7B5FF0E300FA44159E6019B654D37D9D80CB91
                              APIs
                                • Part of subcall function 007D0242: EnterCriticalSection.KERNEL32(0088070C,00881884,?,?,007C198B,00882518,?,?,?,007B12F9,00000000), ref: 007D024D
                                • Part of subcall function 007D0242: LeaveCriticalSection.KERNEL32(0088070C,?,007C198B,00882518,?,?,?,007B12F9,00000000), ref: 007D028A
                                • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                • Part of subcall function 007D00A3: __onexit.LIBCMT ref: 007D00A9
                              • __Init_thread_footer.LIBCMT ref: 00837BFB
                                • Part of subcall function 007D01F8: EnterCriticalSection.KERNEL32(0088070C,?,?,007C8747,00882514), ref: 007D0202
                                • Part of subcall function 007D01F8: LeaveCriticalSection.KERNEL32(0088070C,?,007C8747,00882514), ref: 007D0235
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                              • String ID: 5$G$Variable must be of type 'Object'.
                              • API String ID: 535116098-3733170431
                              • Opcode ID: 34d550e247ffb9b0be94b1df552bd97a20c8fb0163935e68a365d72f0d9c1c22
                              • Instruction ID: 6cad68b10ba1a0657eed0d5186ee161fd164dd21ed18c516b8b9852417ea3775
                              • Opcode Fuzzy Hash: 34d550e247ffb9b0be94b1df552bd97a20c8fb0163935e68a365d72f0d9c1c22
                              • Instruction Fuzzy Hash: 65917CB0A04209EFCB24EF98D8959ADB7B1FF85304F108059F806DB292DB75EE45CB91
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID: JO{
                              • API String ID: 0-846867066
                              • Opcode ID: db4b4780b453edcbef913ad2e4f8ff9962b886cba1727ce5e0cb94b67ae62a1b
                              • Instruction ID: 79a090f00dfc20f44a4340e164f320a29d4891ace195dfdb7bcb15e5fb5ce256
                              • Opcode Fuzzy Hash: db4b4780b453edcbef913ad2e4f8ff9962b886cba1727ce5e0cb94b67ae62a1b
                              • Instruction Fuzzy Hash: AD51D771D0268EDFCB119FA6C849FAE7BB4BF0D318F14005AF405A72A2D6799901CB61
                              APIs
                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 007E8B6E
                              • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 007E8B7A
                              • __dosmaperr.LIBCMT ref: 007E8B81
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ByteCharErrorLastMultiWide__dosmaperr
                              • String ID: .}
                              • API String ID: 2434981716-2266125135
                              • Opcode ID: d46a6e18b7d10b955ebdf18155fa8791c0d367eb3b81288f56b547a0cad9b8e8
                              • Instruction ID: 2bd3054b87ab96cd1e0d88641f715f099e9ff838e6c2bbe03631b14d30f6a939
                              • Opcode Fuzzy Hash: d46a6e18b7d10b955ebdf18155fa8791c0d367eb3b81288f56b547a0cad9b8e8
                              • Instruction Fuzzy Hash: F8417EF06051C5AFC7659F5AC880A7D7FA6EF8D304B1881AAF45D8B242DE35CC02C751
                              APIs
                                • Part of subcall function 0081B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,008121D0,?,?,00000034,00000800,?,00000034), ref: 0081B42D
                              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00812760
                                • Part of subcall function 0081B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,008121FF,?,?,00000800,?,00001073,00000000,?,?), ref: 0081B3F8
                                • Part of subcall function 0081B32A: GetWindowThreadProcessId.USER32(?,?), ref: 0081B355
                                • Part of subcall function 0081B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00812194,00000034,?,?,00001004,00000000,00000000), ref: 0081B365
                                • Part of subcall function 0081B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00812194,00000034,?,?,00001004,00000000,00000000), ref: 0081B37B
                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 008127CD
                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0081281A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                              • String ID: @
                              • API String ID: 4150878124-2766056989
                              • Opcode ID: 1cf53c891e77df89c195903dfc5316426fe48ed5dadcc877db4e6a7f0bf23a84
                              • Instruction ID: 667b42cc3c2581723e5112010567061f9352b72673e8ad9c43916afa68b1c857
                              • Opcode Fuzzy Hash: 1cf53c891e77df89c195903dfc5316426fe48ed5dadcc877db4e6a7f0bf23a84
                              • Instruction Fuzzy Hash: 63410E76900218AFDB10DFA8CD85ADEBBB8FF09700F108099FA55B7181DB706E95CB61
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 007E1769
                              • _free.LIBCMT ref: 007E1834
                              • _free.LIBCMT ref: 007E183E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _free$FileModuleName
                              • String ID: C:\Users\user\Desktop\file.exe
                              • API String ID: 2506810119-3695852857
                              • Opcode ID: c60b4b2e19d71f017cd5cf9c9ca7eb3fb29e52fa69ab0629d7c72ab802417951
                              • Instruction ID: a0fd80694d2f3a71f29ce4c1abd4ed44b8140ca84823a14b1729bd03d08485c0
                              • Opcode Fuzzy Hash: c60b4b2e19d71f017cd5cf9c9ca7eb3fb29e52fa69ab0629d7c72ab802417951
                              • Instruction Fuzzy Hash: 9931C271A01298EFCB21DB9A9C8AD9EBBFCEF89720B504166F404D7211D7749E41CB90
                              APIs
                              • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 0081C306
                              • DeleteMenu.USER32(?,00000007,00000000), ref: 0081C34C
                              • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00881990,01745B40), ref: 0081C395
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Menu$Delete$InfoItem
                              • String ID: 0
                              • API String ID: 135850232-4108050209
                              • Opcode ID: c313f3190f4823057509d40e889098223ec995e6ca8d8f40c877ca769163f721
                              • Instruction ID: 4a42474d967ae21da25cfcc707abacc5cb04267dab61fcf0dce14183c7c1ebaa
                              • Opcode Fuzzy Hash: c313f3190f4823057509d40e889098223ec995e6ca8d8f40c877ca769163f721
                              • Instruction Fuzzy Hash: 5341AD312443019FD724DF29D884B9ABBE8FF85324F008A1EF9A5D7391D730A985CB62
                              APIs
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0084CC08,00000000,?,?,?,?), ref: 008444AA
                              • GetWindowLongW.USER32 ref: 008444C7
                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 008444D7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Window$Long
                              • String ID: SysTreeView32
                              • API String ID: 847901565-1698111956
                              • Opcode ID: 52808132590bf9e2a57b25bb5eced0ced1c14ba158a16bd354e300b9e096eed3
                              • Instruction ID: 678c2a2f8208d07a7f7510120fe2889aac02b48f39ad2e0540155f51894a3524
                              • Opcode Fuzzy Hash: 52808132590bf9e2a57b25bb5eced0ced1c14ba158a16bd354e300b9e096eed3
                              • Instruction Fuzzy Hash: B7319C32201209ABDF209E38DC45BEA7BA9FB08334F219329F979E21D0D774EC509B50
                              APIs
                                • Part of subcall function 0083335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00833077,?,?), ref: 00833378
                              • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0083307A
                              • _wcslen.LIBCMT ref: 0083309B
                              • htons.WSOCK32(00000000,?,?,00000000), ref: 00833106
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                              • String ID: 255.255.255.255
                              • API String ID: 946324512-2422070025
                              • Opcode ID: 43439361629196dba8ee1a38035ea421ab47a523dacf2b87cfc29215e0f4e42c
                              • Instruction ID: 1c35f26416379ed4bb949ce7da4d8c9fa5caf21feb0274e9bbfe3d4d2330df1b
                              • Opcode Fuzzy Hash: 43439361629196dba8ee1a38035ea421ab47a523dacf2b87cfc29215e0f4e42c
                              • Instruction Fuzzy Hash: 4031B039604605DFCB24CF68C595AAA77E0FF94318F248059E915CB3A2DB72EE45C7A0
                              APIs
                              • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00843F40
                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00843F54
                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00843F78
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessageSend$Window
                              • String ID: SysMonthCal32
                              • API String ID: 2326795674-1439706946
                              • Opcode ID: 85439976975d445f7486fb9a8b411f8c13875e0c0f436af981f40ef5680dba5f
                              • Instruction ID: 44d0af4b02267bb7c0b32a61af1e5b3b1c41195c778b067b962fa4f5c5e83f2d
                              • Opcode Fuzzy Hash: 85439976975d445f7486fb9a8b411f8c13875e0c0f436af981f40ef5680dba5f
                              • Instruction Fuzzy Hash: 2321BC32600219BBDF219F94DC46FEA3B79FF48728F110214FE15AB1D0DAB5A854CBA0
                              APIs
                              • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00844705
                              • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00844713
                              • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0084471A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessageSend$DestroyWindow
                              • String ID: msctls_updown32
                              • API String ID: 4014797782-2298589950
                              • Opcode ID: 1665c2315baae876d40db1625875509403ae9e949d2281dab25a0b37a9c37495
                              • Instruction ID: a576bc07c0e531e035fb7637e39ad36ca8bf837efffc3141a1335f1b97ab0764
                              • Opcode Fuzzy Hash: 1665c2315baae876d40db1625875509403ae9e949d2281dab25a0b37a9c37495
                              • Instruction Fuzzy Hash: 93214CB560020DAFEB10DF68DC85EA737ADFB5A394B050059FA15DB351CB34EC12CA60
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _wcslen
                              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                              • API String ID: 176396367-2734436370
                              • Opcode ID: b24f11fa846df4a1b3d26d18797bcc5f82a6f4d05c1df4551e974a46e1c8c8b4
                              • Instruction ID: c6fd24059aa02734bf3c7c14bc548ab0e3f2c20839342834fe7621f9b4ea49f3
                              • Opcode Fuzzy Hash: b24f11fa846df4a1b3d26d18797bcc5f82a6f4d05c1df4551e974a46e1c8c8b4
                              • Instruction Fuzzy Hash: 74215B32104514A6D331AB24DC26FF773EDFFA1314F50402AF99AE7142EB59ADC1C2A5
                              APIs
                              • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00843840
                              • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00843850
                              • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00843876
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessageSend$MoveWindow
                              • String ID: Listbox
                              • API String ID: 3315199576-2633736733
                              • Opcode ID: f29e4770825a1aaa6f1549ae238ac7c92cf446dcfe312e45bf2ceb6e67f85814
                              • Instruction ID: 2ca54342396679de7e0696ffc64cd80124c3b7fb04e23d79aa855f5d3a1e9d10
                              • Opcode Fuzzy Hash: f29e4770825a1aaa6f1549ae238ac7c92cf446dcfe312e45bf2ceb6e67f85814
                              • Instruction Fuzzy Hash: 5C21BE7260021CBBEF219F54CC85FAB7B6EFF89764F108124F9449B190CA75DC5287A0
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 00824A08
                              • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00824A5C
                              • SetErrorMode.KERNEL32(00000000,?,?,0084CC08), ref: 00824AD0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ErrorMode$InformationVolume
                              • String ID: %lu
                              • API String ID: 2507767853-685833217
                              • Opcode ID: 230fdffe052b330e5cb6c6c4761f7ac9f27bea84096d0347f6a16eb042cc4470
                              • Instruction ID: a5bb1de06864e3dba977b6e363c4ab67559932025201e3dba44c93468f5fd2ec
                              • Opcode Fuzzy Hash: 230fdffe052b330e5cb6c6c4761f7ac9f27bea84096d0347f6a16eb042cc4470
                              • Instruction Fuzzy Hash: 1F313E75A00219EFDB10DF64C885EAA7BF8FF09308F1480A9E909DB252D775EE45CB61
                              APIs
                              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0084424F
                              • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00844264
                              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00844271
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: msctls_trackbar32
                              • API String ID: 3850602802-1010561917
                              • Opcode ID: 52fa0a5feae4908afdc35cd9b845dcb3983bb6329d7fb6f835eda5ee8b94b8af
                              • Instruction ID: fd4c9d430e0483fbc0d19a81c24f16447997f07d4de477dfa704de68f15cdca4
                              • Opcode Fuzzy Hash: 52fa0a5feae4908afdc35cd9b845dcb3983bb6329d7fb6f835eda5ee8b94b8af
                              • Instruction Fuzzy Hash: F811A03124024CBEEF205E69CC06FAB3BACFF95B64F114624FA55E60A0D6B1D8519B20
                              APIs
                                • Part of subcall function 007B6B57: _wcslen.LIBCMT ref: 007B6B6A
                                • Part of subcall function 00812DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00812DC5
                                • Part of subcall function 00812DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00812DD6
                                • Part of subcall function 00812DA7: GetCurrentThreadId.KERNEL32 ref: 00812DDD
                                • Part of subcall function 00812DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00812DE4
                              • GetFocus.USER32 ref: 00812F78
                                • Part of subcall function 00812DEE: GetParent.USER32(00000000), ref: 00812DF9
                              • GetClassNameW.USER32(?,?,00000100), ref: 00812FC3
                              • EnumChildWindows.USER32(?,0081303B), ref: 00812FEB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                              • String ID: %s%d
                              • API String ID: 1272988791-1110647743
                              • Opcode ID: 7605e713fbe674ab2f0055302b50a4e49f4aff4dfee9a38fcc9cb182caac3481
                              • Instruction ID: 6d864dc5c5774d7c430060042c3e1e0f4e23c3d1d4aab316c091cbe00412f79b
                              • Opcode Fuzzy Hash: 7605e713fbe674ab2f0055302b50a4e49f4aff4dfee9a38fcc9cb182caac3481
                              • Instruction Fuzzy Hash: 0811C0B5200209ABCF446F64DC99FEE37AEFF98304F048079B909DB252DE3499858B70
                              APIs
                              • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 008458C1
                              • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 008458EE
                              • DrawMenuBar.USER32(?), ref: 008458FD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Menu$InfoItem$Draw
                              • String ID: 0
                              • API String ID: 3227129158-4108050209
                              • Opcode ID: 524baab536ef4b23e5035dc1e4346075572e79914686e47f72b029f046ebf28f
                              • Instruction ID: 7aceac91597fe60d071b630399a89228b7d90c313046ff354b747c3d9f79646c
                              • Opcode Fuzzy Hash: 524baab536ef4b23e5035dc1e4346075572e79914686e47f72b029f046ebf28f
                              • Instruction Fuzzy Hash: DE016D3150121CEFDB619F11EC48BAEBFB9FB45764F108099E849DA152EB348A84EF21
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f7d1563dfdedfb384480aa6b12b83faa3fe602aea29808be2f7e8236cb936180
                              • Instruction ID: a866da967c318a4f187228eb2b4e7c0d2a871cc6cb3fb0c5c370d03d6d2ce90d
                              • Opcode Fuzzy Hash: f7d1563dfdedfb384480aa6b12b83faa3fe602aea29808be2f7e8236cb936180
                              • Instruction Fuzzy Hash: 86C13A75A0020AEFDB15CFA8C894AAEB7B9FF48704F208598E515EB251D771EDC1CB90
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Variant$ClearInitInitializeUninitialize
                              • String ID:
                              • API String ID: 1998397398-0
                              • Opcode ID: 75b7353d982eb1e510f8e53a2ef54d8a8db8d23973a5207a08eea0dae982b883
                              • Instruction ID: 92ce67a49cefdf139c223b5cde8093c237f6fd10137c43dda0d27d38cd258d19
                              • Opcode Fuzzy Hash: 75b7353d982eb1e510f8e53a2ef54d8a8db8d23973a5207a08eea0dae982b883
                              • Instruction Fuzzy Hash: 23A10575604200DFC714DF28C58AA6AB7E5FF89714F048859F98ADB362DB34EE41CB92
                              APIs
                              • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,0084FC08,?), ref: 008105F0
                              • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,0084FC08,?), ref: 00810608
                              • CLSIDFromProgID.OLE32(?,?,00000000,0084CC40,000000FF,?,00000000,00000800,00000000,?,0084FC08,?), ref: 0081062D
                              • _memcmp.LIBVCRUNTIME ref: 0081064E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: FromProg$FreeTask_memcmp
                              • String ID:
                              • API String ID: 314563124-0
                              • Opcode ID: c65a2eaed473acbcabbf1b14353dca9d19b167a6e3a89d09569248e735c725f5
                              • Instruction ID: 6dc64e35e544a9c4072dd6513a524f173a7db8d840d7a988e65c304a5456cd02
                              • Opcode Fuzzy Hash: c65a2eaed473acbcabbf1b14353dca9d19b167a6e3a89d09569248e735c725f5
                              • Instruction Fuzzy Hash: 2481B775A00209EFCB04DF94C984AEEB7B9FF89315F204558E516EB250DB71AE86CF60
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: 32fa48d7415a19909b8190b49d30b651249d8c61a608c21a9ee576cc2183b6e4
                              • Instruction ID: f3aa2bdd580eb7ddab53caec05328eafaf2aee629d84bff199b61a06b2966724
                              • Opcode Fuzzy Hash: 32fa48d7415a19909b8190b49d30b651249d8c61a608c21a9ee576cc2183b6e4
                              • Instruction Fuzzy Hash: C441313250018CEBDB256BFD9C496BE3AB4FF85370F544226F619D7392E63C48415671
                              APIs
                              • GetWindowRect.USER32(?,?), ref: 008462E2
                              • ScreenToClient.USER32(?,?), ref: 00846315
                              • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00846382
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Window$ClientMoveRectScreen
                              • String ID:
                              • API String ID: 3880355969-0
                              • Opcode ID: 2828b9dcdc0ff39fcd2a647ef75036aed9943d27a0681dfa6a50cc024acf4ee1
                              • Instruction ID: bb55c95fea430547b117a4c240ea1e73ca96b1ca5a051c331e0bd50b3f548383
                              • Opcode Fuzzy Hash: 2828b9dcdc0ff39fcd2a647ef75036aed9943d27a0681dfa6a50cc024acf4ee1
                              • Instruction Fuzzy Hash: 0A513A74A00249EFCF14DF68D884AAE7BB5FB46364F108259F815DB290E770ED91CB51
                              APIs
                              • socket.WSOCK32(00000002,00000002,00000011), ref: 00831AFD
                              • WSAGetLastError.WSOCK32 ref: 00831B0B
                              • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00831B8A
                              • WSAGetLastError.WSOCK32 ref: 00831B94
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ErrorLast$socket
                              • String ID:
                              • API String ID: 1881357543-0
                              • Opcode ID: 6665deaf2a74a8f154abda4d0dcd73083c38112c0f1c769ecec0018287a561a9
                              • Instruction ID: edd746a5e746f2c5cc8df41684abfb45bdde96bb1e0a2ce7b018a806f65d2597
                              • Opcode Fuzzy Hash: 6665deaf2a74a8f154abda4d0dcd73083c38112c0f1c769ecec0018287a561a9
                              • Instruction Fuzzy Hash: 0E419035600200AFEB20AF24C88AF6677E5EB85718F54849CFA1A9F2D2D776DD41CBD0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9108068d1149ba4d5a2882e77cbfdcb03d7c964b29cede1f05f572c0f4e29ca0
                              • Instruction ID: 17ec7b6c3e38fc777425bb7cecab36a53ab7f859e837c94d787e9d951dba0b42
                              • Opcode Fuzzy Hash: 9108068d1149ba4d5a2882e77cbfdcb03d7c964b29cede1f05f572c0f4e29ca0
                              • Instruction Fuzzy Hash: 2741E4B2A01384EFD7249F79CC45B6BBFA9EB8D710F10452AF542DB2C2D779A9118780
                              APIs
                              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00825783
                              • GetLastError.KERNEL32(?,00000000), ref: 008257A9
                              • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 008257CE
                              • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 008257FA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CreateHardLink$DeleteErrorFileLast
                              • String ID:
                              • API String ID: 3321077145-0
                              • Opcode ID: 98d15047776dfd438f62c5f904add460fbdc1dd46be7705f111a0fc12e407fe0
                              • Instruction ID: c7ba3682f19bdefb39a0457eb554ffafce1564d766c87f88b9f208be4261ab9e
                              • Opcode Fuzzy Hash: 98d15047776dfd438f62c5f904add460fbdc1dd46be7705f111a0fc12e407fe0
                              • Instruction Fuzzy Hash: 58412B39600610DFCB25DF15C445A5EBBE6FF89320B18C498E84AAB762CB74FD40CB91
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000000,?,007D6D71,00000000,00000000,007D82D9,?,007D82D9,?,00000001,007D6D71,?,00000001,007D82D9,007D82D9), ref: 007ED910
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 007ED999
                              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 007ED9AB
                              • __freea.LIBCMT ref: 007ED9B4
                                • Part of subcall function 007E3820: RtlAllocateHeap.NTDLL(00000000,?,00881444,?,007CFDF5,?,?,007BA976,00000010,00881440,007B13FC,?,007B13C6,?,007B1129), ref: 007E3852
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                              • String ID:
                              • API String ID: 2652629310-0
                              • Opcode ID: a8d5c3998b6dea91c73d238f89002388254ce34ab4ff39e2401e3b881ae8f801
                              • Instruction ID: 62d11487300ae86361eefad162754f9d9428c169aa3a29dc2cd312f2552c3e88
                              • Opcode Fuzzy Hash: a8d5c3998b6dea91c73d238f89002388254ce34ab4ff39e2401e3b881ae8f801
                              • Instruction Fuzzy Hash: AD31FE72A0124AABDF24CF66DC45EAE7BA5EF45310F054169FC04DB252EB39ED50CBA0
                              APIs
                              • SendMessageW.USER32(?,00001024,00000000,?), ref: 00845352
                              • GetWindowLongW.USER32(?,000000F0), ref: 00845375
                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00845382
                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 008453A8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: LongWindow$InvalidateMessageRectSend
                              • String ID:
                              • API String ID: 3340791633-0
                              • Opcode ID: e62ed31fd5d1e050d23eba2cf42c4e8730d469434b17556289a5c05035504dc3
                              • Instruction ID: 1155d0d8da569597d5be3e2e3f786d0f05c4c3c0c44215608415496398a0ba32
                              • Opcode Fuzzy Hash: e62ed31fd5d1e050d23eba2cf42c4e8730d469434b17556289a5c05035504dc3
                              • Instruction Fuzzy Hash: D7319E34A55A0CEFEB209E14CC19BED77A5FB06394F584145FA11D63E2C7B49D40DB41
                              APIs
                              • GetKeyboardState.USER32(?,7694C0D0,?,00008000), ref: 0081ABF1
                              • SetKeyboardState.USER32(00000080,?,00008000), ref: 0081AC0D
                              • PostMessageW.USER32(00000000,00000101,00000000), ref: 0081AC74
                              • SendInput.USER32(00000001,?,0000001C,7694C0D0,?,00008000), ref: 0081ACC6
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: KeyboardState$InputMessagePostSend
                              • String ID:
                              • API String ID: 432972143-0
                              • Opcode ID: 32992018e734a913a8e53b8ba64cb2e32f1250e21b4bcc7aea413c9b6f1279a0
                              • Instruction ID: 6f33f02a91c2618ca841ad655a6c3c4291f9daa839fc37c28b1edfc861fe1440
                              • Opcode Fuzzy Hash: 32992018e734a913a8e53b8ba64cb2e32f1250e21b4bcc7aea413c9b6f1279a0
                              • Instruction Fuzzy Hash: 1E31F270A02618AFEB39CB69C8047FA7BAEFF89310F04421AE485D22D1D37589C587D2
                              APIs
                              • ClientToScreen.USER32(?,?), ref: 0084769A
                              • GetWindowRect.USER32(?,?), ref: 00847710
                              • PtInRect.USER32(?,?,00848B89), ref: 00847720
                              • MessageBeep.USER32(00000000), ref: 0084778C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Rect$BeepClientMessageScreenWindow
                              • String ID:
                              • API String ID: 1352109105-0
                              • Opcode ID: ee4ace036fc9b6b76380c39d2c90543b1b0013ae8466de1f196d4961695f139d
                              • Instruction ID: 2192f2049da4cba4b1fbd9aed070848eecea182820d74dfd39f7364943461e58
                              • Opcode Fuzzy Hash: ee4ace036fc9b6b76380c39d2c90543b1b0013ae8466de1f196d4961695f139d
                              • Instruction Fuzzy Hash: 3F41A038605259DFDB11CF58C898EA9BBF9FF49314F9680A9E414DB261C730E942CF90
                              APIs
                              • GetForegroundWindow.USER32 ref: 008416EB
                                • Part of subcall function 00813A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00813A57
                                • Part of subcall function 00813A3D: GetCurrentThreadId.KERNEL32 ref: 00813A5E
                                • Part of subcall function 00813A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,008125B3), ref: 00813A65
                              • GetCaretPos.USER32(?), ref: 008416FF
                              • ClientToScreen.USER32(00000000,?), ref: 0084174C
                              • GetForegroundWindow.USER32 ref: 00841752
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                              • String ID:
                              • API String ID: 2759813231-0
                              • Opcode ID: a91f512321ac22e7cbdf84f4e58311c564d3f0978e94eedf9e6c75f0ef576d72
                              • Instruction ID: 0b8d8c4da40f51820a425779c94815b291c13322725b086a4ab5455a2d8e6567
                              • Opcode Fuzzy Hash: a91f512321ac22e7cbdf84f4e58311c564d3f0978e94eedf9e6c75f0ef576d72
                              • Instruction Fuzzy Hash: 28313D75D00149AFCB04EFA9C8859EEBBFDFF48304B5480AAE415E7211D6359E45CBA1
                              APIs
                                • Part of subcall function 007B7620: _wcslen.LIBCMT ref: 007B7625
                              • _wcslen.LIBCMT ref: 0081DFCB
                              • _wcslen.LIBCMT ref: 0081DFE2
                              • _wcslen.LIBCMT ref: 0081E00D
                              • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0081E018
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _wcslen$ExtentPoint32Text
                              • String ID:
                              • API String ID: 3763101759-0
                              • Opcode ID: 8182129e31cf44934a0618ba763286dc82d06f490861ce511b4a9072c0369ae7
                              • Instruction ID: ff5705144ecf747d79a906bb6658590d888e378fda7c29b0378acbda2546a94a
                              • Opcode Fuzzy Hash: 8182129e31cf44934a0618ba763286dc82d06f490861ce511b4a9072c0369ae7
                              • Instruction Fuzzy Hash: 9921BF71900614EFCB209FA8D881BAEB7F8FF49750F144069E805FB342D6749E41CBA1
                              APIs
                              • CreateToolhelp32Snapshot.KERNEL32 ref: 0081D501
                              • Process32FirstW.KERNEL32(00000000,?), ref: 0081D50F
                              • Process32NextW.KERNEL32(00000000,?), ref: 0081D52F
                              • CloseHandle.KERNEL32(00000000), ref: 0081D5DC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                              • String ID:
                              • API String ID: 420147892-0
                              • Opcode ID: a1ccf2014cc592bab459987a593b026a3ea143ba6fd07ef37e8f8eeb29746ffd
                              • Instruction ID: 3aeea90104eb74051dd1f5db9c70921e7c62b55fc94638c7c2f57f4c9a66b9a1
                              • Opcode Fuzzy Hash: a1ccf2014cc592bab459987a593b026a3ea143ba6fd07ef37e8f8eeb29746ffd
                              • Instruction Fuzzy Hash: B1314D711083009FD301EF54C889BEABBE9FF99354F14092DF685861A1EB719985CB92
                              APIs
                                • Part of subcall function 007C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007C9BB2
                              • GetCursorPos.USER32(?), ref: 00849001
                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00807711,?,?,?,?,?), ref: 00849016
                              • GetCursorPos.USER32(?), ref: 0084905E
                              • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00807711,?,?,?), ref: 00849094
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Cursor$LongMenuPopupProcTrackWindow
                              • String ID:
                              • API String ID: 2864067406-0
                              • Opcode ID: 9c3dc55b092400d9bd754e59ab5f6aa56974abd71316e4b1acb6b22b8b7d18a7
                              • Instruction ID: 895513a63db2c0a3cc037b4a17a9b0046352f141bfd8e24ea4f8b01b62a8e786
                              • Opcode Fuzzy Hash: 9c3dc55b092400d9bd754e59ab5f6aa56974abd71316e4b1acb6b22b8b7d18a7
                              • Instruction Fuzzy Hash: 9F21AB35601418EFDB25CF98CC58EEB7BB9FB8A350F014069F9458B261C735A990DB60
                              APIs
                              • GetFileAttributesW.KERNEL32(?,0084CB68), ref: 0081D2FB
                              • GetLastError.KERNEL32 ref: 0081D30A
                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 0081D319
                              • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0084CB68), ref: 0081D376
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CreateDirectory$AttributesErrorFileLast
                              • String ID:
                              • API String ID: 2267087916-0
                              • Opcode ID: 8b54ba8a630571cf7ead8ff8fb40e39efc4b37852b22a00fb85a8c930b7c5dcf
                              • Instruction ID: a462225bb752836ea9add0e225db0aaadaa41b232c6f82c28d2365f80847a51a
                              • Opcode Fuzzy Hash: 8b54ba8a630571cf7ead8ff8fb40e39efc4b37852b22a00fb85a8c930b7c5dcf
                              • Instruction Fuzzy Hash: 90216D74509301DF8710DF28C885AAAB7ECFE56364F104A1DF4A9C73A1EB359986CB93
                              APIs
                                • Part of subcall function 00811014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0081102A
                                • Part of subcall function 00811014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00811036
                                • Part of subcall function 00811014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00811045
                                • Part of subcall function 00811014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0081104C
                                • Part of subcall function 00811014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00811062
                              • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 008115BE
                              • _memcmp.LIBVCRUNTIME ref: 008115E1
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00811617
                              • HeapFree.KERNEL32(00000000), ref: 0081161E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                              • String ID:
                              • API String ID: 1592001646-0
                              • Opcode ID: 5b592aac3eb90ee84384de33dfdb77ccadc5c668f7b27132b5841e26f9b9f257
                              • Instruction ID: 2f0dd5b005da9f80202475da1c0be02c6201c66e130a7a0070ef5d4b5b12f4bd
                              • Opcode Fuzzy Hash: 5b592aac3eb90ee84384de33dfdb77ccadc5c668f7b27132b5841e26f9b9f257
                              • Instruction Fuzzy Hash: 0C215531E01108ABDF00DFA4C949BEEB7B9FF94344F084459E541AB241E731AA85CBA0
                              APIs
                              • GetWindowLongW.USER32(?,000000EC), ref: 0084280A
                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00842824
                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00842832
                              • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00842840
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Window$Long$AttributesLayered
                              • String ID:
                              • API String ID: 2169480361-0
                              • Opcode ID: 459599d348c72a4074221c6d1f30f13f0f7a81e4666e00cc7af659d3dca8b06f
                              • Instruction ID: 6d6edc6f218f67560697b2ee54c1284ed801a6fc73095bf80e1ca62de043452d
                              • Opcode Fuzzy Hash: 459599d348c72a4074221c6d1f30f13f0f7a81e4666e00cc7af659d3dca8b06f
                              • Instruction Fuzzy Hash: 7021D335209119AFD714DB24C844FAA7B99FF46324F158258F826CB6E2CB75FC42CB91
                              APIs
                                • Part of subcall function 00818D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,0081790A,?,000000FF,?,00818754,00000000,?,0000001C,?,?), ref: 00818D8C
                                • Part of subcall function 00818D7D: lstrcpyW.KERNEL32(00000000,?,?,0081790A,?,000000FF,?,00818754,00000000,?,0000001C,?,?,00000000), ref: 00818DB2
                                • Part of subcall function 00818D7D: lstrcmpiW.KERNEL32(00000000,?,0081790A,?,000000FF,?,00818754,00000000,?,0000001C,?,?), ref: 00818DE3
                              • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00818754,00000000,?,0000001C,?,?,00000000), ref: 00817923
                              • lstrcpyW.KERNEL32(00000000,?,?,00818754,00000000,?,0000001C,?,?,00000000), ref: 00817949
                              • lstrcmpiW.KERNEL32(00000002,cdecl,?,00818754,00000000,?,0000001C,?,?,00000000), ref: 00817984
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: lstrcmpilstrcpylstrlen
                              • String ID: cdecl
                              • API String ID: 4031866154-3896280584
                              • Opcode ID: ac89f60d3cc9dc836beda0055fa4e3b23edd2d470fd19e32de03d61f7b0faf15
                              • Instruction ID: fa8c2db5284cc1c2cf2ba900f07e2d27de3cadca98e5b613c606a79864a0dbb5
                              • Opcode Fuzzy Hash: ac89f60d3cc9dc836beda0055fa4e3b23edd2d470fd19e32de03d61f7b0faf15
                              • Instruction Fuzzy Hash: AA11D33A201302ABCB159F38D845EBA7BBDFF95350B50802EF946C72A4EB359855C7A1
                              APIs
                              • GetWindowLongW.USER32(?,000000F0), ref: 00847D0B
                              • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00847D2A
                              • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00847D42
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0082B7AD,00000000), ref: 00847D6B
                                • Part of subcall function 007C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007C9BB2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Window$Long
                              • String ID:
                              • API String ID: 847901565-0
                              • Opcode ID: c050399ff5e834137a3bcc14b2a59bbf8e53bebd721d06c56e078df5a18b5a02
                              • Instruction ID: 87094aa5715eee062c8cb7f1d4169a6ab2205526acabfd8d8aded194f60d2b02
                              • Opcode Fuzzy Hash: c050399ff5e834137a3bcc14b2a59bbf8e53bebd721d06c56e078df5a18b5a02
                              • Instruction Fuzzy Hash: DC117235615619AFCB109F68CC08B6A3BA9FF46360B158728F939D72F0E7349D51CB50
                              APIs
                              • SendMessageW.USER32(?,00001060,?,00000004), ref: 008456BB
                              • _wcslen.LIBCMT ref: 008456CD
                              • _wcslen.LIBCMT ref: 008456D8
                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00845816
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessageSend_wcslen
                              • String ID:
                              • API String ID: 455545452-0
                              • Opcode ID: 0e4d1f276634818fcb86b1a879e1d557200c8c2cdf8c1fb243c237ff707999ff
                              • Instruction ID: 3484552f2f3c67d321c276cb60f82bb38d1ce680c39090847b957b44be3e2dbf
                              • Opcode Fuzzy Hash: 0e4d1f276634818fcb86b1a879e1d557200c8c2cdf8c1fb243c237ff707999ff
                              • Instruction Fuzzy Hash: 9111D67560060CA7DF209F65DC85AEE7B7CFF11768B104026F915D6182EB74D984CB64
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a274c5cf5801c76e1aa9d3645680ea80ecbe37bb4d67c34d36d2e2504d840e92
                              • Instruction ID: fe290e7e2c72f60db6776a24b9c03c6fedfcdf2f563bb5cfae85e83dbc079d88
                              • Opcode Fuzzy Hash: a274c5cf5801c76e1aa9d3645680ea80ecbe37bb4d67c34d36d2e2504d840e92
                              • Instruction Fuzzy Hash: 880126B230768A7EF620567A6CC6F27261CEF893B8F710325F520611D2DB788C008230
                              APIs
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00811A47
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00811A59
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00811A6F
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00811A8A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: fbab5c9d7572e63aaca50371be4c4583fe74d3473cbe7cff835f32adddc45524
                              • Instruction ID: c4ce0156bd020ed29fc44fdca4a23a53a34c0b2258e02c5a40e9d9a51a564818
                              • Opcode Fuzzy Hash: fbab5c9d7572e63aaca50371be4c4583fe74d3473cbe7cff835f32adddc45524
                              • Instruction Fuzzy Hash: 3811157A901229FFEF109BA48985FADBB78FF08750F200091EA00B7290D6716E50DB94
                              APIs
                              • GetCurrentThreadId.KERNEL32 ref: 0081E1FD
                              • MessageBoxW.USER32(?,?,?,?), ref: 0081E230
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0081E246
                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0081E24D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                              • String ID:
                              • API String ID: 2880819207-0
                              • Opcode ID: f93c5fd011f796ec07efb20c578a342a3d16b6d9f3852c41420741f68444ab7d
                              • Instruction ID: 5ed4ae3820332df490a8b6845d92a328e42ffdddab12b8037817139b0a97c0fd
                              • Opcode Fuzzy Hash: f93c5fd011f796ec07efb20c578a342a3d16b6d9f3852c41420741f68444ab7d
                              • Instruction Fuzzy Hash: 4511A176A04258ABCB119FACAC09ADA7BACFF46320F144255F925E3391D7B49D4487A0
                              APIs
                              • CreateThread.KERNEL32(00000000,?,007DCFF9,00000000,00000004,00000000), ref: 007DD218
                              • GetLastError.KERNEL32 ref: 007DD224
                              • __dosmaperr.LIBCMT ref: 007DD22B
                              • ResumeThread.KERNEL32(00000000), ref: 007DD249
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Thread$CreateErrorLastResume__dosmaperr
                              • String ID:
                              • API String ID: 173952441-0
                              • Opcode ID: 352b6130a77ccbddf48526a7e6c906f66062611a2b1cc07181f9c0b731c8a6d0
                              • Instruction ID: e6c4c804c30b0d03289cef334efb6de2e75e4b90f32bfcfe37204c785bc332aa
                              • Opcode Fuzzy Hash: 352b6130a77ccbddf48526a7e6c906f66062611a2b1cc07181f9c0b731c8a6d0
                              • Instruction Fuzzy Hash: 7E01D236806208BBCB215BA5DC09BAE7A7DFF82330F10021BF925923D0DB799D01C6A0
                              APIs
                                • Part of subcall function 007C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007C9BB2
                              • GetClientRect.USER32(?,?), ref: 00849F31
                              • GetCursorPos.USER32(?), ref: 00849F3B
                              • ScreenToClient.USER32(?,?), ref: 00849F46
                              • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00849F7A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Client$CursorLongProcRectScreenWindow
                              • String ID:
                              • API String ID: 4127811313-0
                              • Opcode ID: 680494a3136c8c5fcfdb74acc64cad369d0280f335facc23a24a5b0c55ed1445
                              • Instruction ID: 5cafb044af27647778c73202dd575c9ba5e31d02f2852246e480be5465c7f854
                              • Opcode Fuzzy Hash: 680494a3136c8c5fcfdb74acc64cad369d0280f335facc23a24a5b0c55ed1445
                              • Instruction Fuzzy Hash: 9811363690111EABDB20DFA8D8499EE77BCFB46311F000455F941E3140DB34BE86CBA1
                              APIs
                              • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 007B604C
                              • GetStockObject.GDI32(00000011), ref: 007B6060
                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 007B606A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CreateMessageObjectSendStockWindow
                              • String ID:
                              • API String ID: 3970641297-0
                              • Opcode ID: 045f1a72f3a26d05369785865b7cb313a5ddb26b8ebb23e05a574f5b3063e17a
                              • Instruction ID: 3309361e98cc23b9cd5a51cf7ca7c9fe72dea1382fae584b3c3a91f7236cf04a
                              • Opcode Fuzzy Hash: 045f1a72f3a26d05369785865b7cb313a5ddb26b8ebb23e05a574f5b3063e17a
                              • Instruction Fuzzy Hash: 6D115B72502508BFEF529FA59C44EFABBADFF197A4F040216FB1452120D73A9C60DBA0
                              APIs
                              • ___BuildCatchObject.LIBVCRUNTIME ref: 007D3B56
                                • Part of subcall function 007D3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 007D3AD2
                                • Part of subcall function 007D3AA3: ___AdjustPointer.LIBCMT ref: 007D3AED
                              • _UnwindNestedFrames.LIBCMT ref: 007D3B6B
                              • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 007D3B7C
                              • CallCatchBlock.LIBVCRUNTIME ref: 007D3BA4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                              • String ID:
                              • API String ID: 737400349-0
                              • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                              • Instruction ID: cce51fc8d84b2eb94deed27e5dbd3e9b0634cff22a8469cc805a35ee2300c8b5
                              • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                              • Instruction Fuzzy Hash: 0C012D72100148BBDF115F95CC46DEB3F7AEF48754F04401AFE4856221C73AE961DBA1
                              APIs
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,007B13C6,00000000,00000000,?,007E301A,007B13C6,00000000,00000000,00000000,?,007E328B,00000006,FlsSetValue), ref: 007E30A5
                              • GetLastError.KERNEL32(?,007E301A,007B13C6,00000000,00000000,00000000,?,007E328B,00000006,FlsSetValue,00852290,FlsSetValue,00000000,00000364,?,007E2E46), ref: 007E30B1
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,007E301A,007B13C6,00000000,00000000,00000000,?,007E328B,00000006,FlsSetValue,00852290,FlsSetValue,00000000), ref: 007E30BF
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: LibraryLoad$ErrorLast
                              • String ID:
                              • API String ID: 3177248105-0
                              • Opcode ID: 21b25d95abe8e4727473bc62f650161a6e36fb394b710fd07915f4c96f78dbe8
                              • Instruction ID: ffe4ef273f0a4e12a9df7f7297eb37be5b9a71668a13bdf0df0555b1d2048d34
                              • Opcode Fuzzy Hash: 21b25d95abe8e4727473bc62f650161a6e36fb394b710fd07915f4c96f78dbe8
                              • Instruction Fuzzy Hash: 1601F736303266ABCB718B7A9C4CA677B9EBF4AB61B200720F905E3140C729D901C6E0
                              APIs
                              • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 0081747F
                              • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00817497
                              • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 008174AC
                              • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 008174CA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Type$Register$FileLoadModuleNameUser
                              • String ID:
                              • API String ID: 1352324309-0
                              • Opcode ID: 650b28fb4d1f4606f36a3286b1f94754efeb9c36d5742fb40b42ceb42fb32aae
                              • Instruction ID: 075e860acb4a582f8c5229e99f74c871f2bc8db29abf888d9e46979e1510225f
                              • Opcode Fuzzy Hash: 650b28fb4d1f4606f36a3286b1f94754efeb9c36d5742fb40b42ceb42fb32aae
                              • Instruction Fuzzy Hash: 99118BB9206315ABE7208F18DD08FD27BFCFF00B04F10856EA656D6191DBB0E984DBA4
                              APIs
                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0081ACD3,?,00008000), ref: 0081B0C4
                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0081ACD3,?,00008000), ref: 0081B0E9
                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0081ACD3,?,00008000), ref: 0081B0F3
                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0081ACD3,?,00008000), ref: 0081B126
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CounterPerformanceQuerySleep
                              • String ID:
                              • API String ID: 2875609808-0
                              • Opcode ID: 48a2ef8fb6b148cdac123c23a5e487312f96d426a28dff42fe670c231cd38b89
                              • Instruction ID: da1fa793a2001e17270a5096d12a3f86bbcd1b0f2dc09c75e3182ef8c50a4a9d
                              • Opcode Fuzzy Hash: 48a2ef8fb6b148cdac123c23a5e487312f96d426a28dff42fe670c231cd38b89
                              • Instruction Fuzzy Hash: 38113931C0292DE7CF00AFE4E958AEEBB7CFF0A711F114089D955B2181DB309690CB51
                              APIs
                              • GetWindowRect.USER32(?,?), ref: 00847E33
                              • ScreenToClient.USER32(?,?), ref: 00847E4B
                              • ScreenToClient.USER32(?,?), ref: 00847E6F
                              • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00847E8A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ClientRectScreen$InvalidateWindow
                              • String ID:
                              • API String ID: 357397906-0
                              • Opcode ID: 650e60726384ca0732650777651d1df83275e1d1b7f884e1c791fbf75fad9e48
                              • Instruction ID: 0ddbd39e18f86e502b8d5086b5f87fbfb66fe1da482e0a9919193be094b3d241
                              • Opcode Fuzzy Hash: 650e60726384ca0732650777651d1df83275e1d1b7f884e1c791fbf75fad9e48
                              • Instruction Fuzzy Hash: 771153B9D0020AAFDB41CF98C884AEEBBF9FF19310F509166E915E3210D735AA54CF90
                              APIs
                              • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00812DC5
                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 00812DD6
                              • GetCurrentThreadId.KERNEL32 ref: 00812DDD
                              • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00812DE4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                              • String ID:
                              • API String ID: 2710830443-0
                              • Opcode ID: ee6c6068d4d00478175ac7889816a09b3f5d876ebf92eab2c29cb7e5b680033f
                              • Instruction ID: 47df54622771c2c631a9e814110f028368c56dbe4443fc2fb7b64ba95f0b0cba
                              • Opcode Fuzzy Hash: ee6c6068d4d00478175ac7889816a09b3f5d876ebf92eab2c29cb7e5b680033f
                              • Instruction Fuzzy Hash: 35E0EDB56022287AD7601BA2EC0DEEB7E6CFF57BA1F414119B506D10909AA58981C6B1
                              APIs
                                • Part of subcall function 007C9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 007C9693
                                • Part of subcall function 007C9639: SelectObject.GDI32(?,00000000), ref: 007C96A2
                                • Part of subcall function 007C9639: BeginPath.GDI32(?), ref: 007C96B9
                                • Part of subcall function 007C9639: SelectObject.GDI32(?,00000000), ref: 007C96E2
                              • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00848887
                              • LineTo.GDI32(?,?,?), ref: 00848894
                              • EndPath.GDI32(?), ref: 008488A4
                              • StrokePath.GDI32(?), ref: 008488B2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                              • String ID:
                              • API String ID: 1539411459-0
                              • Opcode ID: 1d02b8c2d0304f3b9224204003e37026857f277bb04c0cdb940d10920d9ff681
                              • Instruction ID: 20a38d9ed3dd85ae02279bfa6b9c1a4f6ad8188e8f8fe8181ec2984ddeb694ae
                              • Opcode Fuzzy Hash: 1d02b8c2d0304f3b9224204003e37026857f277bb04c0cdb940d10920d9ff681
                              • Instruction Fuzzy Hash: FFF03A3A042658FADB125F94AC0DFCE3F5DBF16310F448100FA11650E2CB795511CBA9
                              APIs
                              • GetSysColor.USER32(00000008), ref: 007C98CC
                              • SetTextColor.GDI32(?,?), ref: 007C98D6
                              • SetBkMode.GDI32(?,00000001), ref: 007C98E9
                              • GetStockObject.GDI32(00000005), ref: 007C98F1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Color$ModeObjectStockText
                              • String ID:
                              • API String ID: 4037423528-0
                              • Opcode ID: bb042d19db3b5bb4f6906f3dc882655ad4791df2d0d743e664fc3f8eb4fca947
                              • Instruction ID: 87c73e50b79ce0d56a9dc8e4514ff6f1d15e70f6bbe25832d6a4961b6a7a5c5d
                              • Opcode Fuzzy Hash: bb042d19db3b5bb4f6906f3dc882655ad4791df2d0d743e664fc3f8eb4fca947
                              • Instruction Fuzzy Hash: 10E06D35645680AAEBA15B74AC09BE83F24FB16336F04821AF7FA980E1C7715640DB10
                              APIs
                              • GetCurrentThread.KERNEL32 ref: 00811634
                              • OpenThreadToken.ADVAPI32(00000000,?,?,?,008111D9), ref: 0081163B
                              • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,008111D9), ref: 00811648
                              • OpenProcessToken.ADVAPI32(00000000,?,?,?,008111D9), ref: 0081164F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CurrentOpenProcessThreadToken
                              • String ID:
                              • API String ID: 3974789173-0
                              • Opcode ID: a078a80f433d401bac9efca365a8b1257342b8008e380df04017da6c866e0e6d
                              • Instruction ID: e64f9d6bbc5286c102c18ad84a9b7e0be76c1581370867597684db660c95620a
                              • Opcode Fuzzy Hash: a078a80f433d401bac9efca365a8b1257342b8008e380df04017da6c866e0e6d
                              • Instruction Fuzzy Hash: AEE04F356022119BDBA01FA19D0DB867B6CFF56791F144809F246C9090D6644480CB50
                              APIs
                              • GetDesktopWindow.USER32 ref: 0080D858
                              • GetDC.USER32(00000000), ref: 0080D862
                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0080D882
                              • ReleaseDC.USER32(?), ref: 0080D8A3
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CapsDesktopDeviceReleaseWindow
                              • String ID:
                              • API String ID: 2889604237-0
                              • Opcode ID: 71af866e893cf2f108df2042461eec6fefa9a422a0a2af59f33a3eb0dc9d6d73
                              • Instruction ID: 13321e3ed673f8acc9d190eacb0a759ad6745cbe7fdaf895e1cfbf6239a866b8
                              • Opcode Fuzzy Hash: 71af866e893cf2f108df2042461eec6fefa9a422a0a2af59f33a3eb0dc9d6d73
                              • Instruction Fuzzy Hash: 1AE01AB9801204DFCB919FA0D80CA6DBBB9FB19310F15D45DF806E7260C7388941EF40
                              APIs
                              • GetDesktopWindow.USER32 ref: 0080D86C
                              • GetDC.USER32(00000000), ref: 0080D876
                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0080D882
                              • ReleaseDC.USER32(?), ref: 0080D8A3
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CapsDesktopDeviceReleaseWindow
                              • String ID:
                              • API String ID: 2889604237-0
                              • Opcode ID: 92930487ac24d5aeb003586e5637af17dc9f4d468713c256e5f06a10f4043d81
                              • Instruction ID: fb8f7df383d276537f4b873886af573eceff8f8f58ac5c3633cf56e53c440740
                              • Opcode Fuzzy Hash: 92930487ac24d5aeb003586e5637af17dc9f4d468713c256e5f06a10f4043d81
                              • Instruction Fuzzy Hash: 03E012B9801200EFCB91AFA0D80CA6DBBB9BB18310B15904DF80AE7260CB385901EF40
                              APIs
                                • Part of subcall function 007B7620: _wcslen.LIBCMT ref: 007B7625
                              • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00824ED4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Connection_wcslen
                              • String ID: *$LPT
                              • API String ID: 1725874428-3443410124
                              • Opcode ID: de3851ac7415a48714198584cb8f17bb04a90975008747e8fd448ae4c52b6340
                              • Instruction ID: e455c64542f3f60f92b3bc824cbfb99804a26d372fdb64951ebe8365511e19c9
                              • Opcode Fuzzy Hash: de3851ac7415a48714198584cb8f17bb04a90975008747e8fd448ae4c52b6340
                              • Instruction Fuzzy Hash: 90915D75A00214DFDB14DF54D584EA9BBF1FF84308F199099E80A9B3A2CB35ED85CBA1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID: #
                              • API String ID: 0-1885708031
                              • Opcode ID: 731caa0cacfd3f05764a35a1f52625675a7d55b90583395a9d3c5173bf92b4da
                              • Instruction ID: a0e0574afa566caabd0df11704e73db328291abee784368646056cd2d93df8d9
                              • Opcode Fuzzy Hash: 731caa0cacfd3f05764a35a1f52625675a7d55b90583395a9d3c5173bf92b4da
                              • Instruction Fuzzy Hash: 4A513335601246DFDB25DF28C885BFA7BA8FF55310F24845DE891DB2C0DA389D42CBA0
                              APIs
                              • Sleep.KERNEL32(00000000), ref: 007CF2A2
                              • GlobalMemoryStatusEx.KERNEL32(?), ref: 007CF2BB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: GlobalMemorySleepStatus
                              • String ID: @
                              • API String ID: 2783356886-2766056989
                              • Opcode ID: 4231ab75b2eb5cab69395742c67e2dbbb786614f2f3ecc27fb58f946dee20a4e
                              • Instruction ID: 3bde580d16c01c80ca60aa0703b44a4a87176a18361d47c7f36ffcf31841fa65
                              • Opcode Fuzzy Hash: 4231ab75b2eb5cab69395742c67e2dbbb786614f2f3ecc27fb58f946dee20a4e
                              • Instruction Fuzzy Hash: 26512472418744DBD320AF10D88ABABBBF8FB84300F85885DF199811A5EB748529CB67
                              APIs
                              • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 008357E0
                              • _wcslen.LIBCMT ref: 008357EC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: BuffCharUpper_wcslen
                              • String ID: CALLARGARRAY
                              • API String ID: 157775604-1150593374
                              • Opcode ID: ef9914f2316c5b5c340b2b8de7b61d74cc9b7b2adf359d4ace5b879e325c03a6
                              • Instruction ID: 9b4aa4ad0486f56b69684687b479536400e46f84f8c4f47c98e3771e86572609
                              • Opcode Fuzzy Hash: ef9914f2316c5b5c340b2b8de7b61d74cc9b7b2adf359d4ace5b879e325c03a6
                              • Instruction Fuzzy Hash: CE417B71A00209DFCB14EFA9C8869AEBBB5FF99724F14406DE505E7291E7349D81CBA0
                              APIs
                              • _wcslen.LIBCMT ref: 0082D130
                              • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0082D13A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CrackInternet_wcslen
                              • String ID: |
                              • API String ID: 596671847-2343686810
                              • Opcode ID: e6bdfb16a3302687b4c644f36a6cbc6ef092c59fb416fecf6aec27b1ca3c13bc
                              • Instruction ID: 90cb027f29bb1966fd41cade51f9b97d776b7f7d4da69dfbe65080a66a028a56
                              • Opcode Fuzzy Hash: e6bdfb16a3302687b4c644f36a6cbc6ef092c59fb416fecf6aec27b1ca3c13bc
                              • Instruction Fuzzy Hash: DA313D71D00219EBCF15EFA4DC89AEEBFB9FF04304F100019F915A61A2E735AA56CB50
                              APIs
                              • DestroyWindow.USER32(?,?,?,?), ref: 00843621
                              • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0084365C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Window$DestroyMove
                              • String ID: static
                              • API String ID: 2139405536-2160076837
                              • Opcode ID: 688bd237000074de105d2383361a3d5fd7f51f6e6472c3abcd8a4bde059f4084
                              • Instruction ID: b38273474efd00566f789cc8dc224cdf0dea4106e98ef89d1b150c0d8388403b
                              • Opcode Fuzzy Hash: 688bd237000074de105d2383361a3d5fd7f51f6e6472c3abcd8a4bde059f4084
                              • Instruction Fuzzy Hash: 2E318B71100208AEDB109F28DC81FFB73A9FF98724F01961DF9A5D7280DA34AD91D760
                              APIs
                              • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 0084461F
                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00844634
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: '
                              • API String ID: 3850602802-1997036262
                              • Opcode ID: ddc320d0b2ac1850c42bd35a704b1aa1591d15bcea3de07d3f71126650ad9518
                              • Instruction ID: c4464c42456f18ed92abcffdef0fb7452e3bce76c10ba5e013144f27457a82e5
                              • Opcode Fuzzy Hash: ddc320d0b2ac1850c42bd35a704b1aa1591d15bcea3de07d3f71126650ad9518
                              • Instruction Fuzzy Hash: C1311674A0120A9FEF14CFA9C981BDABBB5FB09304F11516AE904EB341E770A941CF90
                              APIs
                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0084327C
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00843287
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: Combobox
                              • API String ID: 3850602802-2096851135
                              • Opcode ID: 0f3fc38bb4fa408a60f52cc42f8321a926c22700b88828db42fa5a3438f93434
                              • Instruction ID: 56c278f566167a7f9c7c240396078fed9a4896da22fac78da8aee52565d0a99f
                              • Opcode Fuzzy Hash: 0f3fc38bb4fa408a60f52cc42f8321a926c22700b88828db42fa5a3438f93434
                              • Instruction Fuzzy Hash: C811E27130021CBFFF219E54DC84EBB376AFB94365F104129F918E7290D6B19D518760
                              APIs
                                • Part of subcall function 007B600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 007B604C
                                • Part of subcall function 007B600E: GetStockObject.GDI32(00000011), ref: 007B6060
                                • Part of subcall function 007B600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 007B606A
                              • GetWindowRect.USER32(00000000,?), ref: 0084377A
                              • GetSysColor.USER32(00000012), ref: 00843794
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Window$ColorCreateMessageObjectRectSendStock
                              • String ID: static
                              • API String ID: 1983116058-2160076837
                              • Opcode ID: 98fb6cb6d2af43dfd6a7543cab4fda905cac549e0ee2f579513fbce18c972d3e
                              • Instruction ID: bdebe9097ade9d6eb677833f92052c27917069f6c898326c9138d3eaf3068594
                              • Opcode Fuzzy Hash: 98fb6cb6d2af43dfd6a7543cab4fda905cac549e0ee2f579513fbce18c972d3e
                              • Instruction Fuzzy Hash: 1A1114B2610209AFDB00DFA8CC46AEA7BB8FB19314F014925F995E2250EB35E8519B60
                              APIs
                              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0082CD7D
                              • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0082CDA6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Internet$OpenOption
                              • String ID: <local>
                              • API String ID: 942729171-4266983199
                              • Opcode ID: 7546942a85d1c6e1dbfb562718d782b7ccfa52b5ba45c7ef3892fb5f4ae9eb21
                              • Instruction ID: 866c55de97b99e9a797e4d49d9dd54627f7970ff85f50d424ab671f10b64b5c5
                              • Opcode Fuzzy Hash: 7546942a85d1c6e1dbfb562718d782b7ccfa52b5ba45c7ef3892fb5f4ae9eb21
                              • Instruction Fuzzy Hash: CF11C675205635BAE7744B669C45EFBBE6CFF127A8F004226B109C3180D7749885D6F0
                              APIs
                              • GetWindowTextLengthW.USER32(00000000), ref: 008434AB
                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 008434BA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: LengthMessageSendTextWindow
                              • String ID: edit
                              • API String ID: 2978978980-2167791130
                              • Opcode ID: 0b05aa99c5084f3edc06199eae86ab3daaf553215719654eefe4616b8dbdac49
                              • Instruction ID: 5ffc070907786c82c05a7ef23b8bbafb895468806aa7979e660796b310a58703
                              • Opcode Fuzzy Hash: 0b05aa99c5084f3edc06199eae86ab3daaf553215719654eefe4616b8dbdac49
                              • Instruction Fuzzy Hash: 1E118C7120020CABEB129E68DC44AEB3B6EFB25378F504324FA65D31E0C775DD519B68
                              APIs
                                • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                              • CharUpperBuffW.USER32(?,?,?), ref: 00816CB6
                              • _wcslen.LIBCMT ref: 00816CC2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _wcslen$BuffCharUpper
                              • String ID: STOP
                              • API String ID: 1256254125-2411985666
                              • Opcode ID: 0de969964638197b9059f1a4e327ba514083c316271e4de17f6dedfea8ee5a6e
                              • Instruction ID: fe1d592cee2147167a732a5a081b95cd2af626aef173e5642108d64bb8716bb8
                              • Opcode Fuzzy Hash: 0de969964638197b9059f1a4e327ba514083c316271e4de17f6dedfea8ee5a6e
                              • Instruction Fuzzy Hash: 2001C832A005268BCB209FBDDC859FF77B9FF617147500524E9A2D6194FB35D990C690
                              APIs
                                • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                • Part of subcall function 00813CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00813CCA
                              • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00811D4C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_wcslen
                              • String ID: ComboBox$ListBox
                              • API String ID: 624084870-1403004172
                              • Opcode ID: 44c664b64b4fc40eae469592dcfb40b3089f4f476fe2ffc8a953e8b8bd079b3f
                              • Instruction ID: 355a8ff5885acc09cf363920a7c1f8545435a2eda2ff57a6f7f2e6c743d8a9b7
                              • Opcode Fuzzy Hash: 44c664b64b4fc40eae469592dcfb40b3089f4f476fe2ffc8a953e8b8bd079b3f
                              • Instruction Fuzzy Hash: 3E01D875601218AB8F04EBA4DC59DFE776CFF56350B140519FA36A73C1EA345948C660
                              APIs
                                • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                • Part of subcall function 00813CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00813CCA
                              • SendMessageW.USER32(?,00000180,00000000,?), ref: 00811C46
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_wcslen
                              • String ID: ComboBox$ListBox
                              • API String ID: 624084870-1403004172
                              • Opcode ID: afcc4f6516009f8c547af5e5925e11f1a9e452c6337d5b4a97c9769845ccd119
                              • Instruction ID: 3dbd65f795c5e87bdaf3cc0415f2a458daab8c1434daee9773a16fab64a6404e
                              • Opcode Fuzzy Hash: afcc4f6516009f8c547af5e5925e11f1a9e452c6337d5b4a97c9769845ccd119
                              • Instruction Fuzzy Hash: 24016775781108A7CF14EBA4C959AFFB7ACFF15340F140019BA27B7281EA649E48D6F1
                              APIs
                                • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                • Part of subcall function 00813CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00813CCA
                              • SendMessageW.USER32(?,00000182,?,00000000), ref: 00811CC8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_wcslen
                              • String ID: ComboBox$ListBox
                              • API String ID: 624084870-1403004172
                              • Opcode ID: c929876f72f8c983fd04f0f3843675249c88346ce7b9cad841efd8ec880a2e34
                              • Instruction ID: af2df4fd33fa047b78ba71b34cd1b64b27c7ef02900a72a847b160a2c4dac923
                              • Opcode Fuzzy Hash: c929876f72f8c983fd04f0f3843675249c88346ce7b9cad841efd8ec880a2e34
                              • Instruction Fuzzy Hash: 16016775641118A7CF14E7A4CA59AFE77ACFF11340B540015BA16F3281EA659F48C6F1
                              APIs
                                • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                • Part of subcall function 00813CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00813CCA
                              • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00811DD3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_wcslen
                              • String ID: ComboBox$ListBox
                              • API String ID: 624084870-1403004172
                              • Opcode ID: b9cad59d8d61aa57293a647d1a203afce2228bac2b7668dd5f16f7051381456e
                              • Instruction ID: 8ed1e5e2453ce5bfbb9405e2f0c8d69b5130a39d5efa73596a3fa99c785b1b4a
                              • Opcode Fuzzy Hash: b9cad59d8d61aa57293a647d1a203afce2228bac2b7668dd5f16f7051381456e
                              • Instruction Fuzzy Hash: C7F0A471A41218A7DF04E7A4DC9ABFE776CFF02354F140919BA36E32C1EA64994882A1
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: _wcslen
                              • String ID: 3, 3, 16, 1
                              • API String ID: 176396367-3042988571
                              • Opcode ID: 9f12e271cb67e940d73a0713f41820832bd969109cbe90b71bf67f98d2b41939
                              • Instruction ID: dc864e4d952e30fa594f8c27769b698985bfc8a4d0c7135bbed5b46ae303ab39
                              • Opcode Fuzzy Hash: 9f12e271cb67e940d73a0713f41820832bd969109cbe90b71bf67f98d2b41939
                              • Instruction Fuzzy Hash: 91E06182305320719331137BDCC597F5699EFC9750B10182BF9C5C236AFAA8ED9193E5
                              APIs
                              • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00810B23
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Message
                              • String ID: AutoIt$Error allocating memory.
                              • API String ID: 2030045667-4017498283
                              • Opcode ID: 97b0ff7922d149a82727c0b7583e8be7c9d4bf465f9c199b453d16fedf41f0b3
                              • Instruction ID: a4b8b483dcb5d5ef85070187c6243648818fb49017b1517cb1003bd9dc536497
                              • Opcode Fuzzy Hash: 97b0ff7922d149a82727c0b7583e8be7c9d4bf465f9c199b453d16fedf41f0b3
                              • Instruction Fuzzy Hash: C9E0923128931876D2102694BC07F897B88EF05B20F10442AF798955C38AE9649046E9
                              APIs
                                • Part of subcall function 007CF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,007D0D71,?,?,?,007B100A), ref: 007CF7CE
                              • IsDebuggerPresent.KERNEL32(?,?,?,007B100A), ref: 007D0D75
                              • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,007B100A), ref: 007D0D84
                              Strings
                              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 007D0D7F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                              • API String ID: 55579361-631824599
                              • Opcode ID: e547f1605994cf4680165de67cd9b24f8a37a5bb0e7f236ba47e2b23c8bf0abc
                              • Instruction ID: a4fdf2cc0019c5a3ee43742a9bfa33ad10526c74e515400b607aa2db2b9dba03
                              • Opcode Fuzzy Hash: e547f1605994cf4680165de67cd9b24f8a37a5bb0e7f236ba47e2b23c8bf0abc
                              • Instruction Fuzzy Hash: E7E06D742003118BD3609FB8E4087427BF5BB04741F00492EE482C6752DBF8E444CBE1
                              APIs
                              • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 0082302F
                              • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00823044
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: Temp$FileNamePath
                              • String ID: aut
                              • API String ID: 3285503233-3010740371
                              • Opcode ID: 33406ae8aef0cf0af239201b697ae239ba2021ab5c21085c1b2a3ce0146b08ef
                              • Instruction ID: e81a3babe13f0b0b7251f081ce54f30b2f972fbd36cee2666586f44e4729a2d9
                              • Opcode Fuzzy Hash: 33406ae8aef0cf0af239201b697ae239ba2021ab5c21085c1b2a3ce0146b08ef
                              • Instruction Fuzzy Hash: 98D05E7650133867DA60A7A4AC4EFCB7B6CEB05750F0002A1B655E2091EAF4D984CAD4
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: LocalTime
                              • String ID: %.3d$X64
                              • API String ID: 481472006-1077770165
                              • Opcode ID: 7110b61ffbe97b82b312c7f374fa5a5703d167400860c87300c3b0d261b88ea1
                              • Instruction ID: df0cb18d1ddec9aa742374055d307fbc4bcf8584641ed9bd7d9ab1f796f90e1b
                              • Opcode Fuzzy Hash: 7110b61ffbe97b82b312c7f374fa5a5703d167400860c87300c3b0d261b88ea1
                              • Instruction Fuzzy Hash: 5BD012A180931CEACBD096E0CC49DB9B37CFB18305F508466F80AD1080D768E948AB61
                              APIs
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0084232C
                              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0084233F
                                • Part of subcall function 0081E97B: Sleep.KERNEL32 ref: 0081E9F3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: FindMessagePostSleepWindow
                              • String ID: Shell_TrayWnd
                              • API String ID: 529655941-2988720461
                              • Opcode ID: c8576065b501445a9aae6b6921dc2c580df56daef686a73fc5c60daae4d3c665
                              • Instruction ID: 936b23977f1e719fe3cf86902c85832c08ded0b433b843a78ac64a7cf2d884d5
                              • Opcode Fuzzy Hash: c8576065b501445a9aae6b6921dc2c580df56daef686a73fc5c60daae4d3c665
                              • Instruction Fuzzy Hash: 20D0A93A381300B6E2E8A7309C0FFCA6A18BB00B00F018A06770AEA1D0C8A4A801CA00
                              APIs
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0084236C
                              • PostMessageW.USER32(00000000), ref: 00842373
                                • Part of subcall function 0081E97B: Sleep.KERNEL32 ref: 0081E9F3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: FindMessagePostSleepWindow
                              • String ID: Shell_TrayWnd
                              • API String ID: 529655941-2988720461
                              • Opcode ID: 4e1c624e1da4bd6ac43389eddc581ab89d77dc7f6dae138402ec877548a2774a
                              • Instruction ID: 2d36e448977bbaa1e62ed39db9f3ddd06f4e3404d43831596448da2c508375ae
                              • Opcode Fuzzy Hash: 4e1c624e1da4bd6ac43389eddc581ab89d77dc7f6dae138402ec877548a2774a
                              • Instruction Fuzzy Hash: A6D0A9363823007AE2E8A7309C0FFCA6A18BB01B00F018A06770AEA1D0C8A4A801CA04
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 007EBE93
                              • GetLastError.KERNEL32 ref: 007EBEA1
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 007EBEFC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2146007675.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                              • Associated: 00000000.00000002.2145989583.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146068848.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146126465.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2146151837.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7b0000_file.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$ErrorLast
                              • String ID:
                              • API String ID: 1717984340-0
                              • Opcode ID: 7b6ada164a8ca295b88806f991881dc366a0924043faf2c6e5892e392aa0dff9
                              • Instruction ID: 6ab9e0bb520bff7adada0835ff20473fbf7aa37c125d7e425345c7e21e527321
                              • Opcode Fuzzy Hash: 7b6ada164a8ca295b88806f991881dc366a0924043faf2c6e5892e392aa0dff9
                              • Instruction Fuzzy Hash: 5341D735602286EFCF218FA6CC84ABB7FA5AF49310F144169F959972A1DB349D01DB60