Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1524237
MD5:1bf42b89a7e2436161c26089f29a0652
SHA1:196af2e64f23aea23fc728955864280a2150c02d
SHA256:9ecce840839e193265eff13feb177e00794c9df0c0a58c92ea6c31affc728fe3
Tags:exeuser-Bitsight
Infos:

Detection

Credential Flusher
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Credential Flusher
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of debugger detection
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection

Classification

  • System is w10x64
  • file.exe (PID: 7776 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 1BF42B89A7E2436161C26089F29A0652)
    • chrome.exe (PID: 7792 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-first-run --disable-session-crashed-bubble --disable-features=WelcomePage,CrashRecovery --start-fullscreen --disable-popup-blocking MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
      • chrome.exe (PID: 8036 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 --field-trial-handle=1936,i,2338416857820957988,18419048838522422849,262144 --disable-features=CrashRecovery,WelcomePage /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
      • chrome.exe (PID: 1280 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5416 --field-trial-handle=1936,i,2338416857820957988,18419048838522422849,262144 --disable-features=CrashRecovery,WelcomePage /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
      • chrome.exe (PID: 3308 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 --field-trial-handle=1936,i,2338416857820957988,18419048838522422849,262144 --disable-features=CrashRecovery,WelcomePage /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: file.exe PID: 7776JoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: file.exeReversingLabs: Detection: 15%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
    Source: file.exeJoe Sandbox ML: detected
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 173.222.162.42:443 -> 192.168.2.11:49756 version: TLS 1.0
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.11:49720 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.11:49722 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.11:49747 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.11:49763 version: TLS 1.2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0039DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0039DBBE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0036C2A2 FindFirstFileExW,0_2_0036C2A2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A68EE FindFirstFileW,FindClose,0_2_003A68EE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_003A698F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0039D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0039D076
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0039D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0039D3A9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_003A9642
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_003A979D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_003A9B2B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_003A5C97
    Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
    Source: Joe Sandbox ViewJA3 fingerprint: 1138de370e523e824bbca92d049a3777
    Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
    Source: unknownHTTPS traffic detected: 173.222.162.42:443 -> 192.168.2.11:49756 version: TLS 1.0
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.3
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.3
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.3
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.3
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.42
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.42
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.3
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.3
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.42
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.42
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.42
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.3
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.42
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.42
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.42
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.42
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003ACE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_003ACE44
    Source: global trafficHTTP traffic detected: GET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1Host: www.youtube.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CKS1yQEIl7bJAQijtskBCKmdygEIr4fLAQiUocsBCIWgzQEIjafNAQjcvc0BCLnKzQEIq9HNAQiK080BCJ3WzQEIp9jNAQj5wNQVGOuNpRc=Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentsec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
    Source: global trafficHTTP traffic detected: GET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=112516778&timestamp=1727882435991 HTTP/1.1Host: accounts.youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-full-version: "117.0.5938.149"sec-ch-ua-arch: "x86"sec-ch-ua-platform: "Windows"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-model: ""sec-ch-ua-bitness: "64"sec-ch-ua-wow64: ?0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.149", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.149"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CKS1yQEIl7bJAQijtskBCKmdygEIr4fLAQiUocsBCIWgzQEIjafNAQjcvc0BCLnKzQEIq9HNAQiK080BCJ3WzQEIp9jNAQj5wNQVGOuNpRc=Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: iframeReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: www.google.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"sec-ch-ua-full-version: "117.0.5938.149"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.149", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.149"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8X-Client-Data: CKS1yQEIl7bJAQijtskBCKmdygEIr4fLAQiUocsBCIWgzQEIjafNAQjcvc0BCLnKzQEIq9HNAQiK080BCJ3WzQEIp9jNAQj5wNQVGOuNpRc=Sec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: NID=518=ES0V51TCeOuBZnthVByCa7tigvvgzCTToUm9CEV7iviTuEBBJ-ksuxGj7jaxJHVhkba6IXjxd1Z7BNkFA4c8tEuv7ElAumBKnDyRrQ4E75rIXZScYhutGOBkpnff2rQMBxOLm8wcm7hqzCQrLh_KtsEJI_PEIvTBpKdx99IoG9mA6P5x8Q
    Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=Vrm43n+o83ppcUg&MD=Hv5aGE1t HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
    Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=Vrm43n+o83ppcUg&MD=Hv5aGE1t HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
    Source: chromecache_99.4.drString found in binary or memory: _.fq(p)+"/familylink/privacy/notice/embedded?langCountry="+_.fq(p);break;case "PuZJUb":a+="https://www.youtube.com/t/terms?chromeless=1&hl="+_.fq(m);break;case "fxTQxb":a+="https://youtube.com/t/terms?gl="+_.fq(_.oq(c))+"&hl="+_.fq(d)+"&override_hl=1"+(f?"&linkless=1":"");break;case "prAmvd":a+="https://www.google.com/intl/"+_.fq(m)+"/chromebook/termsofservice.html?languageCode="+_.fq(d)+"&regionCode="+_.fq(c);break;case "NfnTze":a+="https://policies.google.com/privacy/google-partners"+(f?"/embedded": equals www.youtube.com (Youtube)
    Source: global trafficDNS traffic detected: DNS query: youtube.com
    Source: global trafficDNS traffic detected: DNS query: www.youtube.com
    Source: global trafficDNS traffic detected: DNS query: www.google.com
    Source: global trafficDNS traffic detected: DNS query: accounts.youtube.com
    Source: global trafficDNS traffic detected: DNS query: play.google.com
    Source: unknownHTTP traffic detected: POST /log?format=json&hasfast=true&authuser=0 HTTP/1.1Host: play.google.comConnection: keep-aliveContent-Length: 507sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"Content-Type: application/x-www-form-urlencoded;charset=UTF-8sec-ch-ua-full-version: "117.0.5938.149"sec-ch-ua-platform-version: "10.0.0"X-Goog-AuthUser: 0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.149", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.149"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: */*Origin: https://accounts.google.comX-Client-Data: CKS1yQEIl7bJAQijtskBCKmdygEIr4fLAQiUocsBCIWgzQEIjafNAQjcvc0BCLnKzQEIq9HNAQiK080BCJ3WzQEIp9jNAQj5wNQVGOuNpRc=Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: chromecache_108.4.drString found in binary or memory: https://accounts.google.com
    Source: chromecache_108.4.drString found in binary or memory: https://accounts.google.com/TOS?loc=
    Source: file.exe, 00000000.00000002.1370021272.0000000000E18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/challenge/pwddlla
    Source: chromecache_96.4.drString found in binary or memory: https://apis.google.com/js/api.js
    Source: chromecache_108.4.drString found in binary or memory: https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage
    Source: chromecache_99.4.drString found in binary or memory: https://families.google.com/intl/
    Source: chromecache_96.4.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/drive_2020q4/v10/192px.svg
    Source: chromecache_96.4.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/gmail_2020q4/v10/web-48dp/logo_gmail_2020q4_color_2x_web_
    Source: chromecache_96.4.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/maps/v7/192px.svg
    Source: chromecache_108.4.drString found in binary or memory: https://g.co/recover
    Source: chromecache_99.4.drString found in binary or memory: https://play.google.com/log?format=json&hasfast=true
    Source: chromecache_108.4.drString found in binary or memory: https://play.google.com/work/enroll?identifier=
    Source: chromecache_99.4.drString found in binary or memory: https://play.google/intl/
    Source: chromecache_99.4.drString found in binary or memory: https://policies.google.com/privacy
    Source: chromecache_99.4.drString found in binary or memory: https://policies.google.com/privacy/additional
    Source: chromecache_99.4.drString found in binary or memory: https://policies.google.com/privacy/google-partners
    Source: chromecache_99.4.drString found in binary or memory: https://policies.google.com/technologies/cookies
    Source: chromecache_99.4.drString found in binary or memory: https://policies.google.com/technologies/location-data
    Source: chromecache_99.4.drString found in binary or memory: https://policies.google.com/terms
    Source: chromecache_99.4.drString found in binary or memory: https://policies.google.com/terms/location
    Source: chromecache_99.4.drString found in binary or memory: https://policies.google.com/terms/service-specific
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-email-pin.gif
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-password.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-or-voice-pin.gif
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-pin.gif
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-stop-go-landing-page_1x.png
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/animation/
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_device.png
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_pin.png
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync.png
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_1x.png
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_2x.png
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_darkmode_1x.png
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/continue_on_your_phone.png
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_phone_number_verification.png
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_silent_tap_yes_darkmode.gif
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes.gif
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes_darkmode.gif
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_dark_v2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_v2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_not_ready.png
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_1.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_dark_1.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_1.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_darkmode_1.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_1.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_darkmode_1.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_created.png
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_full_house.png
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_1.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_darkmode_1.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_1.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_darkmode_1.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_1.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_darkmode_1.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_stop.png
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/personalization_reminders.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/phone_number_sign_in_2x.png
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key.gif
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_ios_center.png
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_laptop.gif
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered.gif
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered_darkmode.gif
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_phone.gif
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_ios.gif
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_pulldown.gif
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_tapyes.gif
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/smart_lock_2x.png
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/usb_key.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/web_and_app_activity.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/who_will_be_using_this_device.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/you_tube_history.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/gmail_ios_authzen.gif
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/paaskey.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_light.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/screenlock.png
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_ipad.gif
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone.gif
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_nfc.gif
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_usb.gif
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_phone.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_keys.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/loading_spinner_gm.gif
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/progress_spinner_color_20dp_4x.gif
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/success-gm-default_2x.png
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/apps/signup/resources/custom-email-address.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/images/hpp/shield_security_checkup_green_2x_web_96dp.png
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_dark_1.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_v1.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_dark_v1.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_v1.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_dark_v1.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_v1.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_confirmation.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_0.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_dark_0.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_dark_2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_dark_2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_dark_2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_dark_2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_dark_3.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_1.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_dark_1.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_1.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_dark_1.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_dark_2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_1.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_dark_1.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_dark_2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_dark_v2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_v2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set_darkmode.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_v2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_dark_v2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_v2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space.png
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space_dark.png
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2_dark.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess.svg
    Source: chromecache_96.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess_dark.svg
    Source: chromecache_108.4.drString found in binary or memory: https://support.google.com/accounts?hl=
    Source: chromecache_99.4.drString found in binary or memory: https://support.google.com/accounts?p=new-si-ui
    Source: chromecache_108.4.drString found in binary or memory: https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072
    Source: chromecache_96.4.drString found in binary or memory: https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=
    Source: chromecache_108.4.drString found in binary or memory: https://www.google.com
    Source: chromecache_99.4.drString found in binary or memory: https://www.google.com/intl/
    Source: chromecache_96.4.drString found in binary or memory: https://www.gstatic.com/accounts/speedbump/authzen_optin_illustration.gif
    Source: chromecache_96.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/chrome_48dp.png
    Source: chromecache_96.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/googleg_48dp.png
    Source: chromecache_96.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/gsa_48dp.png
    Source: chromecache_96.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/play_prism_48dp.png
    Source: chromecache_96.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/youtube_48dp.png
    Source: chromecache_99.4.drString found in binary or memory: https://www.gstatic.com/images/branding/productlogos/googleg/v6/36px.svg
    Source: chromecache_99.4.drString found in binary or memory: https://www.youtube.com/t/terms?chromeless=1&hl=
    Source: file.exe, 00000000.00000003.1325254468.0000000000DC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
    Source: chromecache_99.4.drString found in binary or memory: https://youtube.com/t/terms?gl=
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
    Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
    Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
    Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
    Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
    Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
    Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
    Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
    Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
    Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.11:49720 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.11:49722 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.11:49747 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.11:49763 version: TLS 1.2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003AEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_003AEAFF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003AED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_003AED6A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003AEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_003AEAFF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0039AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_0039AA57
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003C9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_003C9576

    System Summary

    barindex
    Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
    Source: file.exe, 00000000.00000000.1323634550.00000000003F2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_06e2d599-0
    Source: file.exe, 00000000.00000000.1323634550.00000000003F2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_a5d1e81d-8
    Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_b467c3ae-6
    Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_97c1c06e-3
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0039D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_0039D5EB
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00391201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00391201
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0039E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0039E8F6
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0033BF400_2_0033BF40
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003380600_2_00338060
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A20460_2_003A2046
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003982980_2_00398298
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0036E4FF0_2_0036E4FF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0036676B0_2_0036676B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003C48730_2_003C4873
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0035CAA00_2_0035CAA0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0033CAF00_2_0033CAF0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0034CC390_2_0034CC39
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00366DD90_2_00366DD9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0034B1190_2_0034B119
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003391C00_2_003391C0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003513940_2_00351394
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003517060_2_00351706
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0035781B0_2_0035781B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003379200_2_00337920
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0034997D0_2_0034997D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003519B00_2_003519B0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00357A4A0_2_00357A4A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00351C770_2_00351C77
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00357CA70_2_00357CA7
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003BBE440_2_003BBE44
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00369EEE0_2_00369EEE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00351F320_2_00351F32
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 00339CB3 appears 31 times
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 0034F9F2 appears 40 times
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 00350A30 appears 46 times
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: classification engineClassification label: mal76.troj.evad.winEXE@33/38@12/7
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A37B5 GetLastError,FormatMessageW,0_2_003A37B5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003910BF AdjustTokenPrivileges,CloseHandle,0_2_003910BF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003916C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_003916C3
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A51CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_003A51CD
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0039D4DC CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0039D4DC
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_003A648E
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003342A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_003342A2
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: file.exeReversingLabs: Detection: 15%
    Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-first-run --disable-session-crashed-bubble --disable-features=WelcomePage,CrashRecovery --start-fullscreen --disable-popup-blocking
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 --field-trial-handle=1936,i,2338416857820957988,18419048838522422849,262144 --disable-features=CrashRecovery,WelcomePage /prefetch:8
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5416 --field-trial-handle=1936,i,2338416857820957988,18419048838522422849,262144 --disable-features=CrashRecovery,WelcomePage /prefetch:8
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 --field-trial-handle=1936,i,2338416857820957988,18419048838522422849,262144 --disable-features=CrashRecovery,WelcomePage /prefetch:8
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-first-run --disable-session-crashed-bubble --disable-features=WelcomePage,CrashRecovery --start-fullscreen --disable-popup-blockingJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 --field-trial-handle=1936,i,2338416857820957988,18419048838522422849,262144 --disable-features=CrashRecovery,WelcomePage /prefetch:8Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5416 --field-trial-handle=1936,i,2338416857820957988,18419048838522422849,262144 --disable-features=CrashRecovery,WelcomePage /prefetch:8Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 --field-trial-handle=1936,i,2338416857820957988,18419048838522422849,262144 --disable-features=CrashRecovery,WelcomePage /prefetch:8Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
    Source: Google Drive.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
    Source: YouTube.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
    Source: Sheets.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
    Source: Gmail.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
    Source: Slides.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
    Source: Docs.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003342DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_003342DE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00350A76 push ecx; ret 0_2_00350A89
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0034F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_0034F98E
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003C1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_003C1C41
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-96937
    Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.5 %
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0039DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0039DBBE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0036C2A2 FindFirstFileExW,0_2_0036C2A2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A68EE FindFirstFileW,FindClose,0_2_003A68EE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_003A698F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0039D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0039D076
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0039D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0039D3A9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_003A9642
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_003A979D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_003A9B2B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_003A5C97
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003342DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_003342DE
    Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior

    Anti Debugging

    barindex
    Source: C:\Users\user\Desktop\file.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_0-96969
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003AEAA2 BlockInput,0_2_003AEAA2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00362622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00362622
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003342DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_003342DE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00354CE8 mov eax, dword ptr fs:[00000030h]0_2_00354CE8
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00390B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00390B62
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00362622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00362622
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0035083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0035083F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003509D5 SetUnhandledExceptionFilter,0_2_003509D5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00350C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00350C21
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00391201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00391201
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00372BA5 KiUserCallbackDispatcher,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00372BA5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0039B226 SendInput,keybd_event,0_2_0039B226
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003B22DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_003B22DA
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00390B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00390B62
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00391663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00391663
    Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
    Source: file.exeBinary or memory string: Shell_TrayWnd
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00350698 cpuid 0_2_00350698
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A8195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_003A8195
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0038D27A GetUserNameW,0_2_0038D27A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0036B952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_0036B952
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003342DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_003342DE

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 7776, type: MEMORYSTR
    Source: file.exeBinary or memory string: WIN_81
    Source: file.exeBinary or memory string: WIN_XP
    Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
    Source: file.exeBinary or memory string: WIN_XPe
    Source: file.exeBinary or memory string: WIN_VISTA
    Source: file.exeBinary or memory string: WIN_7
    Source: file.exeBinary or memory string: WIN_8

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 7776, type: MEMORYSTR
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003B1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_003B1204
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003B1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_003B1806
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire Infrastructure2
    Valid Accounts
    1
    Native API
    1
    DLL Side-Loading
    1
    Exploitation for Privilege Escalation
    1
    Disable or Modify Tools
    21
    Input Capture
    2
    System Time Discovery
    Remote Services1
    Archive Collected Data
    2
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault AccountsScheduled Task/Job2
    Valid Accounts
    1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    LSASS Memory1
    Account Discovery
    Remote Desktop Protocol21
    Input Capture
    11
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAt1
    Registry Run Keys / Startup Folder
    2
    Valid Accounts
    2
    Obfuscated Files or Information
    Security Account Manager1
    File and Directory Discovery
    SMB/Windows Admin Shares3
    Clipboard Data
    3
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
    Access Token Manipulation
    1
    DLL Side-Loading
    NTDS15
    System Information Discovery
    Distributed Component Object ModelInput Capture4
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
    Process Injection
    1
    Masquerading
    LSA Secrets22
    Security Software Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
    Registry Run Keys / Startup Folder
    2
    Valid Accounts
    Cached Domain Credentials2
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
    Virtualization/Sandbox Evasion
    DCSync3
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
    Access Token Manipulation
    Proc Filesystem1
    Application Window Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
    Process Injection
    /etc/passwd and /etc/shadow1
    System Owner/User Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    file.exe16%ReversingLabs
    file.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://play.google/intl/0%URL Reputationsafe
    https://families.google.com/intl/0%URL Reputationsafe
    https://policies.google.com/technologies/location-data0%URL Reputationsafe
    https://apis.google.com/js/api.js0%URL Reputationsafe
    https://policies.google.com/privacy/google-partners0%URL Reputationsafe
    https://policies.google.com/terms/service-specific0%URL Reputationsafe
    https://g.co/recover0%URL Reputationsafe
    https://policies.google.com/privacy/additional0%URL Reputationsafe
    https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=32850720%URL Reputationsafe
    https://policies.google.com/technologies/cookies0%URL Reputationsafe
    https://policies.google.com/terms0%URL Reputationsafe
    https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=0%URL Reputationsafe
    https://support.google.com/accounts?hl=0%URL Reputationsafe
    https://policies.google.com/terms/location0%URL Reputationsafe
    https://policies.google.com/privacy0%URL Reputationsafe
    https://support.google.com/accounts?p=new-si-ui0%URL Reputationsafe
    https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage0%URL Reputationsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    youtube-ui.l.google.com
    142.250.186.174
    truefalse
      unknown
      www3.l.google.com
      142.250.185.238
      truefalse
        unknown
        play.google.com
        172.217.18.14
        truefalse
          unknown
          www.google.com
          142.250.184.228
          truefalse
            unknown
            youtube.com
            172.217.16.206
            truefalse
              unknown
              accounts.youtube.com
              unknown
              unknownfalse
                unknown
                www.youtube.com
                unknown
                unknownfalse
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://play.google.com/log?format=json&hasfast=true&authuser=0false
                    unknown
                    https://www.google.com/favicon.icofalse
                      unknown
                      https://play.google.com/log?hasfast=true&authuser=0&format=jsonfalse
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://play.google/intl/chromecache_99.4.drfalse
                        • URL Reputation: safe
                        unknown
                        https://families.google.com/intl/chromecache_99.4.drfalse
                        • URL Reputation: safe
                        unknown
                        https://youtube.com/t/terms?gl=chromecache_99.4.drfalse
                          unknown
                          https://policies.google.com/technologies/location-datachromecache_99.4.drfalse
                          • URL Reputation: safe
                          unknown
                          https://www.google.com/intl/chromecache_99.4.drfalse
                            unknown
                            https://apis.google.com/js/api.jschromecache_96.4.drfalse
                            • URL Reputation: safe
                            unknown
                            https://policies.google.com/privacy/google-partnerschromecache_99.4.drfalse
                            • URL Reputation: safe
                            unknown
                            https://play.google.com/work/enroll?identifier=chromecache_108.4.drfalse
                              unknown
                              https://policies.google.com/terms/service-specificchromecache_99.4.drfalse
                              • URL Reputation: safe
                              unknown
                              https://g.co/recoverchromecache_108.4.drfalse
                              • URL Reputation: safe
                              unknown
                              https://policies.google.com/privacy/additionalchromecache_99.4.drfalse
                              • URL Reputation: safe
                              unknown
                              https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072chromecache_108.4.drfalse
                              • URL Reputation: safe
                              unknown
                              https://policies.google.com/technologies/cookieschromecache_99.4.drfalse
                              • URL Reputation: safe
                              unknown
                              https://policies.google.com/termschromecache_99.4.drfalse
                              • URL Reputation: safe
                              unknown
                              https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=chromecache_96.4.drfalse
                              • URL Reputation: safe
                              unknown
                              https://www.google.comchromecache_108.4.drfalse
                                unknown
                                https://play.google.com/log?format=json&hasfast=truechromecache_99.4.drfalse
                                  unknown
                                  https://www.youtube.com/t/terms?chromeless=1&hl=chromecache_99.4.drfalse
                                    unknown
                                    https://support.google.com/accounts?hl=chromecache_108.4.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://policies.google.com/terms/locationchromecache_99.4.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://policies.google.com/privacychromecache_99.4.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://support.google.com/accounts?p=new-si-uichromecache_99.4.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessagechromecache_108.4.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    142.250.186.174
                                    youtube-ui.l.google.comUnited States
                                    15169GOOGLEUSfalse
                                    172.217.18.14
                                    play.google.comUnited States
                                    15169GOOGLEUSfalse
                                    142.250.185.238
                                    www3.l.google.comUnited States
                                    15169GOOGLEUSfalse
                                    239.255.255.250
                                    unknownReserved
                                    unknownunknownfalse
                                    142.250.186.142
                                    unknownUnited States
                                    15169GOOGLEUSfalse
                                    142.250.184.228
                                    www.google.comUnited States
                                    15169GOOGLEUSfalse
                                    IP
                                    192.168.2.11
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1524237
                                    Start date and time:2024-10-02 17:19:27 +02:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 5m 7s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:13
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:file.exe
                                    Detection:MAL
                                    Classification:mal76.troj.evad.winEXE@33/38@12/7
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 96%
                                    • Number of executed functions: 42
                                    • Number of non-executed functions: 314
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 142.250.186.163, 172.217.16.206, 64.233.167.84, 34.104.35.123, 172.217.18.99, 142.250.184.195, 142.250.186.138, 142.250.184.202, 172.217.16.202, 142.250.185.138, 142.250.185.202, 216.58.206.74, 142.250.186.74, 172.217.18.10, 172.217.18.106, 142.250.185.170, 142.250.184.234, 142.250.185.74, 142.250.185.106, 142.250.186.106, 172.217.23.106, 142.250.185.234, 142.250.181.234, 142.250.186.170, 217.20.57.19, 192.229.221.95, 142.250.185.67, 64.233.184.84
                                    • Excluded domains from analysis (whitelisted): clients1.google.com, fs.microsoft.com, accounts.google.com, content-autofill.googleapis.com, slscr.update.microsoft.com, fonts.gstatic.com, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, ocsp.digicert.com, edgedl.me.gvt1.com, update.googleapis.com, clients.l.google.com, www.gstatic.com, optimizationguide-pa.googleapis.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                    • VT rate limit hit for: file.exe
                                    No simulations
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    239.255.255.250https://tqaun.us12.list-manage.com/track/click?u=fb0a5f04fa3c936488ff652c3&id=d22699c399&e=ce0a629e2eGet hashmaliciousHTMLPhisherBrowse
                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                          http://view.flodesk.com/emails/66fd2053af85c99dd55d1461Get hashmaliciousUnknownBrowse
                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                              https://546546546.pages.dev/qweqr?msharing=service@jpplus.comGet hashmaliciousHTMLPhisherBrowse
                                                file.exeGet hashmaliciousUnknownBrowse
                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                    https://svsjie.us9.list-manage.com/track/click?u=65baddd8dc4a29452f1a28eb2&id=dde4f4d149&e=6d04ecfe32Get hashmaliciousUnknownBrowse
                                                      test.exeGet hashmaliciousBabadedaBrowse
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        No context
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        1138de370e523e824bbca92d049a3777file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 173.222.162.42
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                        • 173.222.162.42
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 173.222.162.42
                                                        test.exeGet hashmaliciousBabadedaBrowse
                                                        • 173.222.162.42
                                                        exit.exeGet hashmaliciousBabadedaBrowse
                                                        • 173.222.162.42
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 173.222.162.42
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 173.222.162.42
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 173.222.162.42
                                                        Remittance[26].htmGet hashmaliciousUnknownBrowse
                                                        • 173.222.162.42
                                                        D0WmCTD2qO.batGet hashmaliciousUnknownBrowse
                                                        • 173.222.162.42
                                                        28a2c9bd18a11de089ef85a160da29e4https://tqaun.us12.list-manage.com/track/click?u=fb0a5f04fa3c936488ff652c3&id=d22699c399&e=ce0a629e2eGet hashmaliciousHTMLPhisherBrowse
                                                        • 52.165.165.26
                                                        • 184.28.90.27
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 52.165.165.26
                                                        • 184.28.90.27
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 52.165.165.26
                                                        • 184.28.90.27
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 52.165.165.26
                                                        • 184.28.90.27
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                        • 52.165.165.26
                                                        • 184.28.90.27
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 52.165.165.26
                                                        • 184.28.90.27
                                                        https://svsjie.us9.list-manage.com/track/click?u=65baddd8dc4a29452f1a28eb2&id=dde4f4d149&e=6d04ecfe32Get hashmaliciousUnknownBrowse
                                                        • 52.165.165.26
                                                        • 184.28.90.27
                                                        test.exeGet hashmaliciousBabadedaBrowse
                                                        • 52.165.165.26
                                                        • 184.28.90.27
                                                        exit.exeGet hashmaliciousBabadedaBrowse
                                                        • 52.165.165.26
                                                        • 184.28.90.27
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 52.165.165.26
                                                        • 184.28.90.27
                                                        No context
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 14:20:29 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                        Category:dropped
                                                        Size (bytes):2675
                                                        Entropy (8bit):3.9836057513065373
                                                        Encrypted:false
                                                        SSDEEP:48:80yda2TUdmggZHhidAKZdA1nehwiZUklqehHy+3:80okg3oy
                                                        MD5:D0DF3A58A7559DF23210CED8CE9433EE
                                                        SHA1:B9B89A2E8B25178CCE666EE051DF3B639901A0E3
                                                        SHA-256:AE7E1BE972E9F5B478CC354CFCE9506A1089009F87B379351C601789564EF37A
                                                        SHA-512:08DBF975652EDFD2B70FD43DB72D4D2F19FFDF9AE66980CAD0BF1E57BFFEDD74D59185599C73CB42754A76CAE9931A7D4BA36C0A8CD6D9EA5525F8AADEB814DB
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:L..................F.@.. ...$+.,....mHm.........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....EWXX..PROGRA~1..t......O.IBY.z....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VBY.z....L.....................p+j.G.o.o.g.l.e.....T.1.....EW.V..Chrome..>......CW.VBY.z....M.....................g.u.C.h.r.o.m.e.....`.1.....EW.V..APPLIC~1..H......CW.VBY.z..........................g.u.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VBY.z............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........+z.,.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 14:20:29 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                        Category:dropped
                                                        Size (bytes):2677
                                                        Entropy (8bit):4.00346521930635
                                                        Encrypted:false
                                                        SSDEEP:48:8ckyda2TUdmggZHhidAKZdA1geh/iZUkAQkqehYy+2:8ckokgz9Qdy
                                                        MD5:D88A7CF89F551FD18DE621B32536F484
                                                        SHA1:D873D0E06D9FE0479D78CFC3512F98BC621285AB
                                                        SHA-256:1E35B310C84E42B0927424201A6F7FE11D40081D26DC2BB5A52344D7B8451E5A
                                                        SHA-512:4A8224E56AB2095A56DFE3BE56EDFD81722A39681C0460C20EA929EAC42FA522C8835567041B87FCE166A857C98454A9848672A9E458591D5EDA709D700617E1
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:L..................F.@.. ...$+.,....y.^.........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....EWXX..PROGRA~1..t......O.IBY.z....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VBY.z....L.....................p+j.G.o.o.g.l.e.....T.1.....EW.V..Chrome..>......CW.VBY.z....M.....................g.u.C.h.r.o.m.e.....`.1.....EW.V..APPLIC~1..H......CW.VBY.z..........................g.u.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VBY.z............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........+z.,.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 09:52:18 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                        Category:dropped
                                                        Size (bytes):2691
                                                        Entropy (8bit):4.00846026478267
                                                        Encrypted:false
                                                        SSDEEP:48:87yda2TUdmgCHhidAKZdA148eh7sFiZUkmgqeh7s2y+BX:87ok0nky
                                                        MD5:DE93C04CB45DECFC52D23AD8125489EE
                                                        SHA1:DF430431B8A87A8E1352FEF7E3CBCB9E076EC632
                                                        SHA-256:6F62CC60ED51E68C1FB273B27EF2E10317A3F37B7B9EC253182AE614F2A2B47B
                                                        SHA-512:2D0D7F07E695E56C439F36406BED4AC968D8C98070DF5137557CB8761775311ABBF3B01BB0DD3FC153F1CCEEBD8744962921AEB8050CB44B3ADBC3907A1DBA05
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:L..................F.@.. ...$+.,....s4..z.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....EWXX..PROGRA~1..t......O.IBY.z....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VBY.z....L.....................p+j.G.o.o.g.l.e.....T.1.....EW.V..Chrome..>......CW.VBY.z....M.....................g.u.C.h.r.o.m.e.....`.1.....EW.V..APPLIC~1..H......CW.VBY.z..........................g.u.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VEW.V............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........+z.,.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 14:20:29 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                        Category:dropped
                                                        Size (bytes):2679
                                                        Entropy (8bit):3.9984408545902257
                                                        Encrypted:false
                                                        SSDEEP:48:8Xyda2TUdmggZHhidAKZdA1lehDiZUkwqehcy+R:8Xokguuy
                                                        MD5:CB8D1094BC494A7AB76B75F144C18A72
                                                        SHA1:9E9513081C64A25CEB9940AA5C1BC40AEC66DEE9
                                                        SHA-256:086B738FC59C44A696B8AE1C6A93A9B5BFC571988C91FC7B953CE81B4448BF17
                                                        SHA-512:F47DE3EB6F4BF778E8EC029FC356D3A12B8FBAF7EF9BA45C192F5F6DFD20171B1B3868D65F7694706F29D1186F394C5118B05E3A14B721655DD8FB9C6E6EBA12
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:L..................F.@.. ...$+.,.....pU.........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....EWXX..PROGRA~1..t......O.IBY.z....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VBY.z....L.....................p+j.G.o.o.g.l.e.....T.1.....EW.V..Chrome..>......CW.VBY.z....M.....................g.u.C.h.r.o.m.e.....`.1.....EW.V..APPLIC~1..H......CW.VBY.z..........................g.u.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VBY.z............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........+z.,.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 14:20:29 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                        Category:dropped
                                                        Size (bytes):2679
                                                        Entropy (8bit):3.9884220196490343
                                                        Encrypted:false
                                                        SSDEEP:48:8Ayda2TUdmggZHhidAKZdA17ehBiZUk1W1qehyy+C:8Aokgu9Sy
                                                        MD5:BC1AF42FC1A3E19F58E319462B42169F
                                                        SHA1:2161EF04DB0D5DE85C052F57DD3933D890E5260B
                                                        SHA-256:954EE431D56108E6ED2EBF9C2F4D8A85B3235A82B34B491A3035B94DB0A27B4E
                                                        SHA-512:B01744C161C5CC36648AFC0D9FA8767FC6022039E116B6A1AAC1779BD3E22F40705DC728124434B2E6CBE985AF25616E8CAFE5D357C357099EAE7B8486B253DA
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:L..................F.@.. ...$+.,....u!f.........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....EWXX..PROGRA~1..t......O.IBY.z....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VBY.z....L.....................p+j.G.o.o.g.l.e.....T.1.....EW.V..Chrome..>......CW.VBY.z....M.....................g.u.C.h.r.o.m.e.....`.1.....EW.V..APPLIC~1..H......CW.VBY.z..........................g.u.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VBY.z............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........+z.,.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 14:20:28 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                        Category:dropped
                                                        Size (bytes):2681
                                                        Entropy (8bit):3.9997585014962094
                                                        Encrypted:false
                                                        SSDEEP:48:8Ryda2TUdmggZHhidAKZdA1duTiehOuTbbiZUk5OjqehOuTbky+yT+:8RokgOTLTbxWOvTbky7T
                                                        MD5:EA25018D1405A49A9E97F6952298E090
                                                        SHA1:3F5314687B99E9C71B4118C63EA524A8D106F0CF
                                                        SHA-256:1A41E7157DE1D202001C5994E2B1732009F10BF2B0F8A79D463F433F7D1F2A7D
                                                        SHA-512:3D66B26312C8116093D79502B29DDA83458D5C522EB0874ACAFE517B04C9F8B14CA6AD628DFB2857B5D9100C07D240DA5000C3C965A36C222355B3ACB93A8D52
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:L..................F.@.. ...$+.,......,.........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....EWXX..PROGRA~1..t......O.IBY.z....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VBY.z....L.....................p+j.G.o.o.g.l.e.....T.1.....EW.V..Chrome..>......CW.VBY.z....M.....................g.u.C.h.r.o.m.e.....`.1.....EW.V..APPLIC~1..H......CW.VBY.z..........................g.u.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VBY.z............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........+z.,.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (522)
                                                        Category:downloaded
                                                        Size (bytes):5050
                                                        Entropy (8bit):5.289052544075544
                                                        Encrypted:false
                                                        SSDEEP:96:o4We0hP7OBFXYvB1sig3Fd8HkaXzLmUrv8Vh1WJlLQXT2v2gqw:655758Fd8HkaPZ0GmAD
                                                        MD5:26E26FD11772DFF5C7004BEA334289CC
                                                        SHA1:638DAAF541BDE31E95AEE4F8ADA677434D7051DB
                                                        SHA-256:ADFE3E4960982F5EF4C043052A9990D8683C5FC2B590E817B6B1A5774DDE2CE3
                                                        SHA-512:C31929EB6D1C60D6A84A2574FF60490394A6D6F9B354972F3328952F570D80B3F2AEC916B0E1B66DDB1AC056EB75BFAC477E7AF631D0AD1810EDBAF025465D66
                                                        Malicious:false
                                                        Reputation:moderate, very likely benign file
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBimEQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZfAoz,ZwDk9d,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,iAskyc,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlFwPDENALwio0taw23fxitsQJhhiA/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=wg1P6b"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.jNa=_.y("wg1P6b",[_.TA,_.Cn,_.Kn]);._.k("wg1P6b");.var Z5a;Z5a=_.mh(["aria-"]);._.uJ=function(a){_.X.call(this,a.Fa);this.Ka=this.wa=this.aa=this.viewportElement=this.Na=null;this.Hc=a.Ea.ff;this.ab=a.Ea.focus;this.Fc=a.Ea.Fc;this.ea=this.Pi();a=-1*parseInt(_.Co(this.Pi().el(),"marginTop")||"0",10);var b=parseInt(_.Co(this.Pi().el(),"marginBottom")||"0",10);this.Ta={top:a,right:0,bottom:b,left:0};a=_.cf(this.getData("isMenuDynamic"),!1);b=_.cf(this.getData("isMenuHoisted"),!1);this.Ga=a?1:b?2:0;this.ka=!1;this.Ca=1;this.Ga!==1&&(this.aa=this.Sa("U0exHf").children().Wc(0),_.ku(this,.$5a(this,this.aa.el())));_.kF(this.oa())&&(a=this.oa().el(),b=this.we.bind(this),a.__soy_skip_handler=b)};_.J(_.uJ,_.X);_.uJ.Ba=function(){return{Ea:{ff:_.ZE,focus:_.KE,Fc:_.ru}}};_.uJ.prototype.xF=function(a){var b=a.source;this.Na=b;var c;((c=a.data)==null?0:c.fz)?(a=a.data.fz,this.Ca=a==="MOUS
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (2907)
                                                        Category:downloaded
                                                        Size (bytes):22833
                                                        Entropy (8bit):5.425034548615223
                                                        Encrypted:false
                                                        SSDEEP:384:7lFo6ZEdpgtmyiPixV9OX9gMBpHkHnfst9lZulagGcwYHiRFjJzN7:77o6ZviPixV8xpEHn89l4IgGcwYCRtb7
                                                        MD5:749B18538FE32BFE0815D75F899F5B21
                                                        SHA1:AF95A019211AF69F752A43CAA54A83C2AFD41D28
                                                        SHA-256:116B2687C1D5E00DB56A79894AB0C12D4E2E000B9379B7E7AD751B84DF611F3F
                                                        SHA-512:E4B6F4556AA0FD9979BB52681508F5E26FFB256473803F74F7F5C8D93FA3636D7D0A5835618FBC6123022805CE0D9616A7451A0F302C665E28A6090B5D588505
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBimEQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlFwPDENALwio0taw23fxitsQJhhiA/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=RqjULd"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.uu.prototype.da=_.ca(40,function(){return _.rj(this,3)});_.$y=function(a,b){this.key=a;this.defaultValue=!1;this.flagName=b};_.$y.prototype.ctor=function(a){return typeof a==="boolean"?a:this.defaultValue};_.az=function(){this.ka=!0;var a=_.vj(_.dk(_.Be("TSDtV",window),_.zya),_.uu,1,_.qj())[0];if(a){var b={};for(var c=_.n(_.vj(a,_.Aya,2,_.qj())),d=c.next();!d.done;d=c.next()){d=d.value;var e=_.Jj(d,1).toString();switch(_.tj(d,_.vu)){case 3:b[e]=_.Hj(d,_.lj(d,_.vu,3));break;case 2:b[e]=_.Jj(d,_.lj(d,_.vu,2));break;case 4:b[e]=_.Kj(d,_.lj(d,_.vu,4));break;case 5:b[e]=_.Lj(d,_.lj(d,_.vu,5));break;case 6:b[e]=_.Pj(d,_.ff,6,_.vu);break;default:throw Error("jd`"+_.tj(d,_.vu));}}}else b={};this.ea=b;this.token=.a?a.da():null};_.az.prototype.aa=function(a){if(!this.ka||a.key in this.ea)a=a.ctor(this.ea[a.key]);else if(_.Be("nQyAE",window)){var b=_.Cya(a.flagName);if(b===null)a=a.de
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (468)
                                                        Category:downloaded
                                                        Size (bytes):1858
                                                        Entropy (8bit):5.298162049824456
                                                        Encrypted:false
                                                        SSDEEP:48:o7vGoolL3ALFKphnpiu7xOKAcfO/3d/rYh4vZorw:o/QLUFUL4KA+2y0Mw
                                                        MD5:CE055F881BDAB4EF6C1C8AA4B3890348
                                                        SHA1:2671741A70E9F5B608F690AAEEA4972003747654
                                                        SHA-256:9B91C23691D6032CDFE28863E369624B2EDB033E1487A1D1BB0977E3590E5462
                                                        SHA-512:8A22250628985C2E570E6FBADFC0D5CB6753F0735130F9E74962A409476C2859C5C81F8A0F5C427A9F13ED399C8E251FA43FF67AD5F16860640D45E7A538E857
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBimEQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZfAoz,ZwDk9d,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlFwPDENALwio0taw23fxitsQJhhiA/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=iAskyc,ziXSP"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("iAskyc");._.QZ=function(a){_.W.call(this,a.Fa);this.window=a.Ea.window.get();this.Nc=a.Ea.Nc};_.J(_.QZ,_.W);_.QZ.Ba=function(){return{Ea:{window:_.qu,Nc:_.DE}}};_.QZ.prototype.Po=function(){};_.QZ.prototype.addEncryptionRecoveryMethod=function(){};_.RZ=function(a){return(a==null?void 0:a.Jo)||function(){}};_.SZ=function(a){return(a==null?void 0:a.m3)||function(){}};_.GPb=function(a){return(a==null?void 0:a.Op)||function(){}};._.HPb=function(a){return new Map(Array.from(a,function(b){var c=_.n(b);b=c.next().value;c=c.next().value;return[b,c.map(function(d){return{epoch:d.epoch,key:new Uint8Array(d.key)}})]}))};_.IPb=function(a){setTimeout(function(){throw a;},0)};_.QZ.prototype.kO=function(){return!0};_.nu(_.An,_.QZ);._.l();._.k("ziXSP");.var j_=function(a){_.QZ.call(this,a.Fa)};_.J(j_,_.QZ);j_.Ba=_.QZ.Ba;j_.prototype.Po=function(a,b,c){var d;if((d=this.window.chrome)==nu
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
                                                        Category:downloaded
                                                        Size (bytes):52280
                                                        Entropy (8bit):7.995413196679271
                                                        Encrypted:true
                                                        SSDEEP:1536:1rvqtK8DZilXxwJ8mMwAZy7phqsFLdG3B4d:xytBZits8bw4wzbFxG3B4d
                                                        MD5:F61F0D4D0F968D5BBA39A84C76277E1A
                                                        SHA1:AA3693EA140ECA418B4B2A30F6A68F6F43B4BEB2
                                                        SHA-256:57147F08949ABABE7DEEF611435AE418475A693E3823769A25C2A39B6EAD9CCC
                                                        SHA-512:6C3BD90F709BCF9151C9ED9FFEA55C4F6883E7FDA2A4E26BF018C83FE1CFBE4F4AA0DB080D6D024070D53B2257472C399C8AC44EEFD38B9445640EFA85D5C487
                                                        Malicious:false
                                                        URL:https://fonts.gstatic.com/s/googlesans/v58/4UaRrENHsxJlGDuGo1OIlJfC6l_24rlCK1Yo_Iq2vgCI.woff2
                                                        Preview:wOF2.......8.....................................^...$..4?HVAR..?MVAR9.`?STAT.*',..J/.......`..(..Z.0..R.6.$.... .....K..[..q..c..T.....>.P.j.`.w..#...%......N.".....$..3.0.6......... .L.rX/r[j.y.|*(.4.%#.....2.v.m..-..%.....;-.Y.{..&..O=#l@...k..7g..ZI...#.Z./+T..r7...M..3).Z%.x....s..sL..[A!.5*1w'/.8V..2Z..%.X.h.o.).]..9..Q`.$.....7..kZ.~O........d..g.n.d.Rw+&....Cz..uy#..fz,(.J....v.%..`..9.....h...?O..:...c%.....6s....xl..#...5..._......1.>.)"U.4 W....?%......6//!$...!.n9C@n...........!""^.....W..Z<.7.x.."UT.T....E.."R>.R..t.....H d..e_.K../.+8.Q.P.ZQ....;...U....]......._.e*......71.?.7.ORv.?...l...G|.P...|:...I.X..2.,.L........d.g.]}W#uW]QnuP-s.;.-Y.....].......C..j_.M0...y.......J..........NY..@A...,....-.F......'..w./j5g.vUS...U..0.&...y7.LP.....%.....Y......Y..D. e.A..G.?.$.......6...eaK.n5.m...N...,...+BCl..L> .E9~.b[.w.x....6<...}.e...%V....O.......*.?...a..#[eE.4..p..$...].....%......o._......N.._~..El....b..A.0.r8.....|..D.d..
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (570)
                                                        Category:downloaded
                                                        Size (bytes):3467
                                                        Entropy (8bit):5.514745431912774
                                                        Encrypted:false
                                                        SSDEEP:96:ozbld2fNUmeqJNizhNtt1W8t//loyIpXmdVE2w:onSKE8PWe/Cy4X3j
                                                        MD5:8DEF399E8355ABC23E64505281005099
                                                        SHA1:24FF74C3AEFD7696D84FF148465DF4B1B60B1696
                                                        SHA-256:F128D7218E1286B05DF11310AD3C8F4CF781402698E45448850D2A3A22F5F185
                                                        SHA-512:33721DD47658D8E12ADF6BD9E9316EB89F5B6297927F7FD60F954E04B829DCBF0E1AE6DDD9A3401F45E0011AE4B1397B960C218238A3D0F633A2173D8E604082
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBimEQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZfAoz,ZwDk9d,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,iAskyc,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,wg1P6b,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlFwPDENALwio0taw23fxitsQJhhiA/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=Wt6vjf,hhhU8,FCpbqb,WhJNk"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("Wt6vjf");.var cya=function(){var a=_.He();return _.Lj(a,1)},Yt=function(a){this.Da=_.t(a,0,Yt.messageId)};_.J(Yt,_.w);Yt.prototype.Ha=function(){return _.Dj(this,1)};Yt.prototype.Va=function(a){return _.Vj(this,1,a)};Yt.messageId="f.bo";var Zt=function(){_.hm.call(this)};_.J(Zt,_.hm);Zt.prototype.xd=function(){this.CT=!1;dya(this);_.hm.prototype.xd.call(this)};Zt.prototype.aa=function(){eya(this);if(this.wC)return fya(this),!1;if(!this.KV)return $t(this),!0;this.dispatchEvent("p");if(!this.zP)return $t(this),!0;this.wM?(this.dispatchEvent("r"),$t(this)):fya(this);return!1};.var gya=function(a){var b=new _.ap(a.W4);a.qQ!=null&&_.Jn(b,"authuser",a.qQ);return b},fya=function(a){a.wC=!0;var b=gya(a),c="rt=r&f_uid="+_.pk(a.zP);_.cn(b,(0,_.bg)(a.ea,a),"POST",c)};.Zt.prototype.ea=function(a){a=a.target;eya(this);if(_.fn(a)){this.cK=0;if(this.wM)this.wC=!1,this.dispatchEvent("r"
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (1694)
                                                        Category:downloaded
                                                        Size (bytes):32500
                                                        Entropy (8bit):5.378903546681047
                                                        Encrypted:false
                                                        SSDEEP:768:zYlbuROstb0e39nKGrkysU0smpu4OLOdzIf1p/5GeSsngurz6aKEEEGo/:zYl61Cysbu4OLOdzIfrIen72ZFo/
                                                        MD5:BF4BF9728A7C302FBA5B14F3D0F1878B
                                                        SHA1:2607CA7A93710D629400077FF3602CB207E6F53D
                                                        SHA-256:8981E7B228DF7D6A8797C0CD1E9B0F1F88337D5F0E1C27A04E7A57D2C4309798
                                                        SHA-512:AC9E170FC3AFDC0CF6BB8E926B93EF129A5FAD1BBA51B60BABCF3555E9B652E98F86A00FB099879DED35DD3FFE72ECFA597E20E6CA8CF402BEDEC40F78412EDA
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBimEQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=_b,_tp/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlFwPDENALwio0taw23fxitsQJhhiA/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=byfTOb,lsjVmc,LEikZe"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{.var Aua=function(a,b){this.da=a;this.ea=b;if(!c){var c=new _.ap("//www.google.com/images/cleardot.gif");_.op(c)}this.ka=c};_.h=Aua.prototype;_.h.Zc=null;_.h.lZ=1E4;_.h.bA=!1;_.h.nQ=0;_.h.zJ=null;_.h.bV=null;_.h.setTimeout=function(a){this.lZ=a};_.h.start=function(){if(this.bA)throw Error("dc");this.bA=!0;this.nQ=0;Bua(this)};_.h.stop=function(){Cua(this);this.bA=!1};.var Bua=function(a){a.nQ++;navigator!==null&&"onLine"in navigator&&!navigator.onLine?_.km((0,_.bg)(a.aH,a,!1),0):(a.aa=new Image,a.aa.onload=(0,_.bg)(a.Fja,a),a.aa.onerror=(0,_.bg)(a.Eja,a),a.aa.onabort=(0,_.bg)(a.Dja,a),a.zJ=_.km(a.Gja,a.lZ,a),a.aa.src=String(a.ka))};_.h=Aua.prototype;_.h.Fja=function(){this.aH(!0)};_.h.Eja=function(){this.aH(!1)};_.h.Dja=function(){this.aH(!1)};_.h.Gja=function(){this.aH(!1)};._.h.aH=function(a){Cua(this);a?(this.bA=!1,this.da.call(this.ea,!0)):this.nQ<=0?Bua(this):(this.bA=!1,
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (683)
                                                        Category:downloaded
                                                        Size (bytes):3131
                                                        Entropy (8bit):5.355381206612617
                                                        Encrypted:false
                                                        SSDEEP:48:o7FEEM3MtH15jNQ8jsK3rnw0dkckTrKEp/OqLE9xz0W5Bzv3M6hIHYA+JITbwrF8:oq675jOArwoAmI/DLaxNPL5m+m6w
                                                        MD5:E2A7251AD83A0D0634FEA2703D10ED07
                                                        SHA1:90D72011F31FC40D3DA3748F2817F90A29EB5C01
                                                        SHA-256:1079B49C4AAF5C10E4F2E6A086623F40D200A71FF2A1F64E88AA6C91E4BE7A6F
                                                        SHA-512:CD6D75580EA8BD97CF7C7C0E0BD9D9A54FB6EA7DF1DDB5A95E94D38B260F9EE1425C640839ECD229B8D01E145CF2786CA374D31EC537EB8FE17FF415D5B985F5
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBimEQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,PHUIyb,PrPYRd,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZfAoz,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlFwPDENALwio0taw23fxitsQJhhiA/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ZwDk9d,RMhBfe"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("ZwDk9d");.var gA=function(a){_.W.call(this,a.Fa)};_.J(gA,_.W);gA.Ba=_.W.Ba;gA.prototype.eS=function(a){return _.Xe(this,{Xa:{gT:_.ll}}).then(function(b){var c=window._wjdd,d=window._wjdc;return!c&&d?new _.li(function(e){window._wjdc=function(f){d(f);e(ZJa(f,b,a))}}):ZJa(c,b,a)})};var ZJa=function(a,b,c){return(a=a&&a[c])?a:b.Xa.gT.eS(c)};.gA.prototype.aa=function(a,b){var c=_.Zra(b).Rj;if(c.startsWith("$")){var d=_.gm.get(a);_.uq[b]&&(d||(d={},_.gm.set(a,d)),d[c]=_.uq[b],delete _.uq[b],_.vq--);if(d)if(a=d[c])b=_.af(a);else throw Error("Jb`"+b);else b=null}else b=null;return b};_.nu(_.Lfa,gA);._.l();._.k("SNUn3");._.YJa=new _.pf(_.wg);._.l();._.k("RMhBfe");.var $Ja=function(a){var b=_.tq(a);return b?new _.li(function(c,d){var e=function(){b=_.tq(a);var f=_.Sfa(a,b);f?c(f.getAttribute("jsdata")):window.document.readyState=="complete"?(f=["Unable to find deferred jsdata wit
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (755)
                                                        Category:downloaded
                                                        Size (bytes):1416
                                                        Entropy (8bit):5.275155058463166
                                                        Encrypted:false
                                                        SSDEEP:24:kMYD7hqCsNRxoYTY9/qoVk7hz1l2p6vDMW94uEQOeGbCx4VGbgCSFBV87O/BprGJ:o7hv6oy12kvwKEeGbC6GbHSh/Hrw
                                                        MD5:4DB6842CDFAC9E03D7C1CF87E398B357
                                                        SHA1:08158AB8F5947E048C88A1289E9E8CE9641B7CE9
                                                        SHA-256:8991D23B586608AE114E150355FF192B30A379EAB1DC3F1444109DDC52B13AC1
                                                        SHA-512:FB7C461DFB96B10E099C3BA41C45AA904BB7D473EF0D44BD6A2E841BC44336DD5F1C9B73919B79A6BF4AA13B806E742F2003A16528E995374E210BB4C3E96EFA
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBimEQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZfAoz,ZwDk9d,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlFwPDENALwio0taw23fxitsQJhhiA/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=P6sQOc"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("P6sQOc");.var $Za=!!(_.Kh[1]&16);var b_a=function(a,b,c,d,e){this.ea=a;this.wa=b;this.ka=c;this.Ca=d;this.Ga=e;this.aa=0;this.da=a_a(this)},c_a=function(a){var b={};_.La(a.yS(),function(e){b[e]=!0});var c=a.pS(),d=a.tS();return new b_a(a.qP(),c.aa()*1E3,a.WR(),d.aa()*1E3,b)},a_a=function(a){return Math.random()*Math.min(a.wa*Math.pow(a.ka,a.aa),a.Ca)},OG=function(a,b){return a.aa>=a.ea?!1:b!=null?!!a.Ga[b]:!0};var PG=function(a){_.W.call(this,a.Fa);this.da=a.Ea.EV;this.ea=a.Ea.metadata;a=a.Ea.Xga;this.fetch=a.fetch.bind(a)};_.J(PG,_.W);PG.Ba=function(){return{Ea:{EV:_.YZa,metadata:_.VZa,Xga:_.OZa}}};PG.prototype.aa=function(a,b){if(this.ea.getType(a.Od())!==1)return _.Sm(a);var c=this.da.eV;return(c=c?c_a(c):null)&&OG(c)?_.wya(a,d_a(this,a,b,c)):_.Sm(a)};.var d_a=function(a,b,c,d){return c.then(function(e){return e},function(e){if($Za)if(e instanceof _.lf){if(!e.status||
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (2544)
                                                        Category:downloaded
                                                        Size (bytes):358799
                                                        Entropy (8bit):5.624587482410481
                                                        Encrypted:false
                                                        SSDEEP:6144:T/wM8RGYcBlKmhCxiDlnc0pYMSrBg5X3rU:TD8XxEdA
                                                        MD5:A51DFF6CB98C15CBA0A2B688CC0A862F
                                                        SHA1:5CF15DBD322A0F9CF3A820013E185EC2EDD56BB0
                                                        SHA-256:854215C9FE46B6029883F37C44512F7EB10BA97FC7A623C237DC6824BD92DB1E
                                                        SHA-512:D1036F2C4AE71BE22315D5AEC062E1D59EA2570D7138B97F367149C9622BEE35EAC1DBE9818AC7BE107D88683089EBE220951D025CC11908055B108B27D7BD86
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBimEQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,EFQ78c,EIOG1e,GwYlN,I6YDgd,IZT63,K0PMbc,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PrPYRd,Rkm0ef,SCuOPb,STuCOe,SpsfSb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,ZakeSe,_b,_tp,aC1iue,aW3pY,bSspM,byfTOb,cYShmd,eVCnO,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,lwddkf,m9oV,mzzZzc,n73qwf,njlZCf,oLggrd,qPfo0c,qmdT9,rCcCxc,siKnQd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,y5vRwf,zbML3c,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlFwPDENALwio0taw23fxitsQJhhiA/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=K1ZKnb,ziZ8Mc,b3kMqb,mvkUhe,CMcBD,Fndnac,t2srLd,EN3i8d,z0u0L,xiZRqc"
                                                        Preview:"use strict";_F_installCss(".r4WGQb{position:relative}.Dl08I>:first-child{margin-top:0}.Dl08I>:last-child{margin-bottom:0}.IzwVE{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-family:\"Google Sans\",roboto,\"Noto Sans Myanmar UI\",arial,sans-serif;font-size:1.25rem;font-weight:400;letter-spacing:0rem;line-height:1.2}.l5PPKe{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-size:1rem}.l5PPKe .dMNVAe{margin:0;padding:0}.l5PPKe>:first-child{margin-top:0;padding-top:0}.l5PPKe>:last-child{margin-bottom:0;padding-bottom:0}.Dl08I{margin:0;padding:0;position:relative}.Dl08I>.SmR8:only-child{padding-top:1px}.Dl08I>.SmR8:only-child::before{top:0}.Dl08I>.SmR8:not(first-child){padding-bottom:1px}.Dl08I>.SmR8::after{bottom:0}.Dl08I>.SmR8:only-child::before,.Dl08I>.SmR8::after{border-bottom:1px solid #c4c7c5;border-bottom:1px solid var(--gm3-sys-color-outline-variant,#c4c7c5);content:\"\";height:0;left:0;position:absolute;width:100%}.aZvCDf{margin-top:8px;margin-left
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:downloaded
                                                        Size (bytes):84
                                                        Entropy (8bit):4.875266466142591
                                                        Encrypted:false
                                                        SSDEEP:3:DZFJu0+WVTBCq2Bjdw2KsJJuYHSKnZ:lFJuuVTBudw29nu4SKZ
                                                        MD5:87B6333E98B7620EA1FF98D1A837A39E
                                                        SHA1:105DE6815B0885357DE1414BFC0D77FCC9E924EF
                                                        SHA-256:DCD3C133C5C40BECD4100BBE6EDAE84C9735E778E4234A5E8395C56FF8A733BA
                                                        SHA-512:867D7943D813685FAA76394E53199750C55817E836FD19C933F74D11E9657CE66719A6D6B2E39EE1DE62358BCE364E38A55F4E138DF92337DE6985DDCD5D0994
                                                        Malicious:false
                                                        URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xNDkSHgmA6QC9dWevzxIFDRkBE_oSBQ3oIX6GEgUN05ioBw==?alt=proto
                                                        Preview:Cj0KBw0ZARP6GgAKKQ3oIX6GGgQISxgCKhwIClIYCg5AIS4jJF8qLSY/Ky8lLBABGP////8PCgcN05ioBxoA
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (395)
                                                        Category:downloaded
                                                        Size (bytes):1652
                                                        Entropy (8bit):5.269909938363071
                                                        Encrypted:false
                                                        SSDEEP:48:o72ZrNZDuZW4yNAbU+15fMxIdf5WENoBCbw7DbG2bEJrw:oyRuZMNAY+1i4HoBNG2Ilw
                                                        MD5:63E5B24335CCDC457DD0B69AD1891CF9
                                                        SHA1:8DD3AED0737BEDBEE133BA564D3CA43579A138F7
                                                        SHA-256:FB72BE79F85659D5AF831FD644C4702EA5BFC6E6A90CDB156DE0816B179278C0
                                                        SHA-512:EC3A143FED571A7FC490433F11DDBD66752E42F0BAC476F79F9B8310DB0419CAE2B8CD65F1283D590F5979F4CC1FB8B2610F106BF38E0B93F384201B8BF5E5DA
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBimEQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlFwPDENALwio0taw23fxitsQJhhiA/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=xUdipf,OTA3Ae,A1yn5d,fKUV3e,aurFic,Ug7Xab,NwH0H,OmgaI,gychg,w9hDv,EEDORb,Mlhmy,ZfAoz,kWgXee,ovKuLd,yDVVkb,ebZ3mb,ZDZcre,A7fCU"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("w9hDv");._.vg(_.Hla);_.eA=function(a){_.W.call(this,a.Fa);this.aa=a.Xa.cache};_.J(_.eA,_.W);_.eA.Ba=function(){return{Xa:{cache:_.dt}}};_.eA.prototype.execute=function(a){_.Bb(a,function(b){var c;_.$e(b)&&(c=b.eb.kc(b.kb));c&&this.aa.xG(c)},this);return{}};_.nu(_.Nla,_.eA);._.l();._.k("lOO0Vd");._.VZa=new _.pf(_.Am);._.l();._.k("ZDZcre");.var fH=function(a){_.W.call(this,a.Fa);this.Wl=a.Ea.Wl;this.d4=a.Ea.metadata;this.aa=a.Ea.ot};_.J(fH,_.W);fH.Ba=function(){return{Ea:{Wl:_.KG,metadata:_.VZa,ot:_.HG}}};fH.prototype.execute=function(a){var b=this;a=this.aa.create(a);return _.Bb(a,function(c){var d=b.d4.getType(c.Od())===2?b.Wl.Rb(c):b.Wl.fetch(c);return _.yl(c,_.LG)?d.then(function(e){return _.Dd(e)}):d},this)};_.nu(_.Sla,fH);._.l();._.k("K5nYTd");._.UZa=new _.pf(_.Ola);._.l();._.k("sP4Vbe");.._.l();._.k("kMFpHd");.._.l();._.k("A7fCU");.var NG=function(a){_.W.call(this,a
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:HTML document, ASCII text, with very long lines (681)
                                                        Category:downloaded
                                                        Size (bytes):4066
                                                        Entropy (8bit):5.363016925556486
                                                        Encrypted:false
                                                        SSDEEP:96:G2CiFZX5BReR68ujioIRVrqtyzBeTV6SfyAKLif9c7w:bCMZXVeR6jiosVrqtyzBaImyAKw9x
                                                        MD5:FC5E597D923838E10390DADD12651A81
                                                        SHA1:C9959F8D539DB5DF07B8246EC12539B6A9CC101F
                                                        SHA-256:A7EBD5280C50AE93C061EAE1E9727329E015E97531F8F2D82D0E3EA76ADB37B4
                                                        SHA-512:784CA572808F184A849388723FBB3701E6981D885BBA8A330A933F90BF0B36A2E4A491D4463A27911B1D9F7A7134F23E15F187FC7CB4554EAE9BC252513EED7C
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBimEQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,PHUIyb,PrPYRd,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZakeSe,ZfAoz,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlFwPDENALwio0taw23fxitsQJhhiA/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=sOXFj,q0xTif,ZZ4WUe"
                                                        Preview:"use strict";_F_installCss(".N7rBcd{overflow-x:auto}sentinel{}");.this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.vg(_.aqa);._.k("sOXFj");.var tu=function(a){_.W.call(this,a.Fa)};_.J(tu,_.W);tu.Ba=_.W.Ba;tu.prototype.aa=function(a){return a()};_.nu(_.$pa,tu);._.l();._.k("oGtAuc");._.yya=new _.pf(_.aqa);._.l();._.k("q0xTif");.var sza=function(a){var b=function(d){_.Sn(d)&&(_.Sn(d).Jc=null,_.Du(d,null));d.XyHi9&&(d.XyHi9=null)};b(a);a=a.querySelectorAll("[c-wiz]");for(var c=0;c<a.length;c++)b(a[c])},Pu=function(a){_.kt.call(this,a.Fa);this.Qa=this.dom=null;if(this.kl()){var b=_.zm(this.Ug(),[_.Em,_.Dm]);b=_.ni([b[_.Em],b[_.Dm]]).then(function(c){this.Qa=c[0];this.dom=c[1]},null,this);_.hu(this,b)}this.Ra=a.lm.zea};_.J(Pu,_.kt);Pu.Ba=function(){return{lm:{zea:function(a){return _.Ue(a)}}}};Pu.prototype.zp=function(a){return this.Ra.zp(a)};.Pu.prototype.getData=function(a){return this.Ra.getData(a)};Pu.prototype.qo=function(){_.Kt(this.d
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (553)
                                                        Category:downloaded
                                                        Size (bytes):743936
                                                        Entropy (8bit):5.791086737110097
                                                        Encrypted:false
                                                        SSDEEP:6144:HVXWBQkPdzg5pTX1ROv/duPzd8C3s891/N:gfd8j91/N
                                                        MD5:F9F15F21696A09965757714D00305D14
                                                        SHA1:C7292420A092BF5C277A68B6E42971190AD63C82
                                                        SHA-256:EE66751937B1179DF56A5A789EB36D98B6A53116EABFEC2B35F93894EF71966E
                                                        SHA-512:751EB98B9E8ED75FC72569C6887C348847E0A1D7889A7C4254D96AA54D30C3A57CE1F2F42797A55996EBD6AAB58026EC623BCD9AEEB2672857B2081141021B78
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/am=xIFgKBimEQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/excm=_b,_tp,identifierview/ed=1/dg=0/wt=2/ujg=1/rs=AOaEmlFJRy1OqtUmLpt_G_DWG-oJaagYwQ/m=_b,_tp"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._._F_toggles_initialize=function(a){(typeof globalThis!=="undefined"?globalThis:typeof self!=="undefined"?self:this)._F_toggles=a||[]};(0,_._F_toggles_initialize)([0x286081c4, 0x20469860, 0x39e13c40, 0x14501e80, 0xe420, 0x0, 0x1a000000, 0x1d000003, 0xc, ]);./*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright Google LLC. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright 2024 Google, Inc. SPDX-License-Identifier: MIT.*/./*. SPDX-License-Identifier: Apache-2.0.*/./*. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/.var baa,daa,Ma,Sa,gaa,iaa,jb,qaa,waa,Caa,Haa,Kaa,Jb,Laa,Ob,Qb,Rb,Maa,Naa,Sb,Oaa,Paa,Qaa,Yb,Vaa,Xaa,ec,fc,gc,bba,cba,gba,jba,lba,mba,qba,tba,nba,sba,rba,pba,oba,uba,yba,Cba,Dba,Aba,Hc,Ic,Gba,Iba,Mba,Nba,Oba,Pba,Lba,Qba,Sba,dd,Uba,Vba,Xba,Zba,Yba,aca,bca,cca,dca,fca,eca,hca,ica,jca,kca,nca,
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (533)
                                                        Category:downloaded
                                                        Size (bytes):9210
                                                        Entropy (8bit):5.404371326611379
                                                        Encrypted:false
                                                        SSDEEP:192:EEFZpeip4HzZlY0If0Ma23jcUcrhCx6VD1TYPi8:Es/p4jgjUhtD1TY68
                                                        MD5:21E893B65627B397E22619A9F5BB9662
                                                        SHA1:F561B0F66211C1E7B22F94B4935C312AB7087E85
                                                        SHA-256:FFA9B8BC8EF2CDFF5EB4BA1A0BA1710A253A5B42535E2A369D5026967DCF4673
                                                        SHA-512:3DE3CD6A4E9B06AB3EB324E90A40B5F2AEEA8D7D6A2651C310E993CF79EEB5AC6E2E33C587F46B2DD20CC862354FD1A61AEBB9B990E6805F6629404BA285F8FA
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBimEQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PrPYRd,Rkm0ef,SCuOPb,STuCOe,SpsfSb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,byfTOb,cYShmd,eVCnO,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,qPfo0c,qmdT9,rCcCxc,siKnQd,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlFwPDENALwio0taw23fxitsQJhhiA/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ltDFwf,SD8Jgb,rmumx,E87wgc,qPYxq,Tbb4sb,pxq3x,f8Gu1e,soHxf,YgOFye,yRXbo,bTi8wc,ywOR5c,PHUIyb"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.qNa=_.y("SD8Jgb",[]);._.GX=function(a,b){if(typeof b==="string")a.Lc(b);else if(b instanceof _.Fp&&b.ia&&b.ia===_.A)b=_.Ya(b.Lw()),a.empty().append(b);else if(b instanceof _.Ua)b=_.Ya(b),a.empty().append(b);else if(b instanceof Node)a.empty().append(b);else throw Error("Vf");};_.HX=function(a){var b=_.Io(a,"[jsslot]");if(b.size()>0)return b;b=new _.Go([_.Kk("span")]);_.Jo(b,"jsslot","");a.empty().append(b);return b};_.NLb=function(a){return a===null||typeof a==="string"&&_.Hi(a)};._.k("SD8Jgb");._.MX=function(a){_.X.call(this,a.Fa);this.Ua=a.controller.Ua;this.od=a.controllers.od[0]||null;this.header=a.controller.header;this.nav=a.controller.nav;var b;(b=this.oa().find("button:not([type])").el())==null||b.setAttribute("type","button")};_.J(_.MX,_.X);_.MX.Ba=function(){return{controller:{Ua:{jsname:"n7vHCb",ctor:_.mv},header:{jsname:"tJHJj",ctor:_.mv},nav:{jsname:"DH6Rkf",ct
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                                                        Category:downloaded
                                                        Size (bytes):5430
                                                        Entropy (8bit):3.6534652184263736
                                                        Encrypted:false
                                                        SSDEEP:48:wIJct3xIAxG/7nvWDtZcdYLtX7B6QXL3aqG8Q:wIJct+A47v+rcqlBPG9B
                                                        MD5:F3418A443E7D841097C714D69EC4BCB8
                                                        SHA1:49263695F6B0CDD72F45CF1B775E660FDC36C606
                                                        SHA-256:6DA5620880159634213E197FAFCA1DDE0272153BE3E4590818533FAB8D040770
                                                        SHA-512:82D017C4B7EC8E0C46E8B75DA0CA6A52FD8BCE7FCF4E556CBDF16B49FC81BE9953FE7E25A05F63ECD41C7272E8BB0A9FD9AEDF0AC06CB6032330B096B3702563
                                                        Malicious:false
                                                        URL:https://www.google.com/favicon.ico
                                                        Preview:............ .h...&... .... .........(....... ..... ............................................0...................................................................................................................................v.].X.:.X.:.r.Y........................................q.X.S.4.S.4.S.4.S.4.S.4.S.4...X....................0........q.W.S.4.X.:.................J...A...g.........................K.H.V.8..........................F..B.....................,.......................................B..............................................B..B..B..B..B...u..........................................B..B..B..B..B...{.................5.......k...........................................................7R..8F.................................................2........Vb..5C..;I..................R^.....................0................Xc..5C..5C..5C..5C..5C..5C..lv..........................................]i..<J..:G..Zf....................................................
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (3190)
                                                        Category:downloaded
                                                        Size (bytes):339747
                                                        Entropy (8bit):5.53363647964667
                                                        Encrypted:false
                                                        SSDEEP:3072:Vuv7kVKtaVFuzDXG6ZfzeelpRv9xqjne01T2HemAIaDlC6diGVOY50UlRQQIBeDq:svaKtM6ZfTxene0F2HemAaGP6BBe2
                                                        MD5:D2D05D80ACF53F04C1BEB6A387216F5E
                                                        SHA1:6E8B87D352419E28C5F8E3881787DC6C56CEB26E
                                                        SHA-256:4BA0D4EA27446C609D515539A334E3B16A4AC7BF936A996CF7E3927FFDDD569F
                                                        SHA-512:966582697B455B2DDC52210A0F46EFD77EDC67D668E7FC2F14E18DF38E8595472AB76ED17B9D2928E16FA987E3231C2A45D9BD52D9DC2CE7E4C394E2453518E6
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBimEQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=LEikZe,_b,_tp,byfTOb,lsjVmc/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlFwPDENALwio0taw23fxitsQJhhiA/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=n73qwf,SCuOPb,IZT63,vfuNJf,UUJqVe,ws9Tlc,siKnQd,XVq9Qb,STuCOe,njlZCf,m9oV,vjKJJ,y5vRwf,iyZMqd,NTMZac,mzzZzc,rCcCxc,vvMGie,NOeYWe,O6y8ed,L9OGUe,PrPYRd,MpJwZc,qPfo0c,cYShmd,hc6Ubd,Rkm0ef,KUM7Z,oLggrd,inNHtf,L1AAkb,WpP9Yc,lwddkf,gJzDyc,SpsfSb,aC1iue,tUnxGc,aW3pY,ZakeSe,EFQ78c,xQtZb,I6YDgd,zbML3c,zr1jrb,vHEMJe,YHI3We,YTxL4,bSspM,Uas9Hd,zy0vNb,K0PMbc,AvtSve,qmdT9,MY7mZe,xBaz7b,GwYlN,eVCnO,EIOG1e,LDQI"
                                                        Preview:"use strict";_F_installCss(".EE6QGf{border-bottom-style:solid;border-bottom-width:1px;padding:16px;width:100%;z-index:6;background:#fff;background:var(--gm3-sys-color-surface-container-lowest,#fff);border-color:#c4c7c5;border-color:var(--gm3-sys-color-outline-variant,#c4c7c5);display:block;position:relative}.EE6QGf~.S7xv8,.EE6QGf~.gfM9Zd{padding-top:inherit}@media (min-width:600px){.EE6QGf{align-items:center;display:flex;left:0;position:fixed;top:0}.EE6QGf~.S7xv8,.EE6QGf~.gfM9Zd{padding-top:150px}}@media (min-width:600px) and (orientation:landscape){.EE6QGf{display:block;position:relative}.EE6QGf~.S7xv8,.EE6QGf~.gfM9Zd{padding-top:inherit}}@media (min-width:960px) and (orientation:landscape){.EE6QGf{align-items:center;display:flex;left:0;position:fixed;top:0}.EE6QGf~.S7xv8,.EE6QGf~.gfM9Zd{padding-top:150px}}.PZB4Lc{display:flex;width:100%}.YLIzab{font-family:\"Google Sans\",roboto,\"Noto Sans Myanmar UI\",arial,sans-serif;font-size:1rem;font-weight:500;letter-spacing:0rem;line-height:1
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):6.582163174163994
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:file.exe
                                                        File size:918'528 bytes
                                                        MD5:1bf42b89a7e2436161c26089f29a0652
                                                        SHA1:196af2e64f23aea23fc728955864280a2150c02d
                                                        SHA256:9ecce840839e193265eff13feb177e00794c9df0c0a58c92ea6c31affc728fe3
                                                        SHA512:702a97ca7efbc85dedbb9f277b13cc2e7974190b05d5ff41589f3906731d4d17bfa629b872dd616f522c0ebeb95c33bb5d0e3400a2d006f81b8781388f9efa92
                                                        SSDEEP:12288:kqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgaATf:kqDEvCTbMWu7rQYlBQcBiT6rprG8aYf
                                                        TLSH:35159E0273D1C062FF9B92334B5AF6515BBC69260123E62F13981DB9BE701B1563E7A3
                                                        File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                        Icon Hash:aaf3e3e3938382a0
                                                        Entrypoint:0x420577
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x66FD55A3 [Wed Oct 2 14:16:03 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:5
                                                        OS Version Minor:1
                                                        File Version Major:5
                                                        File Version Minor:1
                                                        Subsystem Version Major:5
                                                        Subsystem Version Minor:1
                                                        Import Hash:948cc502fe9226992dce9417f952fce3
                                                        Instruction
                                                        call 00007FC2A8C673B3h
                                                        jmp 00007FC2A8C66CBFh
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        push dword ptr [ebp+08h]
                                                        mov esi, ecx
                                                        call 00007FC2A8C66E9Dh
                                                        mov dword ptr [esi], 0049FDF0h
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        and dword ptr [ecx+04h], 00000000h
                                                        mov eax, ecx
                                                        and dword ptr [ecx+08h], 00000000h
                                                        mov dword ptr [ecx+04h], 0049FDF8h
                                                        mov dword ptr [ecx], 0049FDF0h
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        push dword ptr [ebp+08h]
                                                        mov esi, ecx
                                                        call 00007FC2A8C66E6Ah
                                                        mov dword ptr [esi], 0049FE0Ch
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        and dword ptr [ecx+04h], 00000000h
                                                        mov eax, ecx
                                                        and dword ptr [ecx+08h], 00000000h
                                                        mov dword ptr [ecx+04h], 0049FE14h
                                                        mov dword ptr [ecx], 0049FE0Ch
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        mov esi, ecx
                                                        lea eax, dword ptr [esi+04h]
                                                        mov dword ptr [esi], 0049FDD0h
                                                        and dword ptr [eax], 00000000h
                                                        and dword ptr [eax+04h], 00000000h
                                                        push eax
                                                        mov eax, dword ptr [ebp+08h]
                                                        add eax, 04h
                                                        push eax
                                                        call 00007FC2A8C69A5Dh
                                                        pop ecx
                                                        pop ecx
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        lea eax, dword ptr [ecx+04h]
                                                        mov dword ptr [ecx], 0049FDD0h
                                                        push eax
                                                        call 00007FC2A8C69AA8h
                                                        pop ecx
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        mov esi, ecx
                                                        lea eax, dword ptr [esi+04h]
                                                        mov dword ptr [esi], 0049FDD0h
                                                        push eax
                                                        call 00007FC2A8C69A91h
                                                        test byte ptr [ebp+08h], 00000001h
                                                        pop ecx
                                                        Programming Language:
                                                        • [ C ] VS2008 SP1 build 30729
                                                        • [IMP] VS2008 SP1 build 30729
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x9878.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xde0000x7594.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rsrc0xd40000x98780x9a00bd2744c8075646a4246cce4c7df391b8False0.2984476461038961data5.274724608640071IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0xde0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                        RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                        RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                        RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                        RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                        RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                        RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                        RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                        RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                        RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                        RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                        RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                        RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                        RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                        RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                        RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                        RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                        RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                        RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                        RT_RCDATA0xdc7b80xb40data1.0038194444444444
                                                        RT_GROUP_ICON0xdd2f80x76dataEnglishGreat Britain0.6610169491525424
                                                        RT_GROUP_ICON0xdd3700x14dataEnglishGreat Britain1.25
                                                        RT_GROUP_ICON0xdd3840x14dataEnglishGreat Britain1.15
                                                        RT_GROUP_ICON0xdd3980x14dataEnglishGreat Britain1.25
                                                        RT_VERSION0xdd3ac0xdcdataEnglishGreat Britain0.6181818181818182
                                                        RT_MANIFEST0xdd4880x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                        DLLImport
                                                        WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                        VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                        COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                        MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                        WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                        PSAPI.DLLGetProcessMemoryInfo
                                                        IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                        USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                        UxTheme.dllIsThemeActive
                                                        KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                        USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                        GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                        COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                        ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                        SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                        OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishGreat Britain
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Oct 2, 2024 17:20:20.355974913 CEST49676443192.168.2.1120.189.173.3
                                                        Oct 2, 2024 17:20:20.660235882 CEST49676443192.168.2.1120.189.173.3
                                                        Oct 2, 2024 17:20:21.269567966 CEST49676443192.168.2.1120.189.173.3
                                                        Oct 2, 2024 17:20:21.378967047 CEST49671443192.168.2.11204.79.197.203
                                                        Oct 2, 2024 17:20:22.472702980 CEST49676443192.168.2.1120.189.173.3
                                                        Oct 2, 2024 17:20:22.878925085 CEST49674443192.168.2.11173.222.162.42
                                                        Oct 2, 2024 17:20:23.003942013 CEST49673443192.168.2.11173.222.162.42
                                                        Oct 2, 2024 17:20:24.878894091 CEST49676443192.168.2.1120.189.173.3
                                                        Oct 2, 2024 17:20:28.627629042 CEST49713443192.168.2.11142.250.186.174
                                                        Oct 2, 2024 17:20:28.627672911 CEST44349713142.250.186.174192.168.2.11
                                                        Oct 2, 2024 17:20:28.627784967 CEST49713443192.168.2.11142.250.186.174
                                                        Oct 2, 2024 17:20:28.628079891 CEST49713443192.168.2.11142.250.186.174
                                                        Oct 2, 2024 17:20:28.628098965 CEST44349713142.250.186.174192.168.2.11
                                                        Oct 2, 2024 17:20:29.265372992 CEST44349713142.250.186.174192.168.2.11
                                                        Oct 2, 2024 17:20:29.265772104 CEST49713443192.168.2.11142.250.186.174
                                                        Oct 2, 2024 17:20:29.265805960 CEST44349713142.250.186.174192.168.2.11
                                                        Oct 2, 2024 17:20:29.266206026 CEST44349713142.250.186.174192.168.2.11
                                                        Oct 2, 2024 17:20:29.266535997 CEST49713443192.168.2.11142.250.186.174
                                                        Oct 2, 2024 17:20:29.266933918 CEST44349713142.250.186.174192.168.2.11
                                                        Oct 2, 2024 17:20:29.266984940 CEST49713443192.168.2.11142.250.186.174
                                                        Oct 2, 2024 17:20:29.268069029 CEST49713443192.168.2.11142.250.186.174
                                                        Oct 2, 2024 17:20:29.268131018 CEST44349713142.250.186.174192.168.2.11
                                                        Oct 2, 2024 17:20:29.268429995 CEST49713443192.168.2.11142.250.186.174
                                                        Oct 2, 2024 17:20:29.268436909 CEST44349713142.250.186.174192.168.2.11
                                                        Oct 2, 2024 17:20:29.323338032 CEST49713443192.168.2.11142.250.186.174
                                                        Oct 2, 2024 17:20:29.593137026 CEST44349713142.250.186.174192.168.2.11
                                                        Oct 2, 2024 17:20:29.593158960 CEST44349713142.250.186.174192.168.2.11
                                                        Oct 2, 2024 17:20:29.593242884 CEST44349713142.250.186.174192.168.2.11
                                                        Oct 2, 2024 17:20:29.593287945 CEST49713443192.168.2.11142.250.186.174
                                                        Oct 2, 2024 17:20:29.593328953 CEST49713443192.168.2.11142.250.186.174
                                                        Oct 2, 2024 17:20:29.595504999 CEST49713443192.168.2.11142.250.186.174
                                                        Oct 2, 2024 17:20:29.595529079 CEST44349713142.250.186.174192.168.2.11
                                                        Oct 2, 2024 17:20:29.682701111 CEST49676443192.168.2.1120.189.173.3
                                                        Oct 2, 2024 17:20:30.979381084 CEST49671443192.168.2.11204.79.197.203
                                                        Oct 2, 2024 17:20:31.381087065 CEST49718443192.168.2.11142.250.184.228
                                                        Oct 2, 2024 17:20:31.381123066 CEST44349718142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:20:31.381182909 CEST49718443192.168.2.11142.250.184.228
                                                        Oct 2, 2024 17:20:31.381496906 CEST49718443192.168.2.11142.250.184.228
                                                        Oct 2, 2024 17:20:31.381511927 CEST44349718142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:20:32.174642086 CEST44349718142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:20:32.174871922 CEST49718443192.168.2.11142.250.184.228
                                                        Oct 2, 2024 17:20:32.174902916 CEST44349718142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:20:32.175962925 CEST44349718142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:20:32.176016092 CEST49718443192.168.2.11142.250.184.228
                                                        Oct 2, 2024 17:20:32.177114010 CEST49718443192.168.2.11142.250.184.228
                                                        Oct 2, 2024 17:20:32.177180052 CEST44349718142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:20:32.230256081 CEST49718443192.168.2.11142.250.184.228
                                                        Oct 2, 2024 17:20:32.230273008 CEST44349718142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:20:32.277158976 CEST49718443192.168.2.11142.250.184.228
                                                        Oct 2, 2024 17:20:32.480309010 CEST49674443192.168.2.11173.222.162.42
                                                        Oct 2, 2024 17:20:32.612473011 CEST49673443192.168.2.11173.222.162.42
                                                        Oct 2, 2024 17:20:32.690829039 CEST49720443192.168.2.11184.28.90.27
                                                        Oct 2, 2024 17:20:32.690865993 CEST44349720184.28.90.27192.168.2.11
                                                        Oct 2, 2024 17:20:32.691020966 CEST49720443192.168.2.11184.28.90.27
                                                        Oct 2, 2024 17:20:32.693667889 CEST49720443192.168.2.11184.28.90.27
                                                        Oct 2, 2024 17:20:32.693682909 CEST44349720184.28.90.27192.168.2.11
                                                        Oct 2, 2024 17:20:33.361488104 CEST44349720184.28.90.27192.168.2.11
                                                        Oct 2, 2024 17:20:33.361556053 CEST49720443192.168.2.11184.28.90.27
                                                        Oct 2, 2024 17:20:33.366352081 CEST49720443192.168.2.11184.28.90.27
                                                        Oct 2, 2024 17:20:33.366358995 CEST44349720184.28.90.27192.168.2.11
                                                        Oct 2, 2024 17:20:33.366738081 CEST44349720184.28.90.27192.168.2.11
                                                        Oct 2, 2024 17:20:33.418790102 CEST49720443192.168.2.11184.28.90.27
                                                        Oct 2, 2024 17:20:33.430598021 CEST49720443192.168.2.11184.28.90.27
                                                        Oct 2, 2024 17:20:33.471405983 CEST44349720184.28.90.27192.168.2.11
                                                        Oct 2, 2024 17:20:33.636960983 CEST44349720184.28.90.27192.168.2.11
                                                        Oct 2, 2024 17:20:33.637038946 CEST44349720184.28.90.27192.168.2.11
                                                        Oct 2, 2024 17:20:33.637090921 CEST49720443192.168.2.11184.28.90.27
                                                        Oct 2, 2024 17:20:33.637315989 CEST49720443192.168.2.11184.28.90.27
                                                        Oct 2, 2024 17:20:33.637345076 CEST44349720184.28.90.27192.168.2.11
                                                        Oct 2, 2024 17:20:33.637360096 CEST49720443192.168.2.11184.28.90.27
                                                        Oct 2, 2024 17:20:33.637366056 CEST44349720184.28.90.27192.168.2.11
                                                        Oct 2, 2024 17:20:33.672674894 CEST49722443192.168.2.11184.28.90.27
                                                        Oct 2, 2024 17:20:33.672724009 CEST44349722184.28.90.27192.168.2.11
                                                        Oct 2, 2024 17:20:33.672786951 CEST49722443192.168.2.11184.28.90.27
                                                        Oct 2, 2024 17:20:33.673172951 CEST49722443192.168.2.11184.28.90.27
                                                        Oct 2, 2024 17:20:33.673187971 CEST44349722184.28.90.27192.168.2.11
                                                        Oct 2, 2024 17:20:34.268348932 CEST44349706173.222.162.42192.168.2.11
                                                        Oct 2, 2024 17:20:34.269093037 CEST49706443192.168.2.11173.222.162.42
                                                        Oct 2, 2024 17:20:34.315979958 CEST44349722184.28.90.27192.168.2.11
                                                        Oct 2, 2024 17:20:34.316323996 CEST49722443192.168.2.11184.28.90.27
                                                        Oct 2, 2024 17:20:34.318110943 CEST49722443192.168.2.11184.28.90.27
                                                        Oct 2, 2024 17:20:34.318124056 CEST44349722184.28.90.27192.168.2.11
                                                        Oct 2, 2024 17:20:34.318327904 CEST44349722184.28.90.27192.168.2.11
                                                        Oct 2, 2024 17:20:34.322158098 CEST49722443192.168.2.11184.28.90.27
                                                        Oct 2, 2024 17:20:34.367403984 CEST44349722184.28.90.27192.168.2.11
                                                        Oct 2, 2024 17:20:34.601191044 CEST44349722184.28.90.27192.168.2.11
                                                        Oct 2, 2024 17:20:34.601253033 CEST44349722184.28.90.27192.168.2.11
                                                        Oct 2, 2024 17:20:34.601429939 CEST49722443192.168.2.11184.28.90.27
                                                        Oct 2, 2024 17:20:34.602091074 CEST49722443192.168.2.11184.28.90.27
                                                        Oct 2, 2024 17:20:34.602091074 CEST49722443192.168.2.11184.28.90.27
                                                        Oct 2, 2024 17:20:34.602112055 CEST44349722184.28.90.27192.168.2.11
                                                        Oct 2, 2024 17:20:34.602119923 CEST44349722184.28.90.27192.168.2.11
                                                        Oct 2, 2024 17:20:36.911420107 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:36.911472082 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:36.914752007 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:36.914752007 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:36.914797068 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:37.630920887 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:37.635859966 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:37.635875940 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:37.636291981 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:37.636383057 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:37.636992931 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:37.637058973 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:37.660007954 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:37.660129070 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:37.664252996 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:37.664264917 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:37.717947960 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:37.949291945 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:37.949358940 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:37.949398041 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:37.949517965 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:37.949549913 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:37.949606895 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:37.955333948 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:37.955471039 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:37.961128950 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:37.961184978 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:37.961236000 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:37.961246967 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:37.961282969 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:37.966475010 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:37.966590881 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:37.966600895 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:37.967932940 CEST49737443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:37.967986107 CEST44349737172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:37.968061924 CEST49737443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:37.968297005 CEST49737443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:37.968312979 CEST44349737172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:37.972771883 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:37.972814083 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:37.972848892 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:37.972861052 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:37.972912073 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:38.034487009 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:38.034559965 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:38.034574986 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:38.034591913 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:38.034626961 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:38.037245989 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:38.037322044 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:38.040393114 CEST49738443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:38.040426970 CEST44349738172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:38.040488958 CEST49738443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:38.040838003 CEST49738443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:38.040851116 CEST44349738172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:38.043494940 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:38.043550014 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:38.043565989 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:38.043574095 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:38.043612957 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:38.050096989 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:38.050169945 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:38.056071997 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:38.056144953 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:38.056154966 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:38.062474966 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:38.062555075 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:38.062562943 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:38.068715096 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:38.068793058 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:38.068800926 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:38.068869114 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:38.068917036 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:38.068996906 CEST49734443192.168.2.11142.250.185.238
                                                        Oct 2, 2024 17:20:38.069015026 CEST44349734142.250.185.238192.168.2.11
                                                        Oct 2, 2024 17:20:38.613404989 CEST44349737172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:38.613732100 CEST49737443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:38.613751888 CEST44349737172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:38.614178896 CEST44349737172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:38.614245892 CEST49737443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:38.614913940 CEST44349737172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:38.614994049 CEST49737443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:38.615909100 CEST49737443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:38.616007090 CEST44349737172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:38.616254091 CEST49737443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:38.616262913 CEST44349737172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:38.668668985 CEST49737443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:38.756069899 CEST44349738172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:38.756329060 CEST49738443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:38.756345034 CEST44349738172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:38.756772995 CEST44349738172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:38.756840944 CEST49738443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:38.758100986 CEST44349738172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:38.758189917 CEST49738443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:38.758333921 CEST49738443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:38.758433104 CEST44349738172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:38.758557081 CEST49738443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:38.758564949 CEST44349738172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:38.808756113 CEST49738443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:38.913739920 CEST44349737172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:38.913820028 CEST44349737172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:38.913881063 CEST49737443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:38.914522886 CEST49737443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:38.914539099 CEST44349737172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:38.915345907 CEST49742443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:38.915379047 CEST44349742172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:38.915451050 CEST49742443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:38.915762901 CEST49742443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:38.915776014 CEST44349742172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:39.099112988 CEST44349738172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:39.099317074 CEST44349738172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:39.099397898 CEST49738443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:39.100538969 CEST49738443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:39.100554943 CEST44349738172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:39.101321936 CEST49743443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:39.101373911 CEST44349743172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:39.101438046 CEST49743443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:39.102399111 CEST49743443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:39.102416039 CEST44349743172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:39.297322989 CEST49676443192.168.2.1120.189.173.3
                                                        Oct 2, 2024 17:20:39.572936058 CEST44349742172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:39.573313951 CEST49742443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:39.573329926 CEST44349742172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:39.573882103 CEST44349742172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:39.573956966 CEST49742443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:39.574599981 CEST44349742172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:39.574656010 CEST49742443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:39.575865984 CEST49742443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:39.575927973 CEST44349742172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:39.576077938 CEST49742443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:39.576086998 CEST44349742172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:39.576103926 CEST49742443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:39.622200012 CEST49742443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:39.622231960 CEST44349742172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:39.748647928 CEST44349743172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:39.753117085 CEST49743443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:39.753145933 CEST44349743172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:39.753739119 CEST44349743172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:39.753802061 CEST49743443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:39.754452944 CEST44349743172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:39.754492998 CEST49743443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:39.754652977 CEST49743443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:39.754828930 CEST44349743172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:39.755597115 CEST49743443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:39.755608082 CEST44349743172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:39.755682945 CEST49743443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:39.800823927 CEST44349742172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:39.801305056 CEST44349742172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:39.801386118 CEST49742443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:39.802042961 CEST49742443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:39.802059889 CEST44349742172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:39.803417921 CEST44349743172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:40.205395937 CEST44349743172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:40.205537081 CEST44349743172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:40.205605984 CEST49743443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:40.378107071 CEST49743443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:40.378142118 CEST44349743172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:40.675242901 CEST49718443192.168.2.11142.250.184.228
                                                        Oct 2, 2024 17:20:40.719398975 CEST44349718142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:20:40.943890095 CEST44349718142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:20:40.943938971 CEST44349718142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:20:40.943965912 CEST44349718142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:20:40.943994045 CEST44349718142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:20:40.944005966 CEST49718443192.168.2.11142.250.184.228
                                                        Oct 2, 2024 17:20:40.944019079 CEST44349718142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:20:40.944045067 CEST49718443192.168.2.11142.250.184.228
                                                        Oct 2, 2024 17:20:40.944103956 CEST44349718142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:20:40.944140911 CEST49718443192.168.2.11142.250.184.228
                                                        Oct 2, 2024 17:20:40.945481062 CEST49718443192.168.2.11142.250.184.228
                                                        Oct 2, 2024 17:20:40.945497990 CEST44349718142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:20:41.221487045 CEST49747443192.168.2.1152.165.165.26
                                                        Oct 2, 2024 17:20:41.221528053 CEST4434974752.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:20:41.221606016 CEST49747443192.168.2.1152.165.165.26
                                                        Oct 2, 2024 17:20:41.222609997 CEST49747443192.168.2.1152.165.165.26
                                                        Oct 2, 2024 17:20:41.222624063 CEST4434974752.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:20:41.903337002 CEST4434974752.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:20:41.903573036 CEST49747443192.168.2.1152.165.165.26
                                                        Oct 2, 2024 17:20:41.907315016 CEST49747443192.168.2.1152.165.165.26
                                                        Oct 2, 2024 17:20:41.907322884 CEST4434974752.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:20:41.907813072 CEST4434974752.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:20:41.948445082 CEST49747443192.168.2.1152.165.165.26
                                                        Oct 2, 2024 17:20:42.918622017 CEST49747443192.168.2.1152.165.165.26
                                                        Oct 2, 2024 17:20:42.963407993 CEST4434974752.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:20:43.149769068 CEST4434974752.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:20:43.149796963 CEST4434974752.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:20:43.149806023 CEST4434974752.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:20:43.149815083 CEST4434974752.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:20:43.149887085 CEST4434974752.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:20:43.149924994 CEST49747443192.168.2.1152.165.165.26
                                                        Oct 2, 2024 17:20:43.149947882 CEST49747443192.168.2.1152.165.165.26
                                                        Oct 2, 2024 17:20:43.149950027 CEST4434974752.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:20:43.150007010 CEST49747443192.168.2.1152.165.165.26
                                                        Oct 2, 2024 17:20:43.150017977 CEST4434974752.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:20:43.150374889 CEST4434974752.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:20:43.150964975 CEST49747443192.168.2.1152.165.165.26
                                                        Oct 2, 2024 17:20:43.870165110 CEST49747443192.168.2.1152.165.165.26
                                                        Oct 2, 2024 17:20:43.870198965 CEST4434974752.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:20:43.870209932 CEST49747443192.168.2.1152.165.165.26
                                                        Oct 2, 2024 17:20:43.870217085 CEST4434974752.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:20:45.659986019 CEST49706443192.168.2.11173.222.162.42
                                                        Oct 2, 2024 17:20:45.660094023 CEST49706443192.168.2.11173.222.162.42
                                                        Oct 2, 2024 17:20:45.660475016 CEST49756443192.168.2.11173.222.162.42
                                                        Oct 2, 2024 17:20:45.660526037 CEST44349756173.222.162.42192.168.2.11
                                                        Oct 2, 2024 17:20:45.660629034 CEST49756443192.168.2.11173.222.162.42
                                                        Oct 2, 2024 17:20:45.669210911 CEST49756443192.168.2.11173.222.162.42
                                                        Oct 2, 2024 17:20:45.669238091 CEST44349756173.222.162.42192.168.2.11
                                                        Oct 2, 2024 17:20:45.889887094 CEST49757443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:45.889955044 CEST44349757172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:45.890181065 CEST49757443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:45.890459061 CEST49757443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:45.890475988 CEST44349757172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:45.964894056 CEST49706443192.168.2.11173.222.162.42
                                                        Oct 2, 2024 17:20:46.568195105 CEST49706443192.168.2.11173.222.162.42
                                                        Oct 2, 2024 17:20:46.638756990 CEST44349706173.222.162.42192.168.2.11
                                                        Oct 2, 2024 17:20:46.638783932 CEST44349706173.222.162.42192.168.2.11
                                                        Oct 2, 2024 17:20:46.638866901 CEST44349706173.222.162.42192.168.2.11
                                                        Oct 2, 2024 17:20:46.638880014 CEST44349706173.222.162.42192.168.2.11
                                                        Oct 2, 2024 17:20:47.228163958 CEST44349756173.222.162.42192.168.2.11
                                                        Oct 2, 2024 17:20:47.228295088 CEST49756443192.168.2.11173.222.162.42
                                                        Oct 2, 2024 17:20:47.275208950 CEST44349757172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:47.275583982 CEST49757443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:47.275623083 CEST44349757172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:47.276376009 CEST44349757172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:47.277453899 CEST49757443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:47.277625084 CEST49757443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:47.277625084 CEST49757443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:47.277637005 CEST44349757172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:47.277682066 CEST44349757172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:47.328160048 CEST49757443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:47.626766920 CEST44349757172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:47.626893044 CEST44349757172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:20:47.627268076 CEST49757443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:47.630939960 CEST49757443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:20:47.630983114 CEST44349757172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:06.375571966 CEST44349756173.222.162.42192.168.2.11
                                                        Oct 2, 2024 17:21:06.375650883 CEST49756443192.168.2.11173.222.162.42
                                                        Oct 2, 2024 17:21:08.343225956 CEST49760443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:08.343270063 CEST44349760172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:08.343334913 CEST49760443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:08.343923092 CEST49760443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:08.343934059 CEST44349760172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:08.811018944 CEST49761443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:08.811120987 CEST44349761172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:08.811237097 CEST49761443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:08.811513901 CEST49761443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:08.811547041 CEST44349761172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:09.083880901 CEST44349760172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:09.084192991 CEST49760443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:09.084212065 CEST44349760172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:09.084568977 CEST44349760172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:09.084873915 CEST49760443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:09.084937096 CEST44349760172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:09.085028887 CEST49760443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:09.085042953 CEST49760443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:09.085052967 CEST44349760172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:09.107506990 CEST49762443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:09.107561111 CEST44349762172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:09.107640028 CEST49762443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:09.107938051 CEST49762443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:09.107954025 CEST44349762172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:09.383280039 CEST44349760172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:09.384053946 CEST44349760172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:09.384188890 CEST49760443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:09.440907001 CEST49760443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:09.440931082 CEST44349760172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:09.465761900 CEST44349761172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:09.502064943 CEST49761443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:09.502125025 CEST44349761172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:09.502737999 CEST44349761172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:09.508485079 CEST49761443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:09.508692026 CEST49761443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:09.508697987 CEST44349761172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:09.508709908 CEST49761443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:09.508829117 CEST44349761172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:09.558051109 CEST49761443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:09.771754026 CEST44349762172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:09.772156954 CEST49762443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:09.772188902 CEST44349762172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:09.773447990 CEST44349762172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:09.774420023 CEST49762443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:09.774651051 CEST44349762172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:09.774893999 CEST49762443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:09.774966955 CEST49762443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:09.774971962 CEST44349762172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:09.803013086 CEST44349761172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:09.803903103 CEST44349761172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:09.804003954 CEST49761443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:09.804091930 CEST49761443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:09.804111958 CEST44349761172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:10.076013088 CEST44349762172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:10.076549053 CEST44349762172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:10.076630116 CEST49762443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:10.076778889 CEST49762443192.168.2.11172.217.18.14
                                                        Oct 2, 2024 17:21:10.076802969 CEST44349762172.217.18.14192.168.2.11
                                                        Oct 2, 2024 17:21:20.718492985 CEST49763443192.168.2.1152.165.165.26
                                                        Oct 2, 2024 17:21:20.718543053 CEST4434976352.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:21:20.718643904 CEST49763443192.168.2.1152.165.165.26
                                                        Oct 2, 2024 17:21:20.719084024 CEST49763443192.168.2.1152.165.165.26
                                                        Oct 2, 2024 17:21:20.719094038 CEST4434976352.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:21:21.386272907 CEST4434976352.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:21:21.386415958 CEST49763443192.168.2.1152.165.165.26
                                                        Oct 2, 2024 17:21:21.388863087 CEST49763443192.168.2.1152.165.165.26
                                                        Oct 2, 2024 17:21:21.388883114 CEST4434976352.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:21:21.389167070 CEST4434976352.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:21:21.396934032 CEST49763443192.168.2.1152.165.165.26
                                                        Oct 2, 2024 17:21:21.439405918 CEST4434976352.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:21:21.645567894 CEST4434976352.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:21:21.645602942 CEST4434976352.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:21:21.645626068 CEST4434976352.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:21:21.645672083 CEST49763443192.168.2.1152.165.165.26
                                                        Oct 2, 2024 17:21:21.645699024 CEST4434976352.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:21:21.645745993 CEST49763443192.168.2.1152.165.165.26
                                                        Oct 2, 2024 17:21:21.645745993 CEST49763443192.168.2.1152.165.165.26
                                                        Oct 2, 2024 17:21:21.646223068 CEST4434976352.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:21:21.646255970 CEST4434976352.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:21:21.646297932 CEST49763443192.168.2.1152.165.165.26
                                                        Oct 2, 2024 17:21:21.646308899 CEST4434976352.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:21:21.646325111 CEST49763443192.168.2.1152.165.165.26
                                                        Oct 2, 2024 17:21:21.646948099 CEST4434976352.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:21:21.647027016 CEST49763443192.168.2.1152.165.165.26
                                                        Oct 2, 2024 17:21:21.648236990 CEST49763443192.168.2.1152.165.165.26
                                                        Oct 2, 2024 17:21:21.648236990 CEST49763443192.168.2.1152.165.165.26
                                                        Oct 2, 2024 17:21:21.648262024 CEST4434976352.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:21:21.648273945 CEST4434976352.165.165.26192.168.2.11
                                                        Oct 2, 2024 17:21:31.435018063 CEST49765443192.168.2.11142.250.184.228
                                                        Oct 2, 2024 17:21:31.435054064 CEST44349765142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:21:31.435148954 CEST49765443192.168.2.11142.250.184.228
                                                        Oct 2, 2024 17:21:31.435492992 CEST49765443192.168.2.11142.250.184.228
                                                        Oct 2, 2024 17:21:31.435499907 CEST44349765142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:21:32.063014984 CEST44349765142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:21:32.072019100 CEST49765443192.168.2.11142.250.184.228
                                                        Oct 2, 2024 17:21:32.072041988 CEST44349765142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:21:32.072594881 CEST44349765142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:21:32.076628923 CEST49765443192.168.2.11142.250.184.228
                                                        Oct 2, 2024 17:21:32.076761007 CEST44349765142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:21:32.121167898 CEST49765443192.168.2.11142.250.184.228
                                                        Oct 2, 2024 17:21:39.424020052 CEST49767443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:21:39.424067974 CEST44349767142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:21:39.424143076 CEST49767443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:21:39.424360037 CEST49767443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:21:39.424374104 CEST44349767142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:21:39.879570961 CEST49768443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:21:39.879688978 CEST44349768142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:21:39.879843950 CEST49768443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:21:39.880395889 CEST49768443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:21:39.880454063 CEST44349768142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:21:40.066179037 CEST44349767142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:21:40.066569090 CEST49767443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:21:40.066581964 CEST44349767142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:21:40.066952944 CEST44349767142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:21:40.067244053 CEST49767443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:21:40.067305088 CEST44349767142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:21:40.067426920 CEST49767443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:21:40.067426920 CEST49767443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:21:40.067456961 CEST44349767142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:21:40.287643909 CEST44349767142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:21:40.288208008 CEST44349767142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:21:40.288290977 CEST49767443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:21:40.288593054 CEST49767443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:21:40.288609028 CEST44349767142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:21:40.509319067 CEST44349768142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:21:40.509648085 CEST49768443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:21:40.509700060 CEST44349768142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:21:40.510072947 CEST44349768142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:21:40.510425091 CEST49768443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:21:40.510487080 CEST44349768142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:21:40.510605097 CEST49768443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:21:40.510632038 CEST49768443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:21:40.510643005 CEST44349768142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:21:40.811748028 CEST44349768142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:21:40.811881065 CEST44349768142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:21:40.811925888 CEST49768443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:21:40.812220097 CEST49768443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:21:40.812243938 CEST44349768142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:21:41.979520082 CEST44349765142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:21:41.979605913 CEST44349765142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:21:41.979676008 CEST49765443192.168.2.11142.250.184.228
                                                        Oct 2, 2024 17:21:55.310497999 CEST49765443192.168.2.11142.250.184.228
                                                        Oct 2, 2024 17:21:55.310534000 CEST44349765142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:22:10.327480078 CEST49770443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:22:10.327541113 CEST44349770142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:22:10.327636003 CEST49770443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:22:10.328041077 CEST49770443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:22:10.328057051 CEST44349770142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:22:10.358102083 CEST49771443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:22:10.358166933 CEST44349771142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:22:10.358266115 CEST49771443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:22:10.358570099 CEST49771443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:22:10.358581066 CEST44349771142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:22:10.994700909 CEST44349770142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:22:11.012036085 CEST49770443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:22:11.012053013 CEST44349770142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:22:11.012600899 CEST44349770142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:22:11.056480885 CEST49770443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:22:11.070980072 CEST49770443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:22:11.071151018 CEST49770443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:22:11.071157932 CEST44349770142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:22:11.071177959 CEST44349770142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:22:11.071208954 CEST49770443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:22:11.110599041 CEST44349771142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:22:11.115401983 CEST44349770142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:22:11.115461111 CEST49771443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:22:11.115494967 CEST44349771142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:22:11.115904093 CEST44349771142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:22:11.122869015 CEST49770443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:22:11.139900923 CEST49771443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:22:11.140000105 CEST44349771142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:22:11.140155077 CEST49771443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:22:11.140173912 CEST49771443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:22:11.140185118 CEST44349771142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:22:11.300761938 CEST44349770142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:22:11.301455021 CEST44349770142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:22:11.301572084 CEST49770443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:22:11.301692009 CEST49770443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:22:11.301712036 CEST44349770142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:22:11.417561054 CEST44349771142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:22:11.417726040 CEST44349771142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:22:11.418032885 CEST49771443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:22:11.418544054 CEST49771443192.168.2.11142.250.186.142
                                                        Oct 2, 2024 17:22:11.418592930 CEST44349771142.250.186.142192.168.2.11
                                                        Oct 2, 2024 17:22:31.497610092 CEST49772443192.168.2.11142.250.184.228
                                                        Oct 2, 2024 17:22:31.497711897 CEST44349772142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:22:31.498671055 CEST49772443192.168.2.11142.250.184.228
                                                        Oct 2, 2024 17:22:31.498924971 CEST49772443192.168.2.11142.250.184.228
                                                        Oct 2, 2024 17:22:31.498941898 CEST44349772142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:22:32.148166895 CEST44349772142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:22:32.148566008 CEST49772443192.168.2.11142.250.184.228
                                                        Oct 2, 2024 17:22:32.148587942 CEST44349772142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:22:32.148930073 CEST44349772142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:22:32.149224043 CEST49772443192.168.2.11142.250.184.228
                                                        Oct 2, 2024 17:22:32.149271965 CEST44349772142.250.184.228192.168.2.11
                                                        Oct 2, 2024 17:22:32.199245930 CEST49772443192.168.2.11142.250.184.228
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Oct 2, 2024 17:20:27.177752018 CEST53651111.1.1.1192.168.2.11
                                                        Oct 2, 2024 17:20:27.212032080 CEST5919753192.168.2.111.1.1.1
                                                        Oct 2, 2024 17:20:27.212202072 CEST5070753192.168.2.111.1.1.1
                                                        Oct 2, 2024 17:20:27.218903065 CEST53507071.1.1.1192.168.2.11
                                                        Oct 2, 2024 17:20:27.218935966 CEST53591971.1.1.1192.168.2.11
                                                        Oct 2, 2024 17:20:27.220187902 CEST53505991.1.1.1192.168.2.11
                                                        Oct 2, 2024 17:20:28.616945982 CEST4977353192.168.2.111.1.1.1
                                                        Oct 2, 2024 17:20:28.617306948 CEST5740753192.168.2.111.1.1.1
                                                        Oct 2, 2024 17:20:28.623822927 CEST53497731.1.1.1192.168.2.11
                                                        Oct 2, 2024 17:20:28.624233007 CEST53574071.1.1.1192.168.2.11
                                                        Oct 2, 2024 17:20:28.662432909 CEST53604721.1.1.1192.168.2.11
                                                        Oct 2, 2024 17:20:31.372217894 CEST6030953192.168.2.111.1.1.1
                                                        Oct 2, 2024 17:20:31.372217894 CEST4995753192.168.2.111.1.1.1
                                                        Oct 2, 2024 17:20:31.379075050 CEST53499571.1.1.1192.168.2.11
                                                        Oct 2, 2024 17:20:31.379371881 CEST53603091.1.1.1192.168.2.11
                                                        Oct 2, 2024 17:20:34.367332935 CEST53556201.1.1.1192.168.2.11
                                                        Oct 2, 2024 17:20:36.895178080 CEST6456553192.168.2.111.1.1.1
                                                        Oct 2, 2024 17:20:36.895482063 CEST6013253192.168.2.111.1.1.1
                                                        Oct 2, 2024 17:20:36.902194023 CEST53645651.1.1.1192.168.2.11
                                                        Oct 2, 2024 17:20:36.902683973 CEST53601321.1.1.1192.168.2.11
                                                        Oct 2, 2024 17:20:37.940190077 CEST6218753192.168.2.111.1.1.1
                                                        Oct 2, 2024 17:20:37.940907955 CEST6407453192.168.2.111.1.1.1
                                                        Oct 2, 2024 17:20:37.948251009 CEST53621871.1.1.1192.168.2.11
                                                        Oct 2, 2024 17:20:37.948704958 CEST53640741.1.1.1192.168.2.11
                                                        Oct 2, 2024 17:20:40.505017996 CEST53645181.1.1.1192.168.2.11
                                                        Oct 2, 2024 17:20:46.639990091 CEST53572791.1.1.1192.168.2.11
                                                        Oct 2, 2024 17:21:04.533474922 CEST53568541.1.1.1192.168.2.11
                                                        Oct 2, 2024 17:21:18.253442049 CEST138138192.168.2.11192.168.2.255
                                                        Oct 2, 2024 17:21:26.726059914 CEST53537821.1.1.1192.168.2.11
                                                        Oct 2, 2024 17:21:27.245752096 CEST53537751.1.1.1192.168.2.11
                                                        Oct 2, 2024 17:21:38.915036917 CEST53560221.1.1.1192.168.2.11
                                                        Oct 2, 2024 17:21:39.415782928 CEST6326953192.168.2.111.1.1.1
                                                        Oct 2, 2024 17:21:39.415942907 CEST5113253192.168.2.111.1.1.1
                                                        Oct 2, 2024 17:21:39.422930002 CEST53632691.1.1.1192.168.2.11
                                                        Oct 2, 2024 17:21:39.422946930 CEST53511321.1.1.1192.168.2.11
                                                        Oct 2, 2024 17:21:55.318278074 CEST53573871.1.1.1192.168.2.11
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Oct 2, 2024 17:20:27.212032080 CEST192.168.2.111.1.1.10xe7ffStandard query (0)youtube.comA (IP address)IN (0x0001)false
                                                        Oct 2, 2024 17:20:27.212202072 CEST192.168.2.111.1.1.10x9320Standard query (0)youtube.com65IN (0x0001)false
                                                        Oct 2, 2024 17:20:28.616945982 CEST192.168.2.111.1.1.10x6120Standard query (0)www.youtube.comA (IP address)IN (0x0001)false
                                                        Oct 2, 2024 17:20:28.617306948 CEST192.168.2.111.1.1.10xb866Standard query (0)www.youtube.com65IN (0x0001)false
                                                        Oct 2, 2024 17:20:31.372217894 CEST192.168.2.111.1.1.10x28fbStandard query (0)www.google.comA (IP address)IN (0x0001)false
                                                        Oct 2, 2024 17:20:31.372217894 CEST192.168.2.111.1.1.10x1e85Standard query (0)www.google.com65IN (0x0001)false
                                                        Oct 2, 2024 17:20:36.895178080 CEST192.168.2.111.1.1.10x7949Standard query (0)accounts.youtube.comA (IP address)IN (0x0001)false
                                                        Oct 2, 2024 17:20:36.895482063 CEST192.168.2.111.1.1.10x42ecStandard query (0)accounts.youtube.com65IN (0x0001)false
                                                        Oct 2, 2024 17:20:37.940190077 CEST192.168.2.111.1.1.10x2261Standard query (0)play.google.comA (IP address)IN (0x0001)false
                                                        Oct 2, 2024 17:20:37.940907955 CEST192.168.2.111.1.1.10xdfa2Standard query (0)play.google.com65IN (0x0001)false
                                                        Oct 2, 2024 17:21:39.415782928 CEST192.168.2.111.1.1.10x70fdStandard query (0)play.google.comA (IP address)IN (0x0001)false
                                                        Oct 2, 2024 17:21:39.415942907 CEST192.168.2.111.1.1.10x4fd5Standard query (0)play.google.com65IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Oct 2, 2024 17:20:27.218903065 CEST1.1.1.1192.168.2.110x9320No error (0)youtube.com65IN (0x0001)false
                                                        Oct 2, 2024 17:20:27.218935966 CEST1.1.1.1192.168.2.110xe7ffNo error (0)youtube.com172.217.16.206A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 17:20:28.623822927 CEST1.1.1.1192.168.2.110x6120No error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Oct 2, 2024 17:20:28.623822927 CEST1.1.1.1192.168.2.110x6120No error (0)youtube-ui.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 17:20:28.623822927 CEST1.1.1.1192.168.2.110x6120No error (0)youtube-ui.l.google.com216.58.212.174A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 17:20:28.623822927 CEST1.1.1.1192.168.2.110x6120No error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 17:20:28.623822927 CEST1.1.1.1192.168.2.110x6120No error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 17:20:28.623822927 CEST1.1.1.1192.168.2.110x6120No error (0)youtube-ui.l.google.com142.250.181.238A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 17:20:28.623822927 CEST1.1.1.1192.168.2.110x6120No error (0)youtube-ui.l.google.com142.250.185.110A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 17:20:28.623822927 CEST1.1.1.1192.168.2.110x6120No error (0)youtube-ui.l.google.com142.250.186.46A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 17:20:28.623822927 CEST1.1.1.1192.168.2.110x6120No error (0)youtube-ui.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 17:20:28.623822927 CEST1.1.1.1192.168.2.110x6120No error (0)youtube-ui.l.google.com142.250.185.238A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 17:20:28.623822927 CEST1.1.1.1192.168.2.110x6120No error (0)youtube-ui.l.google.com142.250.184.206A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 17:20:28.623822927 CEST1.1.1.1192.168.2.110x6120No error (0)youtube-ui.l.google.com216.58.212.142A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 17:20:28.623822927 CEST1.1.1.1192.168.2.110x6120No error (0)youtube-ui.l.google.com216.58.206.46A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 17:20:28.623822927 CEST1.1.1.1192.168.2.110x6120No error (0)youtube-ui.l.google.com172.217.16.142A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 17:20:28.623822927 CEST1.1.1.1192.168.2.110x6120No error (0)youtube-ui.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 17:20:28.623822927 CEST1.1.1.1192.168.2.110x6120No error (0)youtube-ui.l.google.com142.250.74.206A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 17:20:28.623822927 CEST1.1.1.1192.168.2.110x6120No error (0)youtube-ui.l.google.com142.250.185.78A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 17:20:28.624233007 CEST1.1.1.1192.168.2.110xb866No error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Oct 2, 2024 17:20:28.624233007 CEST1.1.1.1192.168.2.110xb866No error (0)youtube-ui.l.google.com65IN (0x0001)false
                                                        Oct 2, 2024 17:20:31.379075050 CEST1.1.1.1192.168.2.110x1e85No error (0)www.google.com65IN (0x0001)false
                                                        Oct 2, 2024 17:20:31.379371881 CEST1.1.1.1192.168.2.110x28fbNo error (0)www.google.com142.250.184.228A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 17:20:36.902194023 CEST1.1.1.1192.168.2.110x7949No error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Oct 2, 2024 17:20:36.902194023 CEST1.1.1.1192.168.2.110x7949No error (0)www3.l.google.com142.250.185.238A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 17:20:36.902683973 CEST1.1.1.1192.168.2.110x42ecNo error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Oct 2, 2024 17:20:37.948251009 CEST1.1.1.1192.168.2.110x2261No error (0)play.google.com172.217.18.14A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 17:21:39.422930002 CEST1.1.1.1192.168.2.110x70fdNo error (0)play.google.com142.250.186.142A (IP address)IN (0x0001)false
                                                        • www.youtube.com
                                                        • fs.microsoft.com
                                                        • https:
                                                          • accounts.youtube.com
                                                          • play.google.com
                                                          • www.google.com
                                                        • slscr.update.microsoft.com
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.1149713142.250.186.1744438036C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 15:20:29 UTC857OUTGET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1
                                                        Host: www.youtube.com
                                                        Connection: keep-alive
                                                        Upgrade-Insecure-Requests: 1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        X-Client-Data: CKS1yQEIl7bJAQijtskBCKmdygEIr4fLAQiUocsBCIWgzQEIjafNAQjcvc0BCLnKzQEIq9HNAQiK080BCJ3WzQEIp9jNAQj5wNQVGOuNpRc=
                                                        Sec-Fetch-Site: none
                                                        Sec-Fetch-Mode: navigate
                                                        Sec-Fetch-User: ?1
                                                        Sec-Fetch-Dest: document
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-02 15:20:29 UTC2634INHTTP/1.1 303 See Other
                                                        Content-Type: application/binary
                                                        X-Content-Type-Options: nosniff
                                                        Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                        Pragma: no-cache
                                                        Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                        Date: Wed, 02 Oct 2024 15:20:29 GMT
                                                        Location: https://accounts.google.com/ServiceLogin?service=youtube&uilel=3&passive=true&continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%253F%253Dhttps%25253A%25252F%25252Faccounts.google.com%25252Fv3%25252Fsignin%25252Fchallenge%25252Fpwd%26feature%3Dredirect_login&hl=en
                                                        X-Frame-Options: SAMEORIGIN
                                                        Strict-Transport-Security: max-age=31536000
                                                        Origin-Trial: AmhMBR6zCLzDDxpW+HfpP67BqwIknWnyMOXOQGfzYswFmJe+fgaI6XZgAzcxOrzNtP7hEDsOo1jdjFnVr2IdxQ4AAAB4eyJvcmlnaW4iOiJodHRwczovL3lvdXR1YmUuY29tOjQ0MyIsImZlYXR1cmUiOiJXZWJWaWV3WFJlcXVlc3RlZFdpdGhEZXByZWNhdGlvbiIsImV4cGlyeSI6MTc1ODA2NzE5OSwiaXNTdWJkb21haW4iOnRydWV9
                                                        Content-Security-Policy: require-trusted-types-for 'script'
                                                        Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                        Report-To: {"group":"youtube_main","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/youtube_main"}]}
                                                        Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="youtube_main"
                                                        Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        Vary: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        P3P: CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657?hl=en for more info."
                                                        Server: ESF
                                                        Content-Length: 0
                                                        X-XSS-Protection: 0
                                                        Set-Cookie: GPS=1; Domain=.youtube.com; Expires=Wed, 02-Oct-2024 15:50:29 GMT; Path=/; Secure; HttpOnly
                                                        Set-Cookie: YSC=IwlGpoh9HyA; Domain=.youtube.com; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                                        Set-Cookie: VISITOR_INFO1_LIVE=Lcd1fKSTc1I; Domain=.youtube.com; Expires=Mon, 31-Mar-2025 15:20:29 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                                        Set-Cookie: VISITOR_PRIVACY_METADATA=CgJVUxIEGgAgPw%3D%3D; Domain=.youtube.com; Expires=Mon, 31-Mar-2025 15:20:29 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.1149720184.28.90.27443
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 15:20:33 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        Accept-Encoding: identity
                                                        User-Agent: Microsoft BITS/7.8
                                                        Host: fs.microsoft.com
                                                        2024-10-02 15:20:33 UTC466INHTTP/1.1 200 OK
                                                        Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                                        Content-Type: application/octet-stream
                                                        ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                                        Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                                        Server: ECAcc (lpl/EF06)
                                                        X-CID: 11
                                                        X-Ms-ApiVersion: Distribute 1.2
                                                        X-Ms-Region: prod-neu-z1
                                                        Cache-Control: public, max-age=91517
                                                        Date: Wed, 02 Oct 2024 15:20:33 GMT
                                                        Connection: close
                                                        X-CID: 2


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.1149722184.28.90.27443
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 15:20:34 UTC239OUTGET /fs/windows/config.json HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        Accept-Encoding: identity
                                                        If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
                                                        Range: bytes=0-2147483646
                                                        User-Agent: Microsoft BITS/7.8
                                                        Host: fs.microsoft.com
                                                        2024-10-02 15:20:34 UTC514INHTTP/1.1 200 OK
                                                        ApiVersion: Distribute 1.1
                                                        Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                                        Content-Type: application/octet-stream
                                                        ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                                        Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                                        Server: ECAcc (lpl/EF06)
                                                        X-CID: 11
                                                        X-Ms-ApiVersion: Distribute 1.2
                                                        X-Ms-Region: prod-weu-z1
                                                        Cache-Control: public, max-age=91460
                                                        Date: Wed, 02 Oct 2024 15:20:34 GMT
                                                        Content-Length: 55
                                                        Connection: close
                                                        X-CID: 2
                                                        2024-10-02 15:20:34 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
                                                        Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        3192.168.2.1149734142.250.185.2384438036C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 15:20:37 UTC1223OUTGET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=112516778&timestamp=1727882435991 HTTP/1.1
                                                        Host: accounts.youtube.com
                                                        Connection: keep-alive
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        sec-ch-ua-full-version: "117.0.5938.149"
                                                        sec-ch-ua-arch: "x86"
                                                        sec-ch-ua-platform: "Windows"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.149", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.149"
                                                        Upgrade-Insecure-Requests: 1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        X-Client-Data: CKS1yQEIl7bJAQijtskBCKmdygEIr4fLAQiUocsBCIWgzQEIjafNAQjcvc0BCLnKzQEIq9HNAQiK080BCJ3WzQEIp9jNAQj5wNQVGOuNpRc=
                                                        Sec-Fetch-Site: cross-site
                                                        Sec-Fetch-Mode: navigate
                                                        Sec-Fetch-User: ?1
                                                        Sec-Fetch-Dest: iframe
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-02 15:20:37 UTC1969INHTTP/1.1 200 OK
                                                        Content-Type: text/html; charset=utf-8
                                                        X-Frame-Options: ALLOW-FROM https://accounts.google.com
                                                        Content-Security-Policy: frame-ancestors https://accounts.google.com
                                                        Content-Security-Policy: script-src 'report-sample' 'nonce-sihAndZE-FDPEOPMa8fOeA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport;worker-src 'self'
                                                        Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport/allowlist
                                                        Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport
                                                        Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                        Pragma: no-cache
                                                        Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                        Date: Wed, 02 Oct 2024 15:20:37 GMT
                                                        Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Cross-Origin-Opener-Policy: same-origin
                                                        Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        reporting-endpoints: default="/_/AccountsDomainCookiesCheckConnectionHttp/web-reports?context=eJzjstDikmJw0JBikPj6kkkDiJ3SZ7AGAXHSv_OsRUB8ufsS63UgVu25xGoKxEUSV1ibgFiIh-Poya_b2QRWtC7sZ1bSS8ovjM9MSc0rySypTMnPTczMS87Pz85MLS5OLSpLLYo3MjAyMbA0MtIzsIgvMAAA0e4tQQ"
                                                        Server: ESF
                                                        X-XSS-Protection: 0
                                                        X-Content-Type-Options: nosniff
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 15:20:37 UTC1969INData Raw: 37 36 32 30 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 20 6e 6f 6e 63 65 3d 22 73 69 68 41 6e 64 5a 45 2d 46 44 50 45 4f 50 4d 61 38 66 4f 65 41 22 3e 22 75 73 65 20 73 74 72 69 63 74 22 3b 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 3d 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 7c 7c 7b 7d 3b 28 66 75 6e 63 74 69 6f 6e 28 5f 29 7b 76 61 72 20 77 69 6e 64 6f 77 3d 74 68 69 73 3b 0a 74 72 79 7b 0a 5f 2e 5f 46 5f 74 6f 67 67 6c 65 73 5f 69 6e 69 74 69 61 6c 69 7a 65 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 28 74 79 70 65 6f
                                                        Data Ascii: 7620<html><head><script nonce="sihAndZE-FDPEOPMa8fOeA">"use strict";this.default_AccountsDomaincookiesCheckconnectionJs=this.default_AccountsDomaincookiesCheckconnectionJs||{};(function(_){var window=this;try{_._F_toggles_initialize=function(a){(typeo
                                                        2024-10-02 15:20:37 UTC1969INData Raw: 54 72 69 64 65 6e 74 5c 2f 28 5c 64 2e 5c 64 29 2f 2e 65 78 65 63 28 62 29 2c 0a 63 5b 31 5d 3d 3d 22 37 2e 30 22 29 69 66 28 62 26 26 62 5b 31 5d 29 73 77 69 74 63 68 28 62 5b 31 5d 29 7b 63 61 73 65 20 22 34 2e 30 22 3a 61 3d 22 38 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 35 2e 30 22 3a 61 3d 22 39 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 36 2e 30 22 3a 61 3d 22 31 30 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 37 2e 30 22 3a 61 3d 22 31 31 2e 30 22 7d 65 6c 73 65 20 61 3d 22 37 2e 30 22 3b 65 6c 73 65 20 61 3d 63 5b 31 5d 3b 62 3d 61 7d 65 6c 73 65 20 62 3d 22 22 3b 72 65 74 75 72 6e 20 62 7d 76 61 72 20 64 3d 52 65 67 45 78 70 28 22 28 5b 41 2d 5a 5d 5b 5c 5c 77 20 5d 2b 29 2f 28 5b 5e 5c 5c 73 5d 2b 29 5c 5c 73 2a 28 3f 3a 5c 5c 28
                                                        Data Ascii: Trident\/(\d.\d)/.exec(b),c[1]=="7.0")if(b&&b[1])switch(b[1]){case "4.0":a="8.0";break;case "5.0":a="9.0";break;case "6.0":a="10.0";break;case "7.0":a="11.0"}else a="7.0";else a=c[1];b=a}else b="";return b}var d=RegExp("([A-Z][\\w ]+)/([^\\s]+)\\s*(?:\\(
                                                        2024-10-02 15:20:37 UTC1969INData Raw: 74 63 68 28 74 79 70 65 6f 66 20 61 29 7b 63 61 73 65 20 22 6e 75 6d 62 65 72 22 3a 72 65 74 75 72 6e 20 69 73 46 69 6e 69 74 65 28 61 29 3f 61 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 69 67 69 6e 74 22 3a 72 65 74 75 72 6e 28 41 61 3f 0a 61 3e 3d 42 61 26 26 61 3c 3d 43 61 3a 61 5b 30 5d 3d 3d 3d 22 2d 22 3f 75 61 28 61 2c 44 61 29 3a 75 61 28 61 2c 45 61 29 29 3f 4e 75 6d 62 65 72 28 61 29 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 72 65 74 75 72 6e 20 61 3f 31 3a 30 3b 63 61 73 65 20 22 6f 62 6a 65 63 74 22 3a 69 66 28 61 29 69 66 28 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 61 29 29 7b 69 66 28 43 28 61 29 29 72 65 74 75 72 6e 7d 65 6c 73 65 20 69 66 28 46 61 26 26 61 21 3d 6e 75 6c 6c 26 26 61 20 69 6e
                                                        Data Ascii: tch(typeof a){case "number":return isFinite(a)?a:String(a);case "bigint":return(Aa?a>=Ba&&a<=Ca:a[0]==="-"?ua(a,Da):ua(a,Ea))?Number(a):String(a);case "boolean":return a?1:0;case "object":if(a)if(Array.isArray(a)){if(C(a))return}else if(Fa&&a!=null&&a in
                                                        2024-10-02 15:20:37 UTC1969INData Raw: 7b 76 61 72 20 62 3b 69 66 28 61 26 26 28 62 3d 51 61 29 21 3d 6e 75 6c 6c 26 26 62 2e 68 61 73 28 61 29 26 26 28 62 3d 61 2e 43 29 29 66 6f 72 28 76 61 72 20 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 62 5b 63 5d 3b 69 66 28 63 3d 3d 3d 62 2e 6c 65 6e 67 74 68 2d 31 26 26 41 28 64 29 29 66 6f 72 28 76 61 72 20 65 20 69 6e 20 64 29 7b 76 61 72 20 66 3d 64 5b 65 5d 3b 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 66 29 26 26 0a 52 61 28 66 2c 61 29 7d 65 6c 73 65 20 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 64 29 26 26 52 61 28 64 2c 61 29 7d 61 3d 45 3f 61 2e 43 3a 4d 61 28 61 2e 43 2c 50 61 2c 76 6f 69 64 20 30 2c 76 6f 69 64 20 30 2c 21 31 29 3b 65 3d 21 45 3b 69 66 28 62 3d 61 2e 6c 65 6e 67 74 68 29 7b 64 3d 61 5b 62 2d
                                                        Data Ascii: {var b;if(a&&(b=Qa)!=null&&b.has(a)&&(b=a.C))for(var c=0;c<b.length;c++){var d=b[c];if(c===b.length-1&&A(d))for(var e in d){var f=d[e];Array.isArray(f)&&Ra(f,a)}else Array.isArray(d)&&Ra(d,a)}a=E?a.C:Ma(a.C,Pa,void 0,void 0,!1);e=!E;if(b=a.length){d=a[b-
                                                        2024-10-02 15:20:37 UTC1969INData Raw: 6f 6c 2e 69 74 65 72 61 74 6f 72 22 2c 66 75 6e 63 74 69 6f 6e 28 61 29 7b 69 66 28 61 29 72 65 74 75 72 6e 20 61 3b 61 3d 53 79 6d 62 6f 6c 28 22 63 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 22 41 72 72 61 79 20 49 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 43 6c 61 6d 70 65 64 41 72 72 61 79 20 49 6e 74 31 36 41 72 72 61 79 20 55 69 6e 74 31 36 41 72 72 61 79 20 49 6e 74 33 32 41 72 72 61 79 20 55 69 6e 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 36 34 41 72 72 61 79 22 2e 73 70 6c 69 74 28 22 20 22 29 2c 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 57 61 5b 62 5b 63 5d 5d 3b 74 79 70 65 6f 66 20 64 3d 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 26 26 74 79 70 65
                                                        Data Ascii: ol.iterator",function(a){if(a)return a;a=Symbol("c");for(var b="Array Int8Array Uint8Array Uint8ClampedArray Int16Array Uint16Array Int32Array Uint32Array Float32Array Float64Array".split(" "),c=0;c<b.length;c++){var d=Wa[b[c]];typeof d==="function"&&type
                                                        2024-10-02 15:20:37 UTC1969INData Raw: 29 3b 65 28 22 66 72 65 65 7a 65 22 29 3b 65 28 22 70 72 65 76 65 6e 74 45 78 74 65 6e 73 69 6f 6e 73 22 29 3b 65 28 22 73 65 61 6c 22 29 3b 76 61 72 20 68 3d 30 2c 67 3d 66 75 6e 63 74 69 6f 6e 28 6b 29 7b 74 68 69 73 2e 67 3d 28 68 2b 3d 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2b 31 29 2e 74 6f 53 74 72 69 6e 67 28 29 3b 69 66 28 6b 29 7b 6b 3d 48 28 6b 29 3b 66 6f 72 28 76 61 72 20 6c 3b 21 28 6c 3d 6b 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6c 3d 6c 2e 76 61 6c 75 65 2c 74 68 69 73 2e 73 65 74 28 6c 5b 30 5d 2c 6c 5b 31 5d 29 7d 7d 3b 67 2e 70 72 6f 74 6f 74 79 70 65 2e 73 65 74 3d 66 75 6e 63 74 69 6f 6e 28 6b 2c 6c 29 7b 69 66 28 21 63 28 6b 29 29 74 68 72 6f 77 20 45 72 72 6f 72 28 22 69 22 29 3b 64 28 6b 29 3b 69 66 28 21 49 28 6b 2c 66 29 29
                                                        Data Ascii: );e("freeze");e("preventExtensions");e("seal");var h=0,g=function(k){this.g=(h+=Math.random()+1).toString();if(k){k=H(k);for(var l;!(l=k.next()).done;)l=l.value,this.set(l[0],l[1])}};g.prototype.set=function(k,l){if(!c(k))throw Error("i");d(k);if(!I(k,f))
                                                        2024-10-02 15:20:37 UTC1969INData Raw: 75 72 6e 20 67 2e 76 61 6c 75 65 7d 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 2e 66 6f 72 45 61 63 68 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 66 6f 72 28 76 61 72 20 6c 3d 74 68 69 73 2e 65 6e 74 72 69 65 73 28 29 2c 6d 3b 21 28 6d 3d 6c 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6d 3d 0a 6d 2e 76 61 6c 75 65 2c 67 2e 63 61 6c 6c 28 6b 2c 6d 5b 31 5d 2c 6d 5b 30 5d 2c 74 68 69 73 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 5b 53 79 6d 62 6f 6c 2e 69 74 65 72 61 74 6f 72 5d 3d 63 2e 70 72 6f 74 6f 74 79 70 65 2e 65 6e 74 72 69 65 73 3b 76 61 72 20 64 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 76 61 72 20 6c 3d 6b 26 26 74 79 70 65 6f 66 20 6b 3b 6c 3d 3d 22 6f 62 6a 65 63 74 22 7c 7c 6c 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 3f 62 2e 68 61 73 28 6b 29
                                                        Data Ascii: urn g.value})};c.prototype.forEach=function(g,k){for(var l=this.entries(),m;!(m=l.next()).done;)m=m.value,g.call(k,m[1],m[0],this)};c.prototype[Symbol.iterator]=c.prototype.entries;var d=function(g,k){var l=k&&typeof k;l=="object"||l=="function"?b.has(k)
                                                        2024-10-02 15:20:37 UTC1969INData Raw: 6f 6e 28 61 29 7b 72 65 74 75 72 6e 20 61 3f 61 3a 66 75 6e 63 74 69 6f 6e 28 62 29 7b 72 65 74 75 72 6e 20 74 79 70 65 6f 66 20 62 3d 3d 3d 22 6e 75 6d 62 65 72 22 26 26 69 73 4e 61 4e 28 62 29 7d 7d 29 3b 76 61 72 20 66 62 3d 66 62 7c 7c 7b 7d 2c 71 3d 74 68 69 73 7c 7c 73 65 6c 66 2c 67 62 3d 71 2e 5f 46 5f 74 6f 67 67 6c 65 73 7c 7c 5b 5d 2c 68 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 61 3d 61 2e 73 70 6c 69 74 28 22 2e 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 71 2c 63 3d 30 3b 63 3c 61 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 69 66 28 62 3d 62 5b 61 5b 63 5d 5d 2c 62 3d 3d 6e 75 6c 6c 29 72 65 74 75 72 6e 20 6e 75 6c 6c 3b 72 65 74 75 72 6e 20 62 7d 2c 69 62 3d 22 63 6c 6f 73 75 72 65 5f 75 69 64 5f 22 2b 28 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2a 31 45
                                                        Data Ascii: on(a){return a?a:function(b){return typeof b==="number"&&isNaN(b)}});var fb=fb||{},q=this||self,gb=q._F_toggles||[],hb=function(a){a=a.split(".");for(var b=q,c=0;c<a.length;c++)if(b=b[a[c]],b==null)return null;return b},ib="closure_uid_"+(Math.random()*1E
                                                        2024-10-02 15:20:38 UTC1969INData Raw: 74 65 78 74 5f 5f 39 38 34 33 38 32 3d 7b 7d 29 3b 61 2e 5f 5f 63 6c 6f 73 75 72 65 5f 5f 65 72 72 6f 72 5f 5f 63 6f 6e 74 65 78 74 5f 5f 39 38 34 33 38 32 2e 73 65 76 65 72 69 74 79 3d 62 7d 3b 76 61 72 20 71 62 3d 66 75 6e 63 74 69 6f 6e 28 61 2c 62 2c 63 29 7b 63 3d 63 7c 7c 71 3b 76 61 72 20 64 3d 63 2e 6f 6e 65 72 72 6f 72 2c 65 3d 21 21 62 3b 63 2e 6f 6e 65 72 72 6f 72 3d 66 75 6e 63 74 69 6f 6e 28 66 2c 68 2c 67 2c 6b 2c 6c 29 7b 64 26 26 64 28 66 2c 68 2c 67 2c 6b 2c 6c 29 3b 61 28 7b 6d 65 73 73 61 67 65 3a 66 2c 66 69 6c 65 4e 61 6d 65 3a 68 2c 6c 69 6e 65 3a 67 2c 6c 69 6e 65 4e 75 6d 62 65 72 3a 67 2c 63 61 3a 6b 2c 65 72 72 6f 72 3a 6c 7d 29 3b 72 65 74 75 72 6e 20 65 7d 7d 2c 74 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 76 61 72 20 62 3d 68
                                                        Data Ascii: text__984382={});a.__closure__error__context__984382.severity=b};var qb=function(a,b,c){c=c||q;var d=c.onerror,e=!!b;c.onerror=function(f,h,g,k,l){d&&d(f,h,g,k,l);a({message:f,fileName:h,line:g,lineNumber:g,ca:k,error:l});return e}},tb=function(a){var b=h
                                                        2024-10-02 15:20:38 UTC1969INData Raw: 22 6e 75 6d 62 65 72 22 3a 66 3d 53 74 72 69 6e 67 28 66 29 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 66 3d 66 3f 22 74 72 75 65 22 3a 22 66 61 6c 73 65 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 66 75 6e 63 74 69 6f 6e 22 3a 66 3d 28 66 3d 73 62 28 66 29 29 3f 66 3a 22 5b 66 6e 5d 22 3b 62 72 65 61 6b 3b 64 65 66 61 75 6c 74 3a 66 3d 0a 74 79 70 65 6f 66 20 66 7d 66 2e 6c 65 6e 67 74 68 3e 34 30 26 26 28 66 3d 66 2e 73 6c 69 63 65 28 30 2c 34 30 29 2b 22 2e 2e 2e 22 29 3b 63 2e 70 75 73 68 28 66 29 7d 62 2e 70 75 73 68 28 61 29 3b 63 2e 70 75 73 68 28 22 29 5c 6e 22 29 3b 74 72 79 7b 63 2e 70 75 73 68 28 77 62 28 61 2e 63 61 6c 6c 65 72 2c 62 29 29 7d 63 61 74 63 68 28 68 29 7b 63 2e 70 75 73 68 28 22 5b 65 78 63 65 70 74 69 6f 6e
                                                        Data Ascii: "number":f=String(f);break;case "boolean":f=f?"true":"false";break;case "function":f=(f=sb(f))?f:"[fn]";break;default:f=typeof f}f.length>40&&(f=f.slice(0,40)+"...");c.push(f)}b.push(a);c.push(")\n");try{c.push(wb(a.caller,b))}catch(h){c.push("[exception


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        4192.168.2.1149737172.217.18.144438036C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 15:20:38 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Accept: */*
                                                        Access-Control-Request-Method: POST
                                                        Access-Control-Request-Headers: x-goog-authuser
                                                        Origin: https://accounts.google.com
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-02 15:20:38 UTC520INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                        Access-Control-Max-Age: 86400
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 15:20:38 GMT
                                                        Server: Playlog
                                                        Content-Length: 0
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        5192.168.2.1149738172.217.18.144438036C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 15:20:38 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Accept: */*
                                                        Access-Control-Request-Method: POST
                                                        Access-Control-Request-Headers: x-goog-authuser
                                                        Origin: https://accounts.google.com
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-02 15:20:39 UTC520INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                        Access-Control-Max-Age: 86400
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 15:20:38 GMT
                                                        Server: Playlog
                                                        Content-Length: 0
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        6192.168.2.1149742172.217.18.144438036C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 15:20:39 UTC1112OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 507
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.149"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.149", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.149"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKS1yQEIl7bJAQijtskBCKmdygEIr4fLAQiUocsBCIWgzQEIjafNAQjcvc0BCLnKzQEIq9HNAQiK080BCJ3WzQEIp9jNAQj5wNQVGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-02 15:20:39 UTC507OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 34 39 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 32 34 33 37 30 33 37 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.149"],[1,0,0,0,0]]],1828,[["1727882437037",null,null,null
                                                        2024-10-02 15:20:39 UTC932INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Set-Cookie: NID=518=FK3H57ITrRnKbzRvXgPEirqy-frCYLRHTRKDYAM3UK7xpJ8n1MxDWfnwQUMbhOJBWtMsKanox_b4CHICMnFWj2MDNXsuLp2tMLtnxmW2nASMmTgJyHsbeM9l2FQEXQ0FvBcOI-NCdZUK7fzvdrn81raVtoVmnKJV-5xPvMz0VTg3BWSuLg; expires=Thu, 03-Apr-2025 15:20:39 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                        P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 15:20:39 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Expires: Wed, 02 Oct 2024 15:20:39 GMT
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 15:20:39 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 15:20:39 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        7192.168.2.1149743172.217.18.144438036C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 15:20:39 UTC1112OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 505
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.149"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.149", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.149"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKS1yQEIl7bJAQijtskBCKmdygEIr4fLAQiUocsBCIWgzQEIjafNAQjcvc0BCLnKzQEIq9HNAQiK080BCJ3WzQEIp9jNAQj5wNQVGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-02 15:20:39 UTC505OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 34 39 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 32 34 33 37 31 34 32 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.149"],[1,0,0,0,0]]],1828,[["1727882437142",null,null,null
                                                        2024-10-02 15:20:40 UTC932INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Set-Cookie: NID=518=ES0V51TCeOuBZnthVByCa7tigvvgzCTToUm9CEV7iviTuEBBJ-ksuxGj7jaxJHVhkba6IXjxd1Z7BNkFA4c8tEuv7ElAumBKnDyRrQ4E75rIXZScYhutGOBkpnff2rQMBxOLm8wcm7hqzCQrLh_KtsEJI_PEIvTBpKdx99IoG9mA6P5x8Q; expires=Thu, 03-Apr-2025 15:20:39 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                        P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 15:20:39 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Expires: Wed, 02 Oct 2024 15:20:39 GMT
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 15:20:40 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 15:20:40 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        8192.168.2.1149718142.250.184.2284438036C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 15:20:40 UTC1201OUTGET /favicon.ico HTTP/1.1
                                                        Host: www.google.com
                                                        Connection: keep-alive
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        sec-ch-ua-full-version: "117.0.5938.149"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.149", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.149"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
                                                        X-Client-Data: CKS1yQEIl7bJAQijtskBCKmdygEIr4fLAQiUocsBCIWgzQEIjafNAQjcvc0BCLnKzQEIq9HNAQiK080BCJ3WzQEIp9jNAQj5wNQVGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: no-cors
                                                        Sec-Fetch-Dest: image
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=ES0V51TCeOuBZnthVByCa7tigvvgzCTToUm9CEV7iviTuEBBJ-ksuxGj7jaxJHVhkba6IXjxd1Z7BNkFA4c8tEuv7ElAumBKnDyRrQ4E75rIXZScYhutGOBkpnff2rQMBxOLm8wcm7hqzCQrLh_KtsEJI_PEIvTBpKdx99IoG9mA6P5x8Q
                                                        2024-10-02 15:20:40 UTC704INHTTP/1.1 200 OK
                                                        Accept-Ranges: bytes
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Cross-Origin-Opener-Policy-Report-Only: same-origin; report-to="static-on-bigtable"
                                                        Report-To: {"group":"static-on-bigtable","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/static-on-bigtable"}]}
                                                        Content-Length: 5430
                                                        X-Content-Type-Options: nosniff
                                                        Server: sffe
                                                        X-XSS-Protection: 0
                                                        Date: Wed, 02 Oct 2024 15:13:12 GMT
                                                        Expires: Thu, 10 Oct 2024 15:13:12 GMT
                                                        Cache-Control: public, max-age=691200
                                                        Last-Modified: Tue, 22 Oct 2019 18:30:00 GMT
                                                        Content-Type: image/x-icon
                                                        Vary: Accept-Encoding
                                                        Age: 448
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close
                                                        2024-10-02 15:20:40 UTC686INData Raw: 00 00 01 00 02 00 10 10 00 00 01 00 20 00 68 04 00 00 26 00 00 00 20 20 00 00 01 00 20 00 a8 10 00 00 8e 04 00 00 28 00 00 00 10 00 00 00 20 00 00 00 01 00 20 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 30 fd fd fd 96 fd fd fd d8 fd fd fd f9 fd fd fd f9 fd fd fd d7 fd fd fd 94 fe fe fe 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd 99 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 95 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd c1 ff ff ff ff fa fd f9 ff b4 d9 a7 ff 76 ba 5d ff 58 ab 3a ff 58 aa 3a ff 72 b8 59 ff ac d5 9d ff f8 fb f6 ff ff
                                                        Data Ascii: h& ( 0.v]X:X:rY
                                                        2024-10-02 15:20:40 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d8 fd fd fd 99 ff ff ff ff 92 cf fb ff 37 52 ec ff 38 46 ea ff d0 d4 fa ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 96 fe fe fe 32 ff ff ff ff f9 f9 fe ff 56 62 ed ff 35 43 ea ff 3b 49 eb ff 95 9c f4 ff cf d2 fa ff d1 d4 fa ff 96 9d f4 ff 52 5e ed ff e1 e3 fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 30 00 00 00 00 fd fd fd 9d ff ff ff ff e8 ea fd ff 58 63 ee ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 6c 76 f0 ff ff ff ff ff ff ff ff ff fd fd fd 98 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd c3 ff ff ff ff f9 f9 fe ff a5 ac f6 ff 5d 69 ee ff 3c 4a eb
                                                        Data Ascii: 7R8F2Vb5C;IR^0Xc5C5C5C5C5C5Clv]i<J
                                                        2024-10-02 15:20:40 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff fd fd fd d0 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fd fd fd 8b ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff b1 d8 a3 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 60 a5 35 ff ca 8e 3e ff f9 c1 9f ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 87 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 25 fd fd fd fb ff ff ff ff ff ff ff ff ff ff ff ff c2 e0 b7 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 6e b6 54 ff 9f ce 8d ff b7 da aa ff b8 db ab ff a5 d2 95 ff 7b bc 64 ff 54 a8 35 ff 53 a8 34 ff 77 a0 37 ff e3 89 41 ff f4 85 42 ff f4 85 42 ff fc
                                                        Data Ascii: S4S4S4S4S4S4S4S4S4S4S4S4S4S4`5>%S4S4S4S4S4S4nT{dT5S4w7ABB
                                                        2024-10-02 15:20:40 UTC1390INData Raw: f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff fb d5 bf ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd ea fd fd fd cb ff ff ff ff ff ff ff ff ff ff ff ff 46 cd fc ff 05 bc fb ff 05 bc fb ff 05 bc fb ff 21 ae f9 ff fb fb ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd c8 fd fd fd 9c ff ff ff ff ff ff ff ff ff ff ff ff 86 df fd ff 05 bc fb ff 05 bc fb ff 15 93 f5 ff 34 49 eb ff b3 b8 f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                        Data Ascii: BBBBBBF!4I
                                                        2024-10-02 15:20:40 UTC574INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d2 fe fe fe 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd 8d fd fd fd fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd fb fd fd fd 8b fe fe fe 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 27 fd fd fd 9f fd fd fd f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                        Data Ascii: $'


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        9192.168.2.114974752.165.165.26443
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 15:20:42 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=Vrm43n+o83ppcUg&MD=Hv5aGE1t HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                                        Host: slscr.update.microsoft.com
                                                        2024-10-02 15:20:43 UTC560INHTTP/1.1 200 OK
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Content-Type: application/octet-stream
                                                        Expires: -1
                                                        Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                                        ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                                                        MS-CorrelationId: cf53e731-006e-4e87-a708-77792cbafa21
                                                        MS-RequestId: 6988428f-2f13-4eac-b272-4eeb51df2ba2
                                                        MS-CV: q6kCoLbth0SukDcy.0
                                                        X-Microsoft-SLSClientCache: 2880
                                                        Content-Disposition: attachment; filename=environment.cab
                                                        X-Content-Type-Options: nosniff
                                                        Date: Wed, 02 Oct 2024 15:20:42 GMT
                                                        Connection: close
                                                        Content-Length: 24490
                                                        2024-10-02 15:20:43 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                                                        Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                                                        2024-10-02 15:20:43 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                                                        Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        10192.168.2.1149757172.217.18.144438036C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 15:20:47 UTC1286OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1221
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: text/plain;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.149"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.149", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.149"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKS1yQEIl7bJAQijtskBCKmdygEIr4fLAQiUocsBCIWgzQEIjafNAQjcvc0BCLnKzQEIq9HNAQiK080BCJ3WzQEIp9jNAQj5wNQVGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=ES0V51TCeOuBZnthVByCa7tigvvgzCTToUm9CEV7iviTuEBBJ-ksuxGj7jaxJHVhkba6IXjxd1Z7BNkFA4c8tEuv7ElAumBKnDyRrQ4E75rIXZScYhutGOBkpnff2rQMBxOLm8wcm7hqzCQrLh_KtsEJI_PEIvTBpKdx99IoG9mA6P5x8Q
                                                        2024-10-02 15:20:47 UTC1221OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 34 39 22 5d 2c 5b 34 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 35 35 38 2c 5b 5b 22 31 37 32 37 38 38 32 34 33 34 30 30 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,null,null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.149"],[4,0,0,0,0]]],558,[["1727882434000",null,null,null,
                                                        2024-10-02 15:20:47 UTC940INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Set-Cookie: NID=518=NR_HcU_Qk2gKrQMRECyq6Z5ZtkzGFHkqno6Wbd-8sFp-GDiP0Q8OIc-lL5zaZks_Yz2UHTPISrxQprP54ZO1lTsayVRkjTT1ipNdjyFCzemPDQSWi8HKdqVeHmJ-1E2JlD8tBJC4vpa_urDH7LQchapVQrdQ2XyyObyn9Kdu1ouUXKwfIJ10z98ZpA; expires=Thu, 03-Apr-2025 15:20:47 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                        P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 15:20:47 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Expires: Wed, 02 Oct 2024 15:20:47 GMT
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 15:20:47 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 15:20:47 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        11192.168.2.1149760172.217.18.144438036C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 15:21:09 UTC1317OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1260
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.149"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.149", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.149"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKS1yQEIl7bJAQijtskBCKmdygEIr4fLAQiUocsBCIWgzQEIjafNAQjcvc0BCLnKzQEIq9HNAQiK080BCJ3WzQEIp9jNAQj5wNQVGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=NR_HcU_Qk2gKrQMRECyq6Z5ZtkzGFHkqno6Wbd-8sFp-GDiP0Q8OIc-lL5zaZks_Yz2UHTPISrxQprP54ZO1lTsayVRkjTT1ipNdjyFCzemPDQSWi8HKdqVeHmJ-1E2JlD8tBJC4vpa_urDH7LQchapVQrdQ2XyyObyn9Kdu1ouUXKwfIJ10z98ZpA
                                                        2024-10-02 15:21:09 UTC1260OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 34 39 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 32 34 36 37 34 34 34 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.149"],[1,0,0,0,0]]],1828,[["1727882467444",null,null,null
                                                        2024-10-02 15:21:09 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 15:21:09 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 15:21:09 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 15:21:09 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        12192.168.2.1149761172.217.18.144438036C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 15:21:09 UTC1317OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1307
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.149"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.149", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.149"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKS1yQEIl7bJAQijtskBCKmdygEIr4fLAQiUocsBCIWgzQEIjafNAQjcvc0BCLnKzQEIq9HNAQiK080BCJ3WzQEIp9jNAQj5wNQVGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=NR_HcU_Qk2gKrQMRECyq6Z5ZtkzGFHkqno6Wbd-8sFp-GDiP0Q8OIc-lL5zaZks_Yz2UHTPISrxQprP54ZO1lTsayVRkjTT1ipNdjyFCzemPDQSWi8HKdqVeHmJ-1E2JlD8tBJC4vpa_urDH7LQchapVQrdQ2XyyObyn9Kdu1ouUXKwfIJ10z98ZpA
                                                        2024-10-02 15:21:09 UTC1307OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 34 39 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 32 34 36 37 39 31 33 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.149"],[1,0,0,0,0]]],1828,[["1727882467913",null,null,null
                                                        2024-10-02 15:21:09 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 15:21:09 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 15:21:09 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 15:21:09 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        13192.168.2.1149762172.217.18.144438036C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 15:21:09 UTC1277OUTPOST /log?hasfast=true&authuser=0&format=json HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1039
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        sec-ch-ua-full-version: "117.0.5938.149"
                                                        Content-Type: text/plain;charset=UTF-8
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.149", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.149"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKS1yQEIl7bJAQijtskBCKmdygEIr4fLAQiUocsBCIWgzQEIjafNAQjcvc0BCLnKzQEIq9HNAQiK080BCJ3WzQEIp9jNAQj5wNQVGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: no-cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=NR_HcU_Qk2gKrQMRECyq6Z5ZtkzGFHkqno6Wbd-8sFp-GDiP0Q8OIc-lL5zaZks_Yz2UHTPISrxQprP54ZO1lTsayVRkjTT1ipNdjyFCzemPDQSWi8HKdqVeHmJ-1E2JlD8tBJC4vpa_urDH7LQchapVQrdQ2XyyObyn9Kdu1ouUXKwfIJ10z98ZpA
                                                        2024-10-02 15:21:09 UTC1039OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 62 6f 71 5f 69 64 65 6e 74 69 74 79 66 72 6f 6e 74 65 6e 64 61 75 74 68 75 69 73 65 72 76 65 72 5f 32 30 32 34 30 39 32 39 2e 30 37 5f 70 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 34 39 22 5d 2c 5b 33 2c 30 2c 30
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"boq_identityfrontendauthuiserver_20240929.07_p0",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.149"],[3,0,0
                                                        2024-10-02 15:21:10 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 15:21:09 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 15:21:10 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 15:21:10 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        14192.168.2.114976352.165.165.26443
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 15:21:21 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=Vrm43n+o83ppcUg&MD=Hv5aGE1t HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                                        Host: slscr.update.microsoft.com
                                                        2024-10-02 15:21:21 UTC560INHTTP/1.1 200 OK
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Content-Type: application/octet-stream
                                                        Expires: -1
                                                        Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                                        ETag: "vic+p1MiJJ+/WMnK08jaWnCBGDfvkGRzPk9f8ZadQHg=_1440"
                                                        MS-CorrelationId: 000caf56-c4cc-43e3-a65a-e7e0a286baf1
                                                        MS-RequestId: d6cf2ca4-d0ee-4cae-9add-f4f51d606353
                                                        MS-CV: AZttB/OyUEmbSFpk.0
                                                        X-Microsoft-SLSClientCache: 1440
                                                        Content-Disposition: attachment; filename=environment.cab
                                                        X-Content-Type-Options: nosniff
                                                        Date: Wed, 02 Oct 2024 15:21:21 GMT
                                                        Connection: close
                                                        Content-Length: 30005
                                                        2024-10-02 15:21:21 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 8d 2b 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 5b 49 00 00 14 00 00 00 00 00 10 00 8d 2b 00 00 a8 49 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 72 4d 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 fe f6 51 be 21 2b 72 4d 43 4b ed 7c 05 58 54 eb da f6 14 43 49 37 0a 02 d2 b9 86 0e 41 52 a4 1b 24 a5 bb 43 24 44 18 94 90 92 52 41 3a 05 09 95 ee 54 b0 00 91 2e e9 12 10 04 11 c9 6f 10 b7 a2 67 9f bd cf 3e ff b7 ff b3 bf 73 ed e1 9a 99 f5 c6 7a d7 bb de f5 3e cf fd 3c f7 dc 17 4a 1a 52 e7 41 a8 97 1e 14 f4 e5 25 7d f4 05 82 82 c1 20 30 08 06 ba c3 05 02 11 7f a9 c1 ff d2 87 5c 1e f4 ed 65 8e 7a 1f f6 0a 40 03 1d 7b f9 83 2c 1c 2f db b8 3a 39 3a 58 38 ba 73 5e
                                                        Data Ascii: MSCF+D[I+IdrMenvironment.cabQ!+rMCK|XTCI7AR$C$DRA:T.og>sz><JRA%} 0\ez@{,/:9:X8s^
                                                        2024-10-02 15:21:21 UTC14181INData Raw: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 26 30 24 06 03 55 04 03 13 1d 4d 69 63 72 6f 73 6f 66 74 20 54 69 6d 65 2d 53 74 61 6d 70 20 50 43 41 20 32 30 31 30 30 1e 17 0d 32 33 31 30 31 32 31 39 30 37 32 35 5a 17 0d 32 35 30 31 31 30 31 39 30 37 32 35 5a 30 81 d2 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 2d 30 2b 06 03 55 04 0b 13 24 4d 69 63 72 6f
                                                        Data Ascii: UUS10UWashington10URedmond10UMicrosoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100231012190725Z250110190725Z010UUS10UWashington10URedmond10UMicrosoft Corporation1-0+U$Micro


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        15192.168.2.1149767142.250.186.1424438036C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 15:21:40 UTC1317OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1067
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.149"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.149", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.149"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKS1yQEIl7bJAQijtskBCKmdygEIr4fLAQiUocsBCIWgzQEIjafNAQjcvc0BCLnKzQEIq9HNAQiK080BCJ3WzQEIp9jNAQj5wNQVGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=NR_HcU_Qk2gKrQMRECyq6Z5ZtkzGFHkqno6Wbd-8sFp-GDiP0Q8OIc-lL5zaZks_Yz2UHTPISrxQprP54ZO1lTsayVRkjTT1ipNdjyFCzemPDQSWi8HKdqVeHmJ-1E2JlD8tBJC4vpa_urDH7LQchapVQrdQ2XyyObyn9Kdu1ouUXKwfIJ10z98ZpA
                                                        2024-10-02 15:21:40 UTC1067OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 34 39 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 32 34 39 38 35 32 34 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.149"],[1,0,0,0,0]]],1828,[["1727882498524",null,null,null
                                                        2024-10-02 15:21:40 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 15:21:40 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 15:21:40 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 15:21:40 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        16192.168.2.1149768142.250.186.1424438036C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 15:21:40 UTC1317OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1362
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.149"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.149", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.149"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKS1yQEIl7bJAQijtskBCKmdygEIr4fLAQiUocsBCIWgzQEIjafNAQjcvc0BCLnKzQEIq9HNAQiK080BCJ3WzQEIp9jNAQj5wNQVGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=NR_HcU_Qk2gKrQMRECyq6Z5ZtkzGFHkqno6Wbd-8sFp-GDiP0Q8OIc-lL5zaZks_Yz2UHTPISrxQprP54ZO1lTsayVRkjTT1ipNdjyFCzemPDQSWi8HKdqVeHmJ-1E2JlD8tBJC4vpa_urDH7LQchapVQrdQ2XyyObyn9Kdu1ouUXKwfIJ10z98ZpA
                                                        2024-10-02 15:21:40 UTC1362OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 34 39 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 32 34 39 38 39 38 35 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.149"],[1,0,0,0,0]]],1828,[["1727882498985",null,null,null
                                                        2024-10-02 15:21:40 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 15:21:40 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 15:21:40 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 15:21:40 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        17192.168.2.1149770142.250.186.1424438036C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 15:22:11 UTC1317OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1162
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.149"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.149", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.149"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKS1yQEIl7bJAQijtskBCKmdygEIr4fLAQiUocsBCIWgzQEIjafNAQjcvc0BCLnKzQEIq9HNAQiK080BCJ3WzQEIp9jNAQj5wNQVGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=NR_HcU_Qk2gKrQMRECyq6Z5ZtkzGFHkqno6Wbd-8sFp-GDiP0Q8OIc-lL5zaZks_Yz2UHTPISrxQprP54ZO1lTsayVRkjTT1ipNdjyFCzemPDQSWi8HKdqVeHmJ-1E2JlD8tBJC4vpa_urDH7LQchapVQrdQ2XyyObyn9Kdu1ouUXKwfIJ10z98ZpA
                                                        2024-10-02 15:22:11 UTC1162OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 34 39 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 32 35 32 39 34 33 36 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.149"],[1,0,0,0,0]]],1828,[["1727882529436",null,null,null
                                                        2024-10-02 15:22:11 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 15:22:11 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 15:22:11 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 15:22:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        18192.168.2.1149771142.250.186.1424438036C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 15:22:11 UTC1317OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1334
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.149"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.149", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.149"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKS1yQEIl7bJAQijtskBCKmdygEIr4fLAQiUocsBCIWgzQEIjafNAQjcvc0BCLnKzQEIq9HNAQiK080BCJ3WzQEIp9jNAQj5wNQVGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=NR_HcU_Qk2gKrQMRECyq6Z5ZtkzGFHkqno6Wbd-8sFp-GDiP0Q8OIc-lL5zaZks_Yz2UHTPISrxQprP54ZO1lTsayVRkjTT1ipNdjyFCzemPDQSWi8HKdqVeHmJ-1E2JlD8tBJC4vpa_urDH7LQchapVQrdQ2XyyObyn9Kdu1ouUXKwfIJ10z98ZpA
                                                        2024-10-02 15:22:11 UTC1334OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 34 39 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 32 35 32 39 34 36 37 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.149"],[1,0,0,0,0]]],1828,[["1727882529467",null,null,null
                                                        2024-10-02 15:22:11 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 15:22:11 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 15:22:11 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 15:22:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:11:20:24
                                                        Start date:02/10/2024
                                                        Path:C:\Users\user\Desktop\file.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\file.exe"
                                                        Imagebase:0x330000
                                                        File size:918'528 bytes
                                                        MD5 hash:1BF42B89A7E2436161C26089F29A0652
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:1
                                                        Start time:11:20:24
                                                        Start date:02/10/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-first-run --disable-session-crashed-bubble --disable-features=WelcomePage,CrashRecovery --start-fullscreen --disable-popup-blocking
                                                        Imagebase:0x7ff6a3150000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:83395EAB5B03DEA9720F8D7AC0D15CAA
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:4
                                                        Start time:11:20:25
                                                        Start date:02/10/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 --field-trial-handle=1936,i,2338416857820957988,18419048838522422849,262144 --disable-features=CrashRecovery,WelcomePage /prefetch:8
                                                        Imagebase:0x7ff6a3150000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:83395EAB5B03DEA9720F8D7AC0D15CAA
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:5
                                                        Start time:11:20:37
                                                        Start date:02/10/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5416 --field-trial-handle=1936,i,2338416857820957988,18419048838522422849,262144 --disable-features=CrashRecovery,WelcomePage /prefetch:8
                                                        Imagebase:0x7ff6a3150000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:83395EAB5B03DEA9720F8D7AC0D15CAA
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:6
                                                        Start time:11:20:37
                                                        Start date:02/10/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 --field-trial-handle=1936,i,2338416857820957988,18419048838522422849,262144 --disable-features=CrashRecovery,WelcomePage /prefetch:8
                                                        Imagebase:0x7ff6a3150000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:83395EAB5B03DEA9720F8D7AC0D15CAA
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:2%
                                                          Dynamic/Decrypted Code Coverage:0%
                                                          Signature Coverage:7.1%
                                                          Total number of Nodes:1553
                                                          Total number of Limit Nodes:46
                                                          execution_graph 94990 331033 94995 334c91 94990->94995 94994 331042 95003 33a961 94995->95003 94999 334d9c 95001 331038 94999->95001 95011 3351f7 22 API calls __fread_nolock 94999->95011 95002 3500a3 29 API calls __onexit 95001->95002 95002->94994 95012 34fe0b 95003->95012 95005 33a976 95022 34fddb 95005->95022 95007 334cff 95008 333af0 95007->95008 95047 333b1c 95008->95047 95011->94999 95014 34fddb 95012->95014 95015 34fdfa 95014->95015 95019 34fdfc 95014->95019 95032 35ea0c 95014->95032 95039 354ead 7 API calls 2 library calls 95014->95039 95015->95005 95017 35066d 95041 3532a4 RaiseException 95017->95041 95019->95017 95040 3532a4 RaiseException 95019->95040 95021 35068a 95021->95005 95024 34fde0 95022->95024 95023 35ea0c ___std_exception_copy 21 API calls 95023->95024 95024->95023 95025 34fdfa 95024->95025 95028 34fdfc 95024->95028 95044 354ead 7 API calls 2 library calls 95024->95044 95025->95007 95027 35066d 95046 3532a4 RaiseException 95027->95046 95028->95027 95045 3532a4 RaiseException 95028->95045 95030 35068a 95030->95007 95037 363820 __dosmaperr 95032->95037 95033 36385e 95043 35f2d9 20 API calls __dosmaperr 95033->95043 95035 363849 RtlAllocateHeap 95036 36385c 95035->95036 95035->95037 95036->95014 95037->95033 95037->95035 95042 354ead 7 API calls 2 library calls 95037->95042 95039->95014 95040->95017 95041->95021 95042->95037 95043->95036 95044->95024 95045->95027 95046->95030 95048 333b0f 95047->95048 95049 333b29 95047->95049 95048->94999 95049->95048 95050 333b30 RegOpenKeyExW 95049->95050 95050->95048 95051 333b4a RegQueryValueExW 95050->95051 95052 333b80 RegCloseKey 95051->95052 95053 333b6b 95051->95053 95052->95048 95053->95052 95054 332e37 95055 33a961 22 API calls 95054->95055 95056 332e4d 95055->95056 95133 334ae3 95056->95133 95058 332e6b 95147 333a5a 95058->95147 95060 332e7f 95154 339cb3 95060->95154 95065 372cb0 95200 3a2cf9 95065->95200 95066 332ead 95182 33a8c7 22 API calls __fread_nolock 95066->95182 95068 372cc3 95069 372ccf 95068->95069 95226 334f39 95068->95226 95074 334f39 68 API calls 95069->95074 95072 332ec3 95183 336f88 22 API calls 95072->95183 95077 372ce5 95074->95077 95075 332ecf 95076 339cb3 22 API calls 95075->95076 95078 332edc 95076->95078 95232 333084 22 API calls 95077->95232 95184 33a81b 41 API calls 95078->95184 95080 332eec 95083 339cb3 22 API calls 95080->95083 95082 372d02 95233 333084 22 API calls 95082->95233 95085 332f12 95083->95085 95185 33a81b 41 API calls 95085->95185 95086 372d1e 95088 333a5a 24 API calls 95086->95088 95089 372d44 95088->95089 95234 333084 22 API calls 95089->95234 95090 332f21 95093 33a961 22 API calls 95090->95093 95092 372d50 95235 33a8c7 22 API calls __fread_nolock 95092->95235 95095 332f3f 95093->95095 95186 333084 22 API calls 95095->95186 95097 372d5e 95236 333084 22 API calls 95097->95236 95098 332f4b 95187 354a28 40 API calls 3 library calls 95098->95187 95101 372d6d 95237 33a8c7 22 API calls __fread_nolock 95101->95237 95102 332f59 95102->95077 95103 332f63 95102->95103 95188 354a28 40 API calls 3 library calls 95103->95188 95106 372d83 95238 333084 22 API calls 95106->95238 95107 332f6e 95107->95082 95109 332f78 95107->95109 95189 354a28 40 API calls 3 library calls 95109->95189 95110 372d90 95112 332f83 95112->95086 95113 332f8d 95112->95113 95190 354a28 40 API calls 3 library calls 95113->95190 95115 332f98 95116 332fdc 95115->95116 95191 333084 22 API calls 95115->95191 95116->95101 95117 332fe8 95116->95117 95117->95110 95194 3363eb 22 API calls 95117->95194 95119 332fbf 95192 33a8c7 22 API calls __fread_nolock 95119->95192 95122 332ff8 95195 336a50 22 API calls 95122->95195 95123 332fcd 95193 333084 22 API calls 95123->95193 95126 333006 95196 3370b0 23 API calls 95126->95196 95130 333021 95131 333065 95130->95131 95197 336f88 22 API calls 95130->95197 95198 3370b0 23 API calls 95130->95198 95199 333084 22 API calls 95130->95199 95134 334af0 __wsopen_s 95133->95134 95136 334b22 95134->95136 95242 336b57 95134->95242 95146 334b58 95136->95146 95239 334c6d 95136->95239 95138 334c29 95139 339cb3 22 API calls 95138->95139 95140 334c5e 95138->95140 95142 334c52 95139->95142 95140->95058 95141 339cb3 22 API calls 95141->95146 95143 33515f 22 API calls 95142->95143 95143->95140 95144 334c6d 22 API calls 95144->95146 95146->95138 95146->95141 95146->95144 95254 33515f 95146->95254 95271 371f50 95147->95271 95150 339cb3 22 API calls 95151 333a8d 95150->95151 95273 333aa2 95151->95273 95153 333a97 95153->95060 95155 339cc2 _wcslen 95154->95155 95156 34fe0b 22 API calls 95155->95156 95157 339cea __fread_nolock 95156->95157 95158 34fddb 22 API calls 95157->95158 95159 332e8c 95158->95159 95160 334ecb 95159->95160 95293 334e90 LoadLibraryA 95160->95293 95165 334ef6 LoadLibraryExW 95301 334e59 LoadLibraryA 95165->95301 95166 373ccf 95167 334f39 68 API calls 95166->95167 95169 373cd6 95167->95169 95172 334e59 3 API calls 95169->95172 95174 373cde 95172->95174 95173 334f20 95173->95174 95175 334f2c 95173->95175 95323 3350f5 40 API calls __fread_nolock 95174->95323 95176 334f39 68 API calls 95175->95176 95178 332ea5 95176->95178 95178->95065 95178->95066 95179 373cf5 95324 3a28fe 27 API calls 95179->95324 95181 373d05 95182->95072 95183->95075 95184->95080 95185->95090 95186->95098 95187->95102 95188->95107 95189->95112 95190->95115 95191->95119 95192->95123 95193->95116 95194->95122 95195->95126 95196->95130 95197->95130 95198->95130 95199->95130 95201 3a2d15 95200->95201 95407 33511f 64 API calls 95201->95407 95203 3a2d29 95408 3a2e66 75 API calls 95203->95408 95205 3a2d3b 95224 3a2d3f 95205->95224 95409 3350f5 40 API calls __fread_nolock 95205->95409 95207 3a2d56 95410 3350f5 40 API calls __fread_nolock 95207->95410 95209 3a2d66 95411 3350f5 40 API calls __fread_nolock 95209->95411 95211 3a2d81 95412 3350f5 40 API calls __fread_nolock 95211->95412 95213 3a2d9c 95413 33511f 64 API calls 95213->95413 95215 3a2db3 95216 35ea0c ___std_exception_copy 21 API calls 95215->95216 95217 3a2dba 95216->95217 95218 35ea0c ___std_exception_copy 21 API calls 95217->95218 95219 3a2dc4 95218->95219 95414 3350f5 40 API calls __fread_nolock 95219->95414 95221 3a2dd8 95415 3a28fe 27 API calls 95221->95415 95223 3a2dee 95223->95224 95416 3a22ce 95223->95416 95224->95068 95227 334f43 95226->95227 95228 334f4a 95226->95228 95229 35e678 67 API calls 95227->95229 95230 334f6a FreeLibrary 95228->95230 95231 334f59 95228->95231 95229->95228 95230->95231 95231->95069 95232->95082 95233->95086 95234->95092 95235->95097 95236->95101 95237->95106 95238->95110 95260 33aec9 95239->95260 95241 334c78 95241->95136 95243 336b67 _wcslen 95242->95243 95244 374ba1 95242->95244 95247 336ba2 95243->95247 95248 336b7d 95243->95248 95267 3393b2 95244->95267 95246 374baa 95246->95246 95249 34fddb 22 API calls 95247->95249 95266 336f34 22 API calls 95248->95266 95251 336bae 95249->95251 95252 34fe0b 22 API calls 95251->95252 95253 336b85 __fread_nolock 95252->95253 95253->95136 95255 33516e 95254->95255 95259 33518f __fread_nolock 95254->95259 95257 34fe0b 22 API calls 95255->95257 95256 34fddb 22 API calls 95258 3351a2 95256->95258 95257->95259 95258->95146 95259->95256 95261 33aedc 95260->95261 95265 33aed9 __fread_nolock 95260->95265 95262 34fddb 22 API calls 95261->95262 95263 33aee7 95262->95263 95264 34fe0b 22 API calls 95263->95264 95264->95265 95265->95241 95266->95253 95268 3393c9 __fread_nolock 95267->95268 95269 3393c0 95267->95269 95268->95246 95268->95268 95269->95268 95270 33aec9 22 API calls 95269->95270 95270->95268 95272 333a67 GetModuleFileNameW 95271->95272 95272->95150 95274 371f50 __wsopen_s 95273->95274 95275 333aaf GetFullPathNameW 95274->95275 95276 333ae9 95275->95276 95277 333ace 95275->95277 95287 33a6c3 95276->95287 95278 336b57 22 API calls 95277->95278 95280 333ada 95278->95280 95283 3337a0 95280->95283 95284 3337ae 95283->95284 95285 3393b2 22 API calls 95284->95285 95286 3337c2 95285->95286 95286->95153 95288 33a6d0 95287->95288 95289 33a6dd 95287->95289 95288->95280 95290 34fddb 22 API calls 95289->95290 95291 33a6e7 95290->95291 95292 34fe0b 22 API calls 95291->95292 95292->95288 95294 334ec6 95293->95294 95295 334ea8 GetProcAddress 95293->95295 95298 35e5eb 95294->95298 95296 334eb8 95295->95296 95296->95294 95297 334ebf FreeLibrary 95296->95297 95297->95294 95325 35e52a 95298->95325 95300 334eea 95300->95165 95300->95166 95302 334e6e GetProcAddress 95301->95302 95303 334e8d 95301->95303 95304 334e7e 95302->95304 95306 334f80 95303->95306 95304->95303 95305 334e86 FreeLibrary 95304->95305 95305->95303 95307 34fe0b 22 API calls 95306->95307 95308 334f95 95307->95308 95393 335722 95308->95393 95310 334fa1 __fread_nolock 95311 3350a5 95310->95311 95312 373d1d 95310->95312 95322 334fdc 95310->95322 95396 3342a2 CreateStreamOnHGlobal 95311->95396 95404 3a304d 74 API calls 95312->95404 95315 373d22 95405 33511f 64 API calls 95315->95405 95318 373d45 95406 3350f5 40 API calls __fread_nolock 95318->95406 95321 33506e messages 95321->95173 95322->95315 95322->95321 95402 3350f5 40 API calls __fread_nolock 95322->95402 95403 33511f 64 API calls 95322->95403 95323->95179 95324->95181 95328 35e536 ___scrt_is_nonwritable_in_current_image 95325->95328 95326 35e544 95350 35f2d9 20 API calls __dosmaperr 95326->95350 95328->95326 95330 35e574 95328->95330 95329 35e549 95351 3627ec 26 API calls pre_c_initialization 95329->95351 95332 35e586 95330->95332 95333 35e579 95330->95333 95342 368061 95332->95342 95352 35f2d9 20 API calls __dosmaperr 95333->95352 95336 35e554 __fread_nolock 95336->95300 95337 35e58f 95338 35e595 95337->95338 95339 35e5a2 95337->95339 95353 35f2d9 20 API calls __dosmaperr 95338->95353 95354 35e5d4 LeaveCriticalSection __fread_nolock 95339->95354 95343 36806d ___scrt_is_nonwritable_in_current_image 95342->95343 95355 362f5e EnterCriticalSection 95343->95355 95345 36807b 95356 3680fb 95345->95356 95349 3680ac __fread_nolock 95349->95337 95350->95329 95351->95336 95352->95336 95353->95336 95354->95336 95355->95345 95362 36811e 95356->95362 95357 368177 95374 364c7d 95357->95374 95362->95357 95362->95362 95368 368088 95362->95368 95372 35918d EnterCriticalSection 95362->95372 95373 3591a1 LeaveCriticalSection 95362->95373 95363 368189 95363->95368 95387 363405 11 API calls 2 library calls 95363->95387 95365 3681a8 95388 35918d EnterCriticalSection 95365->95388 95369 3680b7 95368->95369 95392 362fa6 LeaveCriticalSection 95369->95392 95371 3680be 95371->95349 95372->95362 95373->95362 95375 364c8a __dosmaperr 95374->95375 95376 364cb5 RtlAllocateHeap 95375->95376 95377 364cca 95375->95377 95389 354ead 7 API calls 2 library calls 95375->95389 95376->95375 95378 364cc8 95376->95378 95390 35f2d9 20 API calls __dosmaperr 95377->95390 95381 3629c8 95378->95381 95382 3629d3 RtlFreeHeap 95381->95382 95386 3629fc __dosmaperr 95381->95386 95383 3629e8 95382->95383 95382->95386 95391 35f2d9 20 API calls __dosmaperr 95383->95391 95385 3629ee GetLastError 95385->95386 95386->95363 95387->95365 95388->95368 95389->95375 95390->95378 95391->95385 95392->95371 95394 34fddb 22 API calls 95393->95394 95395 335734 95394->95395 95395->95310 95397 3342bc FindResourceExW 95396->95397 95401 3342d9 95396->95401 95398 3735ba LoadResource 95397->95398 95397->95401 95399 3735cf SizeofResource 95398->95399 95398->95401 95400 3735e3 LockResource 95399->95400 95399->95401 95400->95401 95401->95322 95402->95322 95403->95322 95404->95315 95405->95318 95406->95321 95407->95203 95408->95205 95409->95207 95410->95209 95411->95211 95412->95213 95413->95215 95414->95221 95415->95223 95417 3a22d9 95416->95417 95419 3a22e7 95416->95419 95418 35e5eb 29 API calls 95417->95418 95418->95419 95420 3a232c 95419->95420 95421 35e5eb 29 API calls 95419->95421 95444 3a22f0 95419->95444 95445 3a2557 40 API calls __fread_nolock 95420->95445 95423 3a2311 95421->95423 95423->95420 95425 3a231a 95423->95425 95424 3a2370 95426 3a2374 95424->95426 95427 3a2395 95424->95427 95425->95444 95453 35e678 95425->95453 95428 3a2381 95426->95428 95432 35e678 67 API calls 95426->95432 95446 3a2171 95427->95446 95435 35e678 67 API calls 95428->95435 95428->95444 95431 3a239d 95433 3a23c3 95431->95433 95434 3a23a3 95431->95434 95432->95428 95466 3a23f3 74 API calls 95433->95466 95436 3a23b0 95434->95436 95438 35e678 67 API calls 95434->95438 95435->95444 95439 35e678 67 API calls 95436->95439 95436->95444 95438->95436 95439->95444 95440 3a23de 95443 35e678 67 API calls 95440->95443 95440->95444 95441 3a23ca 95441->95440 95442 35e678 67 API calls 95441->95442 95442->95440 95443->95444 95444->95224 95445->95424 95447 35ea0c ___std_exception_copy 21 API calls 95446->95447 95448 3a217f 95447->95448 95449 35ea0c ___std_exception_copy 21 API calls 95448->95449 95450 3a2190 95449->95450 95451 35ea0c ___std_exception_copy 21 API calls 95450->95451 95452 3a219c 95451->95452 95452->95431 95454 35e684 ___scrt_is_nonwritable_in_current_image 95453->95454 95455 35e695 95454->95455 95456 35e6aa 95454->95456 95484 35f2d9 20 API calls __dosmaperr 95455->95484 95465 35e6a5 __fread_nolock 95456->95465 95467 35918d EnterCriticalSection 95456->95467 95458 35e69a 95485 3627ec 26 API calls pre_c_initialization 95458->95485 95461 35e6c6 95468 35e602 95461->95468 95463 35e6d1 95486 35e6ee LeaveCriticalSection __fread_nolock 95463->95486 95465->95444 95466->95441 95467->95461 95469 35e624 95468->95469 95470 35e60f 95468->95470 95475 35e61f 95469->95475 95487 35dc0b 95469->95487 95519 35f2d9 20 API calls __dosmaperr 95470->95519 95472 35e614 95520 3627ec 26 API calls pre_c_initialization 95472->95520 95475->95463 95480 35e646 95504 36862f 95480->95504 95483 3629c8 _free 20 API calls 95483->95475 95484->95458 95485->95465 95486->95465 95488 35dc23 95487->95488 95492 35dc1f 95487->95492 95489 35d955 __fread_nolock 26 API calls 95488->95489 95488->95492 95490 35dc43 95489->95490 95521 3659be 62 API calls 5 library calls 95490->95521 95493 364d7a 95492->95493 95494 35e640 95493->95494 95495 364d90 95493->95495 95497 35d955 95494->95497 95495->95494 95496 3629c8 _free 20 API calls 95495->95496 95496->95494 95498 35d976 95497->95498 95499 35d961 95497->95499 95498->95480 95522 35f2d9 20 API calls __dosmaperr 95499->95522 95501 35d966 95523 3627ec 26 API calls pre_c_initialization 95501->95523 95503 35d971 95503->95480 95505 368653 95504->95505 95506 36863e 95504->95506 95507 36868e 95505->95507 95512 36867a 95505->95512 95527 35f2c6 20 API calls __dosmaperr 95506->95527 95529 35f2c6 20 API calls __dosmaperr 95507->95529 95510 368643 95528 35f2d9 20 API calls __dosmaperr 95510->95528 95524 368607 95512->95524 95513 368693 95530 35f2d9 20 API calls __dosmaperr 95513->95530 95516 35e64c 95516->95475 95516->95483 95517 36869b 95531 3627ec 26 API calls pre_c_initialization 95517->95531 95519->95472 95520->95475 95521->95492 95522->95501 95523->95503 95532 368585 95524->95532 95526 36862b 95526->95516 95527->95510 95528->95516 95529->95513 95530->95517 95531->95516 95533 368591 ___scrt_is_nonwritable_in_current_image 95532->95533 95543 365147 EnterCriticalSection 95533->95543 95535 36859f 95536 3685c6 95535->95536 95537 3685d1 95535->95537 95544 3686ae 95536->95544 95559 35f2d9 20 API calls __dosmaperr 95537->95559 95540 3685cc 95560 3685fb LeaveCriticalSection __wsopen_s 95540->95560 95542 3685ee __fread_nolock 95542->95526 95543->95535 95561 3653c4 95544->95561 95546 3686c4 95574 365333 21 API calls 2 library calls 95546->95574 95548 3686be 95548->95546 95549 3653c4 __wsopen_s 26 API calls 95548->95549 95558 3686f6 95548->95558 95552 3686ed 95549->95552 95550 3653c4 __wsopen_s 26 API calls 95553 368702 CloseHandle 95550->95553 95551 36871c 95555 36873e 95551->95555 95575 35f2a3 20 API calls __dosmaperr 95551->95575 95556 3653c4 __wsopen_s 26 API calls 95552->95556 95553->95546 95557 36870e GetLastError 95553->95557 95555->95540 95556->95558 95557->95546 95558->95546 95558->95550 95559->95540 95560->95542 95562 3653e6 95561->95562 95563 3653d1 95561->95563 95567 36540b 95562->95567 95578 35f2c6 20 API calls __dosmaperr 95562->95578 95576 35f2c6 20 API calls __dosmaperr 95563->95576 95566 3653d6 95577 35f2d9 20 API calls __dosmaperr 95566->95577 95567->95548 95568 365416 95579 35f2d9 20 API calls __dosmaperr 95568->95579 95571 3653de 95571->95548 95572 36541e 95580 3627ec 26 API calls pre_c_initialization 95572->95580 95574->95551 95575->95555 95576->95566 95577->95571 95578->95568 95579->95572 95580->95571 95581 333156 95584 333170 95581->95584 95585 333187 95584->95585 95586 3331eb 95585->95586 95587 33318c 95585->95587 95624 3331e9 95585->95624 95591 3331f1 95586->95591 95592 372dfb 95586->95592 95588 333265 PostQuitMessage 95587->95588 95589 333199 95587->95589 95626 33316a 95588->95626 95594 3331a4 95589->95594 95595 372e7c 95589->95595 95590 3331d0 DefWindowProcW 95590->95626 95596 3331f8 95591->95596 95597 33321d SetTimer RegisterWindowMessageW 95591->95597 95643 3318e2 10 API calls 95592->95643 95599 3331ae 95594->95599 95600 372e68 95594->95600 95656 39bf30 34 API calls ___scrt_fastfail 95595->95656 95603 333201 KillTimer 95596->95603 95604 372d9c 95596->95604 95601 333246 CreatePopupMenu 95597->95601 95597->95626 95598 372e1c 95644 34e499 42 API calls 95598->95644 95607 3331b9 95599->95607 95615 372e4d 95599->95615 95633 39c161 95600->95633 95601->95626 95629 3330f2 95603->95629 95609 372dd7 MoveWindow 95604->95609 95610 372da1 95604->95610 95612 333253 95607->95612 95618 3331c4 95607->95618 95608 372e8e 95608->95590 95608->95626 95609->95626 95613 372da7 95610->95613 95614 372dc6 SetFocus 95610->95614 95641 33326f 44 API calls ___scrt_fastfail 95612->95641 95613->95618 95619 372db0 95613->95619 95614->95626 95615->95590 95655 390ad7 22 API calls 95615->95655 95618->95590 95625 3330f2 Shell_NotifyIconW 95618->95625 95642 3318e2 10 API calls 95619->95642 95622 333263 95622->95626 95624->95590 95627 372e41 95625->95627 95645 333837 95627->95645 95630 333154 95629->95630 95631 333104 ___scrt_fastfail 95629->95631 95640 333c50 DeleteObject DestroyWindow 95630->95640 95632 333123 Shell_NotifyIconW 95631->95632 95632->95630 95634 39c179 ___scrt_fastfail 95633->95634 95635 39c276 95633->95635 95657 333923 95634->95657 95635->95626 95637 39c25f KillTimer SetTimer 95637->95635 95638 39c1a0 95638->95637 95639 39c251 Shell_NotifyIconW 95638->95639 95639->95637 95640->95626 95641->95622 95642->95626 95643->95598 95644->95618 95646 333862 ___scrt_fastfail 95645->95646 95711 334212 95646->95711 95648 3338e8 95651 373386 Shell_NotifyIconW 95648->95651 95652 333906 Shell_NotifyIconW 95648->95652 95653 333923 24 API calls 95652->95653 95654 33391c 95653->95654 95654->95624 95655->95624 95656->95608 95658 33393f 95657->95658 95676 333a13 95657->95676 95679 336270 95658->95679 95661 373393 LoadStringW 95664 3733ad 95661->95664 95662 33395a 95663 336b57 22 API calls 95662->95663 95665 33396f 95663->95665 95673 333994 ___scrt_fastfail 95664->95673 95685 33a8c7 22 API calls __fread_nolock 95664->95685 95666 3733c9 95665->95666 95667 33397c 95665->95667 95686 336350 22 API calls 95666->95686 95667->95664 95669 333986 95667->95669 95684 336350 22 API calls 95669->95684 95672 3733d7 95672->95673 95687 3333c6 95672->95687 95675 3339f9 Shell_NotifyIconW 95673->95675 95675->95676 95676->95638 95677 3733f9 95678 3333c6 22 API calls 95677->95678 95678->95673 95680 34fe0b 22 API calls 95679->95680 95681 336295 95680->95681 95682 34fddb 22 API calls 95681->95682 95683 33394d 95682->95683 95683->95661 95683->95662 95684->95673 95685->95673 95686->95672 95688 3730bb 95687->95688 95689 3333dd 95687->95689 95690 34fddb 22 API calls 95688->95690 95696 3333ee 95689->95696 95693 3730c5 _wcslen 95690->95693 95692 3333e8 95692->95677 95694 34fe0b 22 API calls 95693->95694 95695 3730fe __fread_nolock 95694->95695 95697 3333fe _wcslen 95696->95697 95698 333411 95697->95698 95699 37311d 95697->95699 95706 33a587 95698->95706 95701 34fddb 22 API calls 95699->95701 95703 373127 95701->95703 95702 33341e __fread_nolock 95702->95692 95704 34fe0b 22 API calls 95703->95704 95705 373157 __fread_nolock 95704->95705 95707 33a59d 95706->95707 95710 33a598 __fread_nolock 95706->95710 95708 37f80f 95707->95708 95709 34fe0b 22 API calls 95707->95709 95709->95710 95710->95702 95712 3735a4 95711->95712 95713 3338b7 95711->95713 95712->95713 95714 3735ad DestroyIcon 95712->95714 95713->95648 95715 39c874 42 API calls _strftime 95713->95715 95714->95713 95715->95648 95716 33105b 95721 33344d 95716->95721 95718 33106a 95752 3500a3 29 API calls __onexit 95718->95752 95720 331074 95722 33345d __wsopen_s 95721->95722 95723 33a961 22 API calls 95722->95723 95724 333513 95723->95724 95725 333a5a 24 API calls 95724->95725 95726 33351c 95725->95726 95753 333357 95726->95753 95729 3333c6 22 API calls 95730 333535 95729->95730 95731 33515f 22 API calls 95730->95731 95732 333544 95731->95732 95733 33a961 22 API calls 95732->95733 95734 33354d 95733->95734 95735 33a6c3 22 API calls 95734->95735 95736 333556 RegOpenKeyExW 95735->95736 95737 373176 RegQueryValueExW 95736->95737 95741 333578 95736->95741 95738 373193 95737->95738 95739 37320c RegCloseKey 95737->95739 95740 34fe0b 22 API calls 95738->95740 95739->95741 95751 37321e _wcslen 95739->95751 95742 3731ac 95740->95742 95741->95718 95743 335722 22 API calls 95742->95743 95744 3731b7 RegQueryValueExW 95743->95744 95745 3731d4 95744->95745 95748 3731ee messages 95744->95748 95746 336b57 22 API calls 95745->95746 95746->95748 95747 334c6d 22 API calls 95747->95751 95748->95739 95749 339cb3 22 API calls 95749->95751 95750 33515f 22 API calls 95750->95751 95751->95741 95751->95747 95751->95749 95751->95750 95752->95720 95754 371f50 __wsopen_s 95753->95754 95755 333364 GetFullPathNameW 95754->95755 95756 333386 95755->95756 95757 336b57 22 API calls 95756->95757 95758 3333a4 95757->95758 95758->95729 95759 3c2a55 95767 3a1ebc 95759->95767 95762 3c2a70 95769 3939c0 22 API calls 95762->95769 95763 3c2a87 95765 3c2a7c 95770 39417d 22 API calls __fread_nolock 95765->95770 95768 3a1ec3 IsWindow 95767->95768 95768->95762 95768->95763 95769->95765 95770->95763 95771 331098 95776 3342de 95771->95776 95775 3310a7 95777 33a961 22 API calls 95776->95777 95778 3342f5 GetVersionExW 95777->95778 95779 336b57 22 API calls 95778->95779 95780 334342 95779->95780 95781 3393b2 22 API calls 95780->95781 95792 334378 95780->95792 95782 33436c 95781->95782 95784 3337a0 22 API calls 95782->95784 95783 33441b GetCurrentProcess IsWow64Process 95785 334437 95783->95785 95784->95792 95786 373824 GetSystemInfo 95785->95786 95787 33444f LoadLibraryA 95785->95787 95788 334460 GetProcAddress 95787->95788 95789 33449c GetSystemInfo 95787->95789 95788->95789 95790 334470 GetNativeSystemInfo 95788->95790 95791 334476 95789->95791 95790->95791 95794 33109d 95791->95794 95795 33447a FreeLibrary 95791->95795 95792->95783 95793 3737df 95792->95793 95796 3500a3 29 API calls __onexit 95794->95796 95795->95794 95796->95775 95797 33f7bf 95798 33f7d3 95797->95798 95799 33fcb6 95797->95799 95801 33fcc2 95798->95801 95802 34fddb 22 API calls 95798->95802 95890 33aceb 95799->95890 95803 33aceb 23 API calls 95801->95803 95804 33f7e5 95802->95804 95805 33fd3d 95803->95805 95804->95801 95804->95805 95806 33f83e 95804->95806 95900 3a1155 22 API calls 95805->95900 95823 33ed9d messages 95806->95823 95832 341310 95806->95832 95809 33fef7 95809->95823 95902 33a8c7 22 API calls __fread_nolock 95809->95902 95811 34fddb 22 API calls 95831 33ec76 messages 95811->95831 95813 384600 95813->95823 95901 33a8c7 22 API calls __fread_nolock 95813->95901 95814 384b0b 95904 3a359c 82 API calls __wsopen_s 95814->95904 95820 33a8c7 22 API calls 95820->95831 95821 33fbe3 95821->95823 95824 384bdc 95821->95824 95829 33f3ae messages 95821->95829 95822 33a961 22 API calls 95822->95831 95905 3a359c 82 API calls __wsopen_s 95824->95905 95826 350242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95826->95831 95827 384beb 95906 3a359c 82 API calls __wsopen_s 95827->95906 95828 3500a3 29 API calls pre_c_initialization 95828->95831 95829->95823 95903 3a359c 82 API calls __wsopen_s 95829->95903 95830 3501f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95830->95831 95831->95809 95831->95811 95831->95813 95831->95814 95831->95820 95831->95821 95831->95822 95831->95823 95831->95826 95831->95827 95831->95828 95831->95829 95831->95830 95888 3401e0 349 API calls 2 library calls 95831->95888 95889 3406a0 41 API calls messages 95831->95889 95833 341376 95832->95833 95834 3417b0 95832->95834 95835 341390 95833->95835 95836 386331 95833->95836 95967 350242 5 API calls __Init_thread_wait 95834->95967 95907 341940 95835->95907 95971 3b709c 349 API calls 95836->95971 95840 3417ba 95843 3417fb 95840->95843 95845 339cb3 22 API calls 95840->95845 95842 38633d 95842->95831 95847 386346 95843->95847 95849 34182c 95843->95849 95844 341940 9 API calls 95846 3413b6 95844->95846 95852 3417d4 95845->95852 95846->95843 95848 3413ec 95846->95848 95972 3a359c 82 API calls __wsopen_s 95847->95972 95848->95847 95855 341408 __fread_nolock 95848->95855 95850 33aceb 23 API calls 95849->95850 95853 341839 95850->95853 95968 3501f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95852->95968 95969 34d217 349 API calls 95853->95969 95855->95853 95857 38636e 95855->95857 95864 34fddb 22 API calls 95855->95864 95866 34fe0b 22 API calls 95855->95866 95871 34152f 95855->95871 95873 3863b2 95855->95873 95876 386369 95855->95876 95942 33ec40 95855->95942 95973 3a359c 82 API calls __wsopen_s 95857->95973 95859 34153c 95862 341940 9 API calls 95859->95862 95860 3863d1 95975 3b5745 54 API calls _wcslen 95860->95975 95863 341549 95862->95863 95868 341940 9 API calls 95863->95868 95874 3864fa 95863->95874 95864->95855 95865 341872 95970 34faeb 23 API calls 95865->95970 95866->95855 95872 341563 95868->95872 95871->95859 95871->95860 95872->95874 95879 3415c7 messages 95872->95879 95976 33a8c7 22 API calls __fread_nolock 95872->95976 95974 3a359c 82 API calls __wsopen_s 95873->95974 95874->95876 95977 3a359c 82 API calls __wsopen_s 95874->95977 95876->95831 95878 341940 9 API calls 95878->95879 95879->95865 95879->95874 95879->95876 95879->95878 95882 34167b messages 95879->95882 95917 3a5c5a 95879->95917 95922 3bab67 95879->95922 95925 3c28ab 95879->95925 95930 3ba2ea 95879->95930 95935 34f645 95879->95935 95880 34171d 95880->95831 95882->95880 95966 34ce17 22 API calls messages 95882->95966 95888->95831 95889->95831 95891 33acf9 95890->95891 95899 33ad2a messages 95890->95899 95892 33ad01 messages 95891->95892 95893 33ad55 95891->95893 95895 33ad21 95892->95895 95896 37fa48 95892->95896 95892->95899 95893->95899 96173 33a8c7 22 API calls __fread_nolock 95893->96173 95898 37fa3a VariantClear 95895->95898 95895->95899 95896->95899 96174 34ce17 22 API calls messages 95896->96174 95898->95899 95899->95801 95900->95823 95901->95823 95902->95823 95903->95823 95904->95823 95905->95827 95906->95823 95908 341981 95907->95908 95915 34195d 95907->95915 95978 350242 5 API calls __Init_thread_wait 95908->95978 95909 3413a0 95909->95844 95911 34198b 95911->95915 95979 3501f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95911->95979 95913 348727 95913->95909 95981 3501f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95913->95981 95915->95909 95980 350242 5 API calls __Init_thread_wait 95915->95980 95982 337510 95917->95982 95921 3a5c77 95921->95879 96014 3baff9 95922->96014 96127 3c2b30 95925->96127 95927 3c28b9 95928 33aceb 23 API calls 95927->95928 95929 3c2901 95928->95929 95929->95879 95931 337510 53 API calls 95930->95931 95932 3ba306 95931->95932 96144 39d4dc CreateToolhelp32Snapshot Process32FirstW 95932->96144 95934 3ba315 95934->95879 95936 33b567 39 API calls 95935->95936 95937 34f659 95936->95937 95938 38f2dc Sleep 95937->95938 95939 34f661 timeGetTime 95937->95939 95940 33b567 39 API calls 95939->95940 95941 34f677 95940->95941 95941->95879 95960 33ec76 messages 95942->95960 95943 3501f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95943->95960 95944 384beb 96172 3a359c 82 API calls __wsopen_s 95944->96172 95945 33fef7 95957 33ed9d messages 95945->95957 96168 33a8c7 22 API calls __fread_nolock 95945->96168 95947 34fddb 22 API calls 95947->95960 95948 33f3ae messages 95948->95957 96169 3a359c 82 API calls __wsopen_s 95948->96169 95950 384600 95950->95957 96167 33a8c7 22 API calls __fread_nolock 95950->96167 95951 384b0b 96170 3a359c 82 API calls __wsopen_s 95951->96170 95957->95855 95958 350242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95958->95960 95959 33a8c7 22 API calls 95959->95960 95960->95943 95960->95944 95960->95945 95960->95947 95960->95948 95960->95950 95960->95951 95960->95957 95960->95958 95960->95959 95961 33fbe3 95960->95961 95962 33a961 22 API calls 95960->95962 95963 3500a3 29 API calls pre_c_initialization 95960->95963 96165 3401e0 349 API calls 2 library calls 95960->96165 96166 3406a0 41 API calls messages 95960->96166 95961->95948 95961->95957 95964 384bdc 95961->95964 95962->95960 95963->95960 96171 3a359c 82 API calls __wsopen_s 95964->96171 95966->95882 95967->95840 95968->95843 95969->95865 95970->95865 95971->95842 95972->95876 95973->95876 95974->95876 95975->95872 95976->95879 95977->95876 95978->95911 95979->95915 95980->95913 95981->95909 95983 337525 95982->95983 95999 337522 95982->95999 95984 33755b 95983->95984 95985 33752d 95983->95985 95988 37500f 95984->95988 95989 33756d 95984->95989 95996 3750f6 95984->95996 96010 3551c6 26 API calls 95985->96010 95998 34fe0b 22 API calls 95988->95998 96004 375088 95988->96004 96011 34fb21 51 API calls 95989->96011 95990 33753d 95993 34fddb 22 API calls 95990->95993 95991 37510e 95991->95991 95995 337547 95993->95995 95997 339cb3 22 API calls 95995->95997 96013 355183 26 API calls 95996->96013 95997->95999 96000 375058 95998->96000 96005 39dbbe lstrlenW 95999->96005 96001 34fddb 22 API calls 96000->96001 96002 37507f 96001->96002 96003 339cb3 22 API calls 96002->96003 96003->96004 96012 34fb21 51 API calls 96004->96012 96006 39dbdc GetFileAttributesW 96005->96006 96007 39dc06 96005->96007 96006->96007 96008 39dbe8 FindFirstFileW 96006->96008 96007->95921 96008->96007 96009 39dbf9 FindClose 96008->96009 96009->96007 96010->95990 96011->95990 96012->95996 96013->95991 96015 3bb01d ___scrt_fastfail 96014->96015 96016 3bb058 96015->96016 96017 3bb094 96015->96017 96109 33b567 96016->96109 96020 33b567 39 API calls 96017->96020 96022 3bb08b 96017->96022 96019 3bb0ed 96023 337510 53 API calls 96019->96023 96024 3bb0a5 96020->96024 96021 3bb063 96021->96022 96025 33b567 39 API calls 96021->96025 96022->96019 96026 33b567 39 API calls 96022->96026 96027 3bb10b 96023->96027 96028 33b567 39 API calls 96024->96028 96029 3bb078 96025->96029 96026->96019 96105 337620 96027->96105 96028->96022 96031 33b567 39 API calls 96029->96031 96031->96022 96032 3bb115 96033 3bb1d8 96032->96033 96034 3bb11f 96032->96034 96035 3bb20a GetCurrentDirectoryW 96033->96035 96037 337510 53 API calls 96033->96037 96036 337510 53 API calls 96034->96036 96038 34fe0b 22 API calls 96035->96038 96039 3bb130 96036->96039 96040 3bb1ef 96037->96040 96041 3bb22f GetCurrentDirectoryW 96038->96041 96042 337620 22 API calls 96039->96042 96043 337620 22 API calls 96040->96043 96044 3bb23c 96041->96044 96045 3bb13a 96042->96045 96047 3bb1f9 _wcslen 96043->96047 96048 3bb275 96044->96048 96114 339c6e 22 API calls 96044->96114 96046 337510 53 API calls 96045->96046 96049 3bb14b 96046->96049 96047->96035 96047->96048 96056 3bb28b 96048->96056 96057 3bb287 96048->96057 96051 337620 22 API calls 96049->96051 96053 3bb155 96051->96053 96052 3bb255 96115 339c6e 22 API calls 96052->96115 96055 337510 53 API calls 96053->96055 96059 3bb166 96055->96059 96117 3a07c0 10 API calls 96056->96117 96061 3bb39a CreateProcessW 96057->96061 96062 3bb2f8 96057->96062 96058 3bb265 96116 339c6e 22 API calls 96058->96116 96064 337620 22 API calls 96059->96064 96104 3bb32f _wcslen 96061->96104 96120 3911c8 39 API calls 96062->96120 96067 3bb170 96064->96067 96065 3bb294 96118 3a06e6 10 API calls 96065->96118 96070 3bb1a6 GetSystemDirectoryW 96067->96070 96076 337510 53 API calls 96067->96076 96069 3bb2fd 96074 3bb32a 96069->96074 96075 3bb323 96069->96075 96073 34fe0b 22 API calls 96070->96073 96071 3bb2aa 96119 3a05a7 8 API calls 96071->96119 96078 3bb1cb GetSystemDirectoryW 96073->96078 96122 3914ce 6 API calls 96074->96122 96121 391201 128 API calls 2 library calls 96075->96121 96080 3bb187 96076->96080 96077 3bb2d0 96077->96057 96078->96044 96083 337620 22 API calls 96080->96083 96082 3bb328 96082->96104 96086 3bb191 _wcslen 96083->96086 96084 3bb42f CloseHandle 96087 3bb43f 96084->96087 96097 3bb49a 96084->96097 96085 3bb3d6 GetLastError 96096 3bb41a 96085->96096 96086->96044 96086->96070 96088 3bb451 96087->96088 96089 3bb446 CloseHandle 96087->96089 96091 3bb458 CloseHandle 96088->96091 96092 3bb463 96088->96092 96089->96088 96091->96092 96094 3bb46a CloseHandle 96092->96094 96095 3bb475 96092->96095 96093 3bb4a6 96093->96096 96094->96095 96123 3a09d9 34 API calls 96095->96123 96125 3a0175 6 API calls 96096->96125 96097->96093 96100 3bb4d2 CloseHandle 96097->96100 96100->96096 96101 3bab79 96101->95879 96102 3bb486 96124 3bb536 25 API calls 96102->96124 96104->96084 96104->96085 96106 33762a _wcslen 96105->96106 96107 34fe0b 22 API calls 96106->96107 96108 33763f 96107->96108 96108->96032 96110 33b578 96109->96110 96111 33b57f 96109->96111 96110->96111 96126 3562d1 39 API calls _strftime 96110->96126 96111->96021 96113 33b5c2 96113->96021 96114->96052 96115->96058 96116->96048 96117->96065 96118->96071 96119->96077 96120->96069 96121->96082 96122->96104 96123->96102 96124->96097 96125->96101 96126->96113 96133 3c2ad8 96127->96133 96130 3c2b51 timeGetTime 96130->95927 96131 33b567 39 API calls 96131->96130 96134 33aceb 23 API calls 96133->96134 96135 3c2af3 96134->96135 96136 3c2b1d 96135->96136 96137 3c2aff 96135->96137 96139 336b57 22 API calls 96136->96139 96138 337510 53 API calls 96137->96138 96140 3c2b0c 96138->96140 96142 3c2b1b 96139->96142 96140->96142 96143 33a8c7 22 API calls __fread_nolock 96140->96143 96142->96130 96142->96131 96143->96142 96154 39def7 96144->96154 96146 39d529 Process32NextW 96147 39d5db CloseHandle 96146->96147 96153 39d522 96146->96153 96147->95934 96148 33a961 22 API calls 96148->96153 96149 339cb3 22 API calls 96149->96153 96153->96146 96153->96147 96153->96148 96153->96149 96160 33525f 22 API calls 96153->96160 96161 336350 22 API calls 96153->96161 96162 34ce60 41 API calls 96153->96162 96155 39df02 96154->96155 96156 39df19 96155->96156 96159 39df1f 96155->96159 96163 3563b2 GetStringTypeW _strftime 96155->96163 96164 3562fb 39 API calls _strftime 96156->96164 96159->96153 96160->96153 96161->96153 96162->96153 96163->96155 96164->96159 96165->95960 96166->95960 96167->95957 96168->95957 96169->95957 96170->95957 96171->95944 96172->95957 96173->95899 96174->95899 96175 383f75 96186 34ceb1 96175->96186 96177 383f8b 96179 384006 96177->96179 96253 34e300 23 API calls 96177->96253 96195 33bf40 96179->96195 96182 384052 96184 384a88 96182->96184 96255 3a359c 82 API calls __wsopen_s 96182->96255 96183 383fe6 96183->96182 96254 3a1abf 22 API calls 96183->96254 96187 34ced2 96186->96187 96188 34cebf 96186->96188 96190 34cf05 96187->96190 96191 34ced7 96187->96191 96189 33aceb 23 API calls 96188->96189 96194 34cec9 96189->96194 96193 33aceb 23 API calls 96190->96193 96192 34fddb 22 API calls 96191->96192 96192->96194 96193->96194 96194->96177 96256 33adf0 96195->96256 96197 33bf9d 96198 33bfa9 96197->96198 96199 3804b6 96197->96199 96201 3804c6 96198->96201 96202 33c01e 96198->96202 96274 3a359c 82 API calls __wsopen_s 96199->96274 96275 3a359c 82 API calls __wsopen_s 96201->96275 96261 33ac91 96202->96261 96206 397120 22 API calls 96221 33c039 __fread_nolock messages 96206->96221 96207 33c7da 96210 34fe0b 22 API calls 96207->96210 96219 33c808 __fread_nolock 96210->96219 96212 3804f5 96215 38055a 96212->96215 96276 34d217 349 API calls 96212->96276 96234 33c603 96215->96234 96277 3a359c 82 API calls __wsopen_s 96215->96277 96216 33ec40 349 API calls 96216->96221 96217 34fe0b 22 API calls 96224 33c350 __fread_nolock messages 96217->96224 96218 33af8a 22 API calls 96218->96221 96219->96217 96220 38091a 96286 3a3209 23 API calls 96220->96286 96221->96206 96221->96207 96221->96212 96221->96215 96221->96216 96221->96218 96221->96219 96221->96220 96225 3808a5 96221->96225 96228 380591 96221->96228 96230 3808f6 96221->96230 96221->96234 96236 33bbe0 40 API calls 96221->96236 96237 33aceb 23 API calls 96221->96237 96238 33c237 96221->96238 96242 34fddb 22 API calls 96221->96242 96247 3809bf 96221->96247 96251 34fe0b 22 API calls 96221->96251 96265 33ad81 96221->96265 96279 397099 22 API calls __fread_nolock 96221->96279 96280 3b5745 54 API calls _wcslen 96221->96280 96281 34aa42 22 API calls messages 96221->96281 96282 39f05c 40 API calls 96221->96282 96283 33a993 41 API calls 96221->96283 96252 33c3ac 96224->96252 96273 34ce17 22 API calls messages 96224->96273 96226 33ec40 349 API calls 96225->96226 96229 3808cf 96226->96229 96278 3a359c 82 API calls __wsopen_s 96228->96278 96229->96234 96284 33a81b 41 API calls 96229->96284 96285 3a359c 82 API calls __wsopen_s 96230->96285 96234->96182 96236->96221 96237->96221 96239 33c253 96238->96239 96287 33a8c7 22 API calls __fread_nolock 96238->96287 96241 380976 96239->96241 96245 33c297 messages 96239->96245 96244 33aceb 23 API calls 96241->96244 96242->96221 96244->96247 96246 33aceb 23 API calls 96245->96246 96245->96247 96248 33c335 96246->96248 96247->96234 96288 3a359c 82 API calls __wsopen_s 96247->96288 96248->96247 96249 33c342 96248->96249 96272 33a704 22 API calls messages 96249->96272 96251->96221 96252->96182 96253->96183 96254->96179 96255->96184 96257 33ae01 96256->96257 96260 33ae1c messages 96256->96260 96258 33aec9 22 API calls 96257->96258 96259 33ae09 CharUpperBuffW 96258->96259 96259->96260 96260->96197 96262 33acae 96261->96262 96263 33acd1 96262->96263 96289 3a359c 82 API calls __wsopen_s 96262->96289 96263->96221 96266 33ad92 96265->96266 96267 37fadb 96265->96267 96268 34fddb 22 API calls 96266->96268 96269 33ad99 96268->96269 96290 33adcd 96269->96290 96272->96224 96273->96224 96274->96201 96275->96234 96276->96215 96277->96234 96278->96234 96279->96221 96280->96221 96281->96221 96282->96221 96283->96221 96284->96230 96285->96234 96286->96238 96287->96239 96288->96234 96289->96263 96294 33addd 96290->96294 96291 33adb6 96291->96221 96292 34fddb 22 API calls 96292->96294 96293 33a961 22 API calls 96293->96294 96294->96291 96294->96292 96294->96293 96296 33adcd 22 API calls 96294->96296 96297 33a8c7 22 API calls __fread_nolock 96294->96297 96296->96294 96297->96294 96298 3503fb 96299 350407 ___scrt_is_nonwritable_in_current_image 96298->96299 96327 34feb1 96299->96327 96301 35040e 96302 350561 96301->96302 96305 350438 96301->96305 96357 35083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 96302->96357 96304 350568 96350 354e52 96304->96350 96316 350477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 96305->96316 96338 36247d 96305->96338 96312 350457 96314 3504d8 96346 350959 96314->96346 96316->96314 96353 354e1a 38 API calls 3 library calls 96316->96353 96318 3504de 96319 3504f3 96318->96319 96354 350992 GetModuleHandleW 96319->96354 96321 3504fa 96321->96304 96322 3504fe 96321->96322 96323 350507 96322->96323 96355 354df5 28 API calls _abort 96322->96355 96356 350040 13 API calls 2 library calls 96323->96356 96326 35050f 96326->96312 96328 34feba 96327->96328 96359 350698 IsProcessorFeaturePresent 96328->96359 96330 34fec6 96360 352c94 10 API calls 3 library calls 96330->96360 96332 34fecb 96333 34fecf 96332->96333 96361 362317 96332->96361 96333->96301 96336 34fee6 96336->96301 96341 362494 96338->96341 96339 350a8c CatchGuardHandler 5 API calls 96340 350451 96339->96340 96340->96312 96342 362421 96340->96342 96341->96339 96343 362450 96342->96343 96344 350a8c CatchGuardHandler 5 API calls 96343->96344 96345 362479 96344->96345 96345->96316 96420 352340 96346->96420 96349 35097f 96349->96318 96422 354bcf 96350->96422 96353->96314 96354->96321 96355->96323 96356->96326 96357->96304 96359->96330 96360->96332 96365 36d1f6 96361->96365 96364 352cbd 8 API calls 3 library calls 96364->96333 96366 36d213 96365->96366 96369 36d20f 96365->96369 96366->96369 96371 364bfb 96366->96371 96368 34fed8 96368->96336 96368->96364 96383 350a8c 96369->96383 96372 364c07 ___scrt_is_nonwritable_in_current_image 96371->96372 96390 362f5e EnterCriticalSection 96372->96390 96374 364c0e 96391 3650af 96374->96391 96376 364c1d 96377 364c2c 96376->96377 96404 364a8f 29 API calls 96376->96404 96406 364c48 LeaveCriticalSection _abort 96377->96406 96380 364c27 96405 364b45 GetStdHandle GetFileType 96380->96405 96381 364c3d __fread_nolock 96381->96366 96384 350a95 96383->96384 96385 350a97 IsProcessorFeaturePresent 96383->96385 96384->96368 96387 350c5d 96385->96387 96419 350c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96387->96419 96389 350d40 96389->96368 96390->96374 96392 3650bb ___scrt_is_nonwritable_in_current_image 96391->96392 96393 3650df 96392->96393 96394 3650c8 96392->96394 96407 362f5e EnterCriticalSection 96393->96407 96415 35f2d9 20 API calls __dosmaperr 96394->96415 96397 3650cd 96416 3627ec 26 API calls pre_c_initialization 96397->96416 96399 365117 96417 36513e LeaveCriticalSection _abort 96399->96417 96400 3650d7 __fread_nolock 96400->96376 96401 3650eb 96401->96399 96408 365000 96401->96408 96404->96380 96405->96377 96406->96381 96407->96401 96409 364c7d __dosmaperr 20 API calls 96408->96409 96412 365012 96409->96412 96410 36501f 96411 3629c8 _free 20 API calls 96410->96411 96413 365071 96411->96413 96412->96410 96418 363405 11 API calls 2 library calls 96412->96418 96413->96401 96415->96397 96416->96400 96417->96400 96418->96412 96419->96389 96421 35096c GetStartupInfoW 96420->96421 96421->96349 96423 354bdb pair 96422->96423 96424 354bf4 96423->96424 96425 354be2 96423->96425 96446 362f5e EnterCriticalSection 96424->96446 96461 354d29 GetModuleHandleW 96425->96461 96428 354be7 96428->96424 96462 354d6d GetModuleHandleExW 96428->96462 96429 354c99 96450 354cd9 96429->96450 96433 354c70 96438 354c88 96433->96438 96442 362421 _abort 5 API calls 96433->96442 96435 354cb6 96453 354ce8 96435->96453 96436 354ce2 96470 371d29 5 API calls CatchGuardHandler 96436->96470 96437 354bfb 96437->96429 96437->96433 96447 3621a8 96437->96447 96443 362421 _abort 5 API calls 96438->96443 96442->96438 96443->96429 96446->96437 96471 361ee1 96447->96471 96490 362fa6 LeaveCriticalSection 96450->96490 96452 354cb2 96452->96435 96452->96436 96491 36360c 96453->96491 96456 354d16 96458 354d6d _abort 8 API calls 96456->96458 96457 354cf6 GetPEB 96457->96456 96459 354d06 GetCurrentProcess TerminateProcess 96457->96459 96460 354d1e ExitProcess 96458->96460 96459->96456 96461->96428 96463 354d97 GetProcAddress 96462->96463 96464 354dba 96462->96464 96467 354dac 96463->96467 96465 354dc0 FreeLibrary 96464->96465 96466 354dc9 96464->96466 96465->96466 96468 350a8c CatchGuardHandler 5 API calls 96466->96468 96467->96464 96469 354bf3 96468->96469 96469->96424 96474 361e90 96471->96474 96473 361f05 96473->96433 96475 361e9c ___scrt_is_nonwritable_in_current_image 96474->96475 96482 362f5e EnterCriticalSection 96475->96482 96477 361eaa 96483 361f31 96477->96483 96481 361ec8 __fread_nolock 96481->96473 96482->96477 96484 361f51 96483->96484 96485 361f59 96483->96485 96486 350a8c CatchGuardHandler 5 API calls 96484->96486 96485->96484 96488 3629c8 _free 20 API calls 96485->96488 96487 361eb7 96486->96487 96489 361ed5 LeaveCriticalSection _abort 96487->96489 96488->96484 96489->96481 96490->96452 96492 363631 96491->96492 96494 363627 96491->96494 96498 362fd7 5 API calls 2 library calls 96492->96498 96495 350a8c CatchGuardHandler 5 API calls 96494->96495 96496 354cf2 96495->96496 96496->96456 96496->96457 96497 363648 96497->96494 96498->96497 96499 33defc 96502 331d6f 96499->96502 96501 33df07 96503 331d8c 96502->96503 96511 331f6f 96503->96511 96505 331da6 96506 372759 96505->96506 96508 331e36 96505->96508 96509 331dc2 96505->96509 96515 3a359c 82 API calls __wsopen_s 96506->96515 96508->96501 96509->96508 96514 33289a 23 API calls 96509->96514 96512 33ec40 349 API calls 96511->96512 96513 331f98 96512->96513 96513->96505 96514->96508 96515->96508 96516 332de3 96517 332df0 __wsopen_s 96516->96517 96518 332e09 96517->96518 96519 372c2b ___scrt_fastfail 96517->96519 96520 333aa2 23 API calls 96518->96520 96521 372c47 GetOpenFileNameW 96519->96521 96522 332e12 96520->96522 96523 372c96 96521->96523 96532 332da5 96522->96532 96525 336b57 22 API calls 96523->96525 96527 372cab 96525->96527 96527->96527 96529 332e27 96550 3344a8 96529->96550 96533 371f50 __wsopen_s 96532->96533 96534 332db2 GetLongPathNameW 96533->96534 96535 336b57 22 API calls 96534->96535 96536 332dda 96535->96536 96537 333598 96536->96537 96538 33a961 22 API calls 96537->96538 96539 3335aa 96538->96539 96540 333aa2 23 API calls 96539->96540 96541 3335b5 96540->96541 96542 3335c0 96541->96542 96543 3732eb 96541->96543 96544 33515f 22 API calls 96542->96544 96548 37330d 96543->96548 96585 34ce60 41 API calls 96543->96585 96546 3335cc 96544->96546 96579 3335f3 96546->96579 96549 3335df 96549->96529 96551 334ecb 94 API calls 96550->96551 96552 3344cd 96551->96552 96553 373833 96552->96553 96555 334ecb 94 API calls 96552->96555 96554 3a2cf9 80 API calls 96553->96554 96556 373848 96554->96556 96557 3344e1 96555->96557 96558 37384c 96556->96558 96559 373869 96556->96559 96557->96553 96560 3344e9 96557->96560 96561 334f39 68 API calls 96558->96561 96562 34fe0b 22 API calls 96559->96562 96563 373854 96560->96563 96564 3344f5 96560->96564 96561->96563 96578 3738ae 96562->96578 96587 39da5a 82 API calls 96563->96587 96586 33940c 136 API calls 2 library calls 96564->96586 96567 373862 96567->96559 96568 332e31 96569 334f39 68 API calls 96573 373a5f 96569->96573 96573->96569 96593 39989b 82 API calls __wsopen_s 96573->96593 96575 339cb3 22 API calls 96575->96578 96578->96573 96578->96575 96588 39967e 22 API calls __fread_nolock 96578->96588 96589 3995ad 42 API calls _wcslen 96578->96589 96590 3a0b5a 22 API calls 96578->96590 96591 33a4a1 22 API calls __fread_nolock 96578->96591 96592 333ff7 22 API calls 96578->96592 96581 333605 96579->96581 96584 333624 __fread_nolock 96579->96584 96580 34fddb 22 API calls 96582 33363b 96580->96582 96583 34fe0b 22 API calls 96581->96583 96582->96549 96583->96584 96584->96580 96585->96543 96586->96568 96587->96567 96588->96578 96589->96578 96590->96578 96591->96578 96592->96578 96593->96573 96594 372ba5 96595 332b25 96594->96595 96596 372baf 96594->96596 96622 332b83 7 API calls 96595->96622 96598 333a5a 24 API calls 96596->96598 96600 372bb8 96598->96600 96602 339cb3 22 API calls 96600->96602 96604 372bc6 96602->96604 96603 332b2f 96608 333837 49 API calls 96603->96608 96613 332b44 96603->96613 96605 372bf5 96604->96605 96606 372bce 96604->96606 96607 3333c6 22 API calls 96605->96607 96609 3333c6 22 API calls 96606->96609 96610 372bf1 GetForegroundWindow ShellExecuteW 96607->96610 96608->96613 96611 372bd9 96609->96611 96617 372c26 96610->96617 96626 336350 22 API calls 96611->96626 96614 332b5f 96613->96614 96618 3330f2 Shell_NotifyIconW 96613->96618 96620 332b66 SetCurrentDirectoryW 96614->96620 96616 372be7 96619 3333c6 22 API calls 96616->96619 96617->96614 96618->96614 96619->96610 96621 332b7a 96620->96621 96627 332cd4 7 API calls 96622->96627 96624 332b2a 96625 332c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 96624->96625 96625->96603 96626->96616 96627->96624 96628 368402 96633 3681be 96628->96633 96631 36842a 96634 3681ef try_get_first_available_module 96633->96634 96641 368338 96634->96641 96648 358e0b 40 API calls 2 library calls 96634->96648 96636 3683ee 96652 3627ec 26 API calls pre_c_initialization 96636->96652 96638 368343 96638->96631 96645 370984 96638->96645 96640 36838c 96640->96641 96649 358e0b 40 API calls 2 library calls 96640->96649 96641->96638 96651 35f2d9 20 API calls __dosmaperr 96641->96651 96643 3683ab 96643->96641 96650 358e0b 40 API calls 2 library calls 96643->96650 96653 370081 96645->96653 96647 37099f 96647->96631 96648->96640 96649->96643 96650->96641 96651->96636 96652->96638 96654 37008d ___scrt_is_nonwritable_in_current_image 96653->96654 96655 37009b 96654->96655 96658 3700d4 96654->96658 96711 35f2d9 20 API calls __dosmaperr 96655->96711 96657 3700a0 96712 3627ec 26 API calls pre_c_initialization 96657->96712 96664 37065b 96658->96664 96663 3700aa __fread_nolock 96663->96647 96714 37042f 96664->96714 96667 3706a6 96732 365221 96667->96732 96668 37068d 96746 35f2c6 20 API calls __dosmaperr 96668->96746 96671 3706ab 96673 3706b4 96671->96673 96674 3706cb 96671->96674 96672 370692 96747 35f2d9 20 API calls __dosmaperr 96672->96747 96748 35f2c6 20 API calls __dosmaperr 96673->96748 96745 37039a CreateFileW 96674->96745 96678 3700f8 96713 370121 LeaveCriticalSection __wsopen_s 96678->96713 96679 3706b9 96749 35f2d9 20 API calls __dosmaperr 96679->96749 96681 370781 GetFileType 96682 3707d3 96681->96682 96683 37078c GetLastError 96681->96683 96754 36516a 21 API calls 2 library calls 96682->96754 96752 35f2a3 20 API calls __dosmaperr 96683->96752 96684 370756 GetLastError 96751 35f2a3 20 API calls __dosmaperr 96684->96751 96685 370704 96685->96681 96685->96684 96750 37039a CreateFileW 96685->96750 96689 37079a CloseHandle 96689->96672 96692 3707c3 96689->96692 96691 370749 96691->96681 96691->96684 96753 35f2d9 20 API calls __dosmaperr 96692->96753 96693 3707f4 96695 370840 96693->96695 96755 3705ab 72 API calls 3 library calls 96693->96755 96700 37086d 96695->96700 96756 37014d 72 API calls 4 library calls 96695->96756 96696 3707c8 96696->96672 96699 370866 96699->96700 96701 37087e 96699->96701 96702 3686ae __wsopen_s 29 API calls 96700->96702 96701->96678 96703 3708fc CloseHandle 96701->96703 96702->96678 96757 37039a CreateFileW 96703->96757 96705 370927 96706 37095d 96705->96706 96707 370931 GetLastError 96705->96707 96706->96678 96758 35f2a3 20 API calls __dosmaperr 96707->96758 96709 37093d 96759 365333 21 API calls 2 library calls 96709->96759 96711->96657 96712->96663 96713->96663 96715 370450 96714->96715 96716 37046a 96714->96716 96715->96716 96767 35f2d9 20 API calls __dosmaperr 96715->96767 96760 3703bf 96716->96760 96719 37045f 96768 3627ec 26 API calls pre_c_initialization 96719->96768 96721 3704a2 96722 3704d1 96721->96722 96769 35f2d9 20 API calls __dosmaperr 96721->96769 96730 370524 96722->96730 96771 35d70d 26 API calls 2 library calls 96722->96771 96725 37051f 96727 37059e 96725->96727 96725->96730 96726 3704c6 96770 3627ec 26 API calls pre_c_initialization 96726->96770 96772 3627fc 11 API calls _abort 96727->96772 96730->96667 96730->96668 96731 3705aa 96733 36522d ___scrt_is_nonwritable_in_current_image 96732->96733 96775 362f5e EnterCriticalSection 96733->96775 96736 365259 96737 365000 __wsopen_s 21 API calls 96736->96737 96739 36525e 96737->96739 96738 365234 96738->96736 96741 3652c7 EnterCriticalSection 96738->96741 96743 36527b 96738->96743 96739->96743 96779 365147 EnterCriticalSection 96739->96779 96740 3652a4 __fread_nolock 96740->96671 96742 3652d4 LeaveCriticalSection 96741->96742 96741->96743 96742->96738 96776 36532a 96743->96776 96745->96685 96746->96672 96747->96678 96748->96679 96749->96672 96750->96691 96751->96672 96752->96689 96753->96696 96754->96693 96755->96695 96756->96699 96757->96705 96758->96709 96759->96706 96761 3703d7 96760->96761 96762 3703f2 96761->96762 96773 35f2d9 20 API calls __dosmaperr 96761->96773 96762->96721 96764 370416 96774 3627ec 26 API calls pre_c_initialization 96764->96774 96766 370421 96766->96721 96767->96719 96768->96716 96769->96726 96770->96722 96771->96725 96772->96731 96773->96764 96774->96766 96775->96738 96780 362fa6 LeaveCriticalSection 96776->96780 96778 365331 96778->96740 96779->96743 96780->96778 96781 372402 96784 331410 96781->96784 96785 33144f mciSendStringW 96784->96785 96786 3724b8 DestroyWindow 96784->96786 96787 3316c6 96785->96787 96788 33146b 96785->96788 96789 3724c4 96786->96789 96787->96788 96791 3316d5 UnregisterHotKey 96787->96791 96788->96789 96790 331479 96788->96790 96793 3724e2 FindClose 96789->96793 96797 372509 96789->96797 96799 3724d8 96789->96799 96817 33182e 96790->96817 96791->96787 96793->96789 96796 33148e 96800 37252d 96796->96800 96805 33149c 96796->96805 96798 37251c FreeLibrary 96797->96798 96797->96800 96798->96797 96799->96789 96823 336246 CloseHandle 96799->96823 96801 372541 VirtualFree 96800->96801 96808 331509 96800->96808 96801->96800 96802 3314f8 CoUninitialize 96802->96808 96803 331514 96807 331524 96803->96807 96804 372589 96810 372598 messages 96804->96810 96824 3a32eb 6 API calls messages 96804->96824 96805->96802 96821 331944 VirtualFreeEx CloseHandle 96807->96821 96808->96803 96808->96804 96813 372627 96810->96813 96825 3964d4 22 API calls messages 96810->96825 96812 33153a 96812->96810 96814 33161f 96812->96814 96813->96813 96814->96813 96822 331876 CloseHandle InternetCloseHandle InternetCloseHandle WaitForSingleObject 96814->96822 96816 3316c1 96819 33183b 96817->96819 96818 331480 96818->96796 96818->96797 96819->96818 96826 39702a 22 API calls 96819->96826 96821->96812 96822->96816 96823->96799 96824->96804 96825->96810 96826->96819 96827 331044 96832 3310f3 96827->96832 96829 33104a 96868 3500a3 29 API calls __onexit 96829->96868 96831 331054 96869 331398 96832->96869 96836 33116a 96837 33a961 22 API calls 96836->96837 96838 331174 96837->96838 96839 33a961 22 API calls 96838->96839 96840 33117e 96839->96840 96841 33a961 22 API calls 96840->96841 96842 331188 96841->96842 96843 33a961 22 API calls 96842->96843 96844 3311c6 96843->96844 96845 33a961 22 API calls 96844->96845 96846 331292 96845->96846 96879 33171c 96846->96879 96850 3312c4 96851 33a961 22 API calls 96850->96851 96852 3312ce 96851->96852 96853 341940 9 API calls 96852->96853 96854 3312f9 96853->96854 96900 331aab 96854->96900 96856 331315 96857 331325 GetStdHandle 96856->96857 96858 372485 96857->96858 96859 33137a 96857->96859 96858->96859 96860 37248e 96858->96860 96863 331387 OleInitialize 96859->96863 96861 34fddb 22 API calls 96860->96861 96862 372495 96861->96862 96907 3a011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 96862->96907 96863->96829 96865 37249e 96908 3a0944 CreateThread 96865->96908 96867 3724aa CloseHandle 96867->96859 96868->96831 96909 3313f1 96869->96909 96872 3313f1 22 API calls 96873 3313d0 96872->96873 96874 33a961 22 API calls 96873->96874 96875 3313dc 96874->96875 96876 336b57 22 API calls 96875->96876 96877 331129 96876->96877 96878 331bc3 6 API calls 96877->96878 96878->96836 96880 33a961 22 API calls 96879->96880 96881 33172c 96880->96881 96882 33a961 22 API calls 96881->96882 96883 331734 96882->96883 96884 33a961 22 API calls 96883->96884 96885 33174f 96884->96885 96886 34fddb 22 API calls 96885->96886 96887 33129c 96886->96887 96888 331b4a 96887->96888 96889 331b58 96888->96889 96890 33a961 22 API calls 96889->96890 96891 331b63 96890->96891 96892 33a961 22 API calls 96891->96892 96893 331b6e 96892->96893 96894 33a961 22 API calls 96893->96894 96895 331b79 96894->96895 96896 33a961 22 API calls 96895->96896 96897 331b84 96896->96897 96898 34fddb 22 API calls 96897->96898 96899 331b96 RegisterWindowMessageW 96898->96899 96899->96850 96901 331abb 96900->96901 96902 37272d 96900->96902 96903 34fddb 22 API calls 96901->96903 96916 3a3209 23 API calls 96902->96916 96905 331ac3 96903->96905 96905->96856 96906 372738 96907->96865 96908->96867 96917 3a092a 28 API calls 96908->96917 96910 33a961 22 API calls 96909->96910 96911 3313fc 96910->96911 96912 33a961 22 API calls 96911->96912 96913 331404 96912->96913 96914 33a961 22 API calls 96913->96914 96915 3313c6 96914->96915 96915->96872 96916->96906 96918 382a00 96944 33d7b0 messages 96918->96944 96919 33db11 PeekMessageW 96919->96944 96920 33d807 GetInputState 96920->96919 96920->96944 96921 381cbe TranslateAcceleratorW 96921->96944 96923 33db8f PeekMessageW 96923->96944 96924 33da04 timeGetTime 96924->96944 96925 33db73 TranslateMessage DispatchMessageW 96925->96923 96926 33dbaf Sleep 96926->96944 96927 382b74 Sleep 96939 382b85 96927->96939 96929 381dda timeGetTime 96974 34e300 23 API calls 96929->96974 96931 39d4dc 47 API calls 96931->96939 96933 382c0b GetExitCodeProcess 96935 382c21 WaitForSingleObject 96933->96935 96936 382c37 CloseHandle 96933->96936 96935->96936 96935->96944 96936->96939 96937 3c29bf GetForegroundWindow 96937->96944 96938 33d9d5 96939->96931 96939->96933 96939->96938 96940 382ca9 Sleep 96939->96940 96939->96944 96978 34e551 timeGetTime 96939->96978 96940->96944 96944->96919 96944->96920 96944->96921 96944->96923 96944->96924 96944->96925 96944->96926 96944->96927 96944->96929 96944->96937 96944->96938 96946 33ec40 349 API calls 96944->96946 96947 341310 349 API calls 96944->96947 96948 33bf40 349 API calls 96944->96948 96950 33dd50 96944->96950 96957 34edf6 96944->96957 96962 39e97b 96944->96962 96972 33dfd0 349 API calls 3 library calls 96944->96972 96973 34e551 timeGetTime 96944->96973 96975 3a3a2a 23 API calls 96944->96975 96976 3a359c 82 API calls __wsopen_s 96944->96976 96977 3b5658 23 API calls 96944->96977 96946->96944 96947->96944 96948->96944 96951 33dd83 96950->96951 96952 33dd6f 96950->96952 97011 3a359c 82 API calls __wsopen_s 96951->97011 96979 33d260 96952->96979 96955 33dd7a 96955->96944 96956 382f75 96956->96956 96958 34ee09 96957->96958 96960 34ee12 96957->96960 96958->96944 96959 34ee36 IsDialogMessageW 96959->96958 96959->96960 96960->96958 96960->96959 96961 38efaf GetClassLongW 96960->96961 96961->96959 96961->96960 96963 39e9f9 96962->96963 96964 39e988 96962->96964 96963->96944 96965 39e98a Sleep 96964->96965 96967 39e993 QueryPerformanceCounter 96964->96967 96965->96963 96967->96965 96968 39e9a1 QueryPerformanceFrequency 96967->96968 96969 39e9ab Sleep QueryPerformanceCounter 96968->96969 96970 39e9ec 96969->96970 96970->96969 96971 39e9f0 96970->96971 96971->96963 96972->96944 96973->96944 96974->96944 96975->96944 96976->96944 96977->96944 96978->96939 96980 33ec40 349 API calls 96979->96980 96996 33d29d 96980->96996 96981 33d30b messages 96981->96955 96982 381bc4 97017 3a359c 82 API calls __wsopen_s 96982->97017 96984 33d6d5 96984->96981 96994 34fe0b 22 API calls 96984->96994 96985 33d3c3 96985->96984 96986 33d3ce 96985->96986 96988 34fddb 22 API calls 96986->96988 96987 33d5ff 96989 33d614 96987->96989 96990 381bb5 96987->96990 96999 33d3d5 __fread_nolock 96988->96999 96992 34fddb 22 API calls 96989->96992 97016 3b5705 23 API calls 96990->97016 96991 33d4b8 96995 34fe0b 22 API calls 96991->96995 97003 33d46a 96992->97003 96994->96999 97006 33d429 __fread_nolock messages 96995->97006 96996->96981 96996->96982 96996->96984 96996->96985 96996->96991 97000 34fddb 22 API calls 96996->97000 96996->97006 96997 34fddb 22 API calls 96998 33d3f6 96997->96998 96998->97006 97012 33bec0 349 API calls 96998->97012 96999->96997 96999->96998 97000->96996 97002 381ba4 97015 3a359c 82 API calls __wsopen_s 97002->97015 97003->96955 97005 331f6f 349 API calls 97005->97006 97006->96987 97006->97002 97006->97003 97006->97005 97007 381b7f 97006->97007 97009 381b5d 97006->97009 97014 3a359c 82 API calls __wsopen_s 97007->97014 97013 3a359c 82 API calls __wsopen_s 97009->97013 97011->96956 97012->97006 97013->97003 97014->97003 97015->97003 97016->96982 97017->96981 97018 331cad SystemParametersInfoW

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 389 3342de-33434d call 33a961 GetVersionExW call 336b57 394 373617-37362a 389->394 395 334353 389->395 397 37362b-37362f 394->397 396 334355-334357 395->396 398 373656 396->398 399 33435d-3343bc call 3393b2 call 3337a0 396->399 400 373632-37363e 397->400 401 373631 397->401 404 37365d-373660 398->404 417 3343c2-3343c4 399->417 418 3737df-3737e6 399->418 400->397 403 373640-373642 400->403 401->400 403->396 406 373648-37364f 403->406 407 373666-3736a8 404->407 408 33441b-334435 GetCurrentProcess IsWow64Process 404->408 406->394 410 373651 406->410 407->408 411 3736ae-3736b1 407->411 413 334437 408->413 414 334494-33449a 408->414 410->398 415 3736b3-3736bd 411->415 416 3736db-3736e5 411->416 419 33443d-334449 413->419 414->419 420 3736bf-3736c5 415->420 421 3736ca-3736d6 415->421 423 3736e7-3736f3 416->423 424 3736f8-373702 416->424 417->404 422 3343ca-3343dd 417->422 425 373806-373809 418->425 426 3737e8 418->426 427 373824-373828 GetSystemInfo 419->427 428 33444f-33445e LoadLibraryA 419->428 420->408 421->408 431 3343e3-3343e5 422->431 432 373726-37372f 422->432 423->408 434 373715-373721 424->434 435 373704-373710 424->435 436 3737f4-3737fc 425->436 437 37380b-37381a 425->437 433 3737ee 426->433 429 334460-33446e GetProcAddress 428->429 430 33449c-3344a6 GetSystemInfo 428->430 429->430 438 334470-334474 GetNativeSystemInfo 429->438 439 334476-334478 430->439 440 3343eb-3343ee 431->440 441 37374d-373762 431->441 442 373731-373737 432->442 443 37373c-373748 432->443 433->436 434->408 435->408 436->425 437->433 444 37381c-373822 437->444 438->439 447 334481-334493 439->447 448 33447a-33447b FreeLibrary 439->448 449 373791-373794 440->449 450 3343f4-33440f 440->450 445 373764-37376a 441->445 446 37376f-37377b 441->446 442->408 443->408 444->436 445->408 446->408 448->447 449->408 451 37379a-3737c1 449->451 452 334415 450->452 453 373780-37378c 450->453 454 3737c3-3737c9 451->454 455 3737ce-3737da 451->455 452->408 453->408 454->408 455->408
                                                          APIs
                                                          • GetVersionExW.KERNEL32(?), ref: 0033430D
                                                            • Part of subcall function 00336B57: _wcslen.LIBCMT ref: 00336B6A
                                                          • GetCurrentProcess.KERNEL32(?,003CCB64,00000000,?,?), ref: 00334422
                                                          • IsWow64Process.KERNEL32(00000000,?,?), ref: 00334429
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00334454
                                                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00334466
                                                          • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00334474
                                                          • FreeLibrary.KERNEL32(00000000,?,?), ref: 0033447B
                                                          • GetSystemInfo.KERNEL32(?,?,?), ref: 003344A0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                          • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                          • API String ID: 3290436268-3101561225
                                                          • Opcode ID: 4d0d03470150862beeac6b7e1cf87356d5eab0abcfba59b1b0ab6dd7f884f421
                                                          • Instruction ID: 6330e2413d45885af5e8023fbe68d421b5665a6b92e2d8e15fde8dc79b87d354
                                                          • Opcode Fuzzy Hash: 4d0d03470150862beeac6b7e1cf87356d5eab0abcfba59b1b0ab6dd7f884f421
                                                          • Instruction Fuzzy Hash: 5FA1B87192A2C0DFE727C76A7EC15957FE87B26300F0894B9E885F3A32D2345914DB29

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 793 3342a2-3342ba CreateStreamOnHGlobal 794 3342da-3342dd 793->794 795 3342bc-3342d3 FindResourceExW 793->795 796 3342d9 795->796 797 3735ba-3735c9 LoadResource 795->797 796->794 797->796 798 3735cf-3735dd SizeofResource 797->798 798->796 799 3735e3-3735ee LockResource 798->799 799->796 800 3735f4-373612 799->800 800->796
                                                          APIs
                                                          • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,003350AA,?,?,00000000,00000000), ref: 003342B2
                                                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,003350AA,?,?,00000000,00000000), ref: 003342C9
                                                          • LoadResource.KERNEL32(?,00000000,?,?,003350AA,?,?,00000000,00000000,?,?,?,?,?,?,00334F20), ref: 003735BE
                                                          • SizeofResource.KERNEL32(?,00000000,?,?,003350AA,?,?,00000000,00000000,?,?,?,?,?,?,00334F20), ref: 003735D3
                                                          • LockResource.KERNEL32(003350AA,?,?,003350AA,?,?,00000000,00000000,?,?,?,?,?,?,00334F20,?), ref: 003735E6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                          • String ID: SCRIPT
                                                          • API String ID: 3051347437-3967369404
                                                          • Opcode ID: 66416d8bd0581f03bdee432686227283083aff62fb32698c9a84c54625863c25
                                                          • Instruction ID: 3ef04f97af142eeb93259d9b2add555444f35f51f00ca5425217e8decba28034
                                                          • Opcode Fuzzy Hash: 66416d8bd0581f03bdee432686227283083aff62fb32698c9a84c54625863c25
                                                          • Instruction Fuzzy Hash: FF115A70200700AFDB228BA6DC88F677BBDEBC6B51F158969F416D6650DB71EC008B20

                                                          Control-flow Graph

                                                          APIs
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00332B6B
                                                            • Part of subcall function 00333A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00401418,?,00332E7F,?,?,?,00000000), ref: 00333A78
                                                            • Part of subcall function 00339CB3: _wcslen.LIBCMT ref: 00339CBD
                                                          • GetForegroundWindow.USER32(runas,?,?,?,?,?,003F2224), ref: 00372C10
                                                          • ShellExecuteW.SHELL32(00000000,?,?,003F2224), ref: 00372C17
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                          • String ID: runas
                                                          • API String ID: 448630720-4000483414
                                                          • Opcode ID: f15f4a8123ef5e50f07f2dd010312e242f5ac2759cb803dc2098ad6dc5bfd555
                                                          • Instruction ID: a3c28b5b15a01c791280222b21edfa5fd349a1956df03e86cc24d857c66d3143
                                                          • Opcode Fuzzy Hash: f15f4a8123ef5e50f07f2dd010312e242f5ac2759cb803dc2098ad6dc5bfd555
                                                          • Instruction Fuzzy Hash: 50118131208345AAC717FF60D8D2ABFB7A89B91351F44942DF1865B0B2CF759A49C712
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 0039D501
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 0039D50F
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 0039D52F
                                                          • CloseHandle.KERNELBASE(00000000), ref: 0039D5DC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                          • String ID:
                                                          • API String ID: 420147892-0
                                                          • Opcode ID: 2958f66433327893670e947a1f5900f4dda3f20c383c09ce3cb3dd5908d72421
                                                          • Instruction ID: c0eec102c60e0781f6519c89cc481415bd8f4bdffa4fb902937f28755496a902
                                                          • Opcode Fuzzy Hash: 2958f66433327893670e947a1f5900f4dda3f20c383c09ce3cb3dd5908d72421
                                                          • Instruction Fuzzy Hash: 133193711083009FD702EF54C882AAFBBE8EF99354F14092DF5858A1A1EB71A949CB92
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,00375222), ref: 0039DBCE
                                                          • GetFileAttributesW.KERNELBASE(?), ref: 0039DBDD
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 0039DBEE
                                                          • FindClose.KERNEL32(00000000), ref: 0039DBFA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: FileFind$AttributesCloseFirstlstrlen
                                                          • String ID:
                                                          • API String ID: 2695905019-0
                                                          • Opcode ID: 38ae7f8485859a12ff871625180a61c1c8502668702c6c87eccabd0f816d2e6a
                                                          • Instruction ID: 5b66ef17c9aa3a1d7ebeb23661e918b28b261a40e82eddf5222d95b36d712c03
                                                          • Opcode Fuzzy Hash: 38ae7f8485859a12ff871625180a61c1c8502668702c6c87eccabd0f816d2e6a
                                                          • Instruction Fuzzy Hash: 9BF0A03082091057CA226B78EC0E8AA776C9E01334F144B02F83AC20E0EBB069558A95
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(003628E9,?,00354CBE,003628E9,003F88B8,0000000C,00354E15,003628E9,00000002,00000000,?,003628E9), ref: 00354D09
                                                          • TerminateProcess.KERNEL32(00000000,?,00354CBE,003628E9,003F88B8,0000000C,00354E15,003628E9,00000002,00000000,?,003628E9), ref: 00354D10
                                                          • ExitProcess.KERNEL32 ref: 00354D22
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$CurrentExitTerminate
                                                          • String ID:
                                                          • API String ID: 1703294689-0
                                                          • Opcode ID: e59e2c50860c224cd867c0f92e482a666c24c48e702f37a6363ca17f5db2ee5f
                                                          • Instruction ID: 0765d98dee9a788d01b1a8da1390804827760c0da87ace476efdf78f757a6b39
                                                          • Opcode Fuzzy Hash: e59e2c50860c224cd867c0f92e482a666c24c48e702f37a6363ca17f5db2ee5f
                                                          • Instruction Fuzzy Hash: DFE09231410188ABCB16AF54EE09E583BA9AB41786F159018FC098B133CB3AE986CB90
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper
                                                          • String ID: p#@
                                                          • API String ID: 3964851224-1673889715
                                                          • Opcode ID: 587c21362da238fbb338281d3337417b556a79dda3373f74a7acddba465cf2a5
                                                          • Instruction ID: 1fafbfc7ce4f8d816448757dc00fd0adf153c54e1969fb25d0886eae310f89fb
                                                          • Opcode Fuzzy Hash: 587c21362da238fbb338281d3337417b556a79dda3373f74a7acddba465cf2a5
                                                          • Instruction Fuzzy Hash: 54A279706083418FC756DF28C4C0B2ABBE5BF89304F15996DE89A9B352D771EC45CB92

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 0 3baff9-3bb056 call 352340 3 3bb058-3bb06b call 33b567 0->3 4 3bb094-3bb098 0->4 12 3bb0c8 3->12 13 3bb06d-3bb092 call 33b567 * 2 3->13 5 3bb09a-3bb0bb call 33b567 * 2 4->5 6 3bb0dd-3bb0e0 4->6 30 3bb0bf-3bb0c4 5->30 8 3bb0e2-3bb0e5 6->8 9 3bb0f5-3bb119 call 337510 call 337620 6->9 14 3bb0e8-3bb0ed call 33b567 8->14 32 3bb1d8-3bb1e0 9->32 33 3bb11f-3bb178 call 337510 call 337620 call 337510 call 337620 call 337510 call 337620 9->33 21 3bb0cb-3bb0cf 12->21 13->30 14->9 26 3bb0d9-3bb0db 21->26 27 3bb0d1-3bb0d7 21->27 26->6 26->9 27->14 30->6 34 3bb0c6 30->34 35 3bb20a-3bb238 GetCurrentDirectoryW call 34fe0b GetCurrentDirectoryW 32->35 36 3bb1e2-3bb1fd call 337510 call 337620 32->36 81 3bb17a-3bb195 call 337510 call 337620 33->81 82 3bb1a6-3bb1d6 GetSystemDirectoryW call 34fe0b GetSystemDirectoryW 33->82 34->21 45 3bb23c 35->45 36->35 53 3bb1ff-3bb208 call 354963 36->53 47 3bb240-3bb244 45->47 50 3bb246-3bb270 call 339c6e * 3 47->50 51 3bb275-3bb285 call 3a00d9 47->51 50->51 64 3bb28b-3bb2e1 call 3a07c0 call 3a06e6 call 3a05a7 51->64 65 3bb287-3bb289 51->65 53->35 53->51 68 3bb2ee-3bb2f2 64->68 96 3bb2e3 64->96 65->68 70 3bb39a-3bb3be CreateProcessW 68->70 71 3bb2f8-3bb321 call 3911c8 68->71 75 3bb3c1-3bb3d4 call 34fe14 * 2 70->75 87 3bb32a call 3914ce 71->87 88 3bb323-3bb328 call 391201 71->88 101 3bb42f-3bb43d CloseHandle 75->101 102 3bb3d6-3bb3e8 75->102 81->82 107 3bb197-3bb1a0 call 354963 81->107 82->45 100 3bb32f-3bb33c call 354963 87->100 88->100 96->68 117 3bb33e-3bb345 100->117 118 3bb347-3bb357 call 354963 100->118 109 3bb43f-3bb444 101->109 110 3bb49c 101->110 105 3bb3ea 102->105 106 3bb3ed-3bb3fc 102->106 105->106 113 3bb3fe 106->113 114 3bb401-3bb42a GetLastError call 33630c call 33cfa0 106->114 107->47 107->82 111 3bb451-3bb456 109->111 112 3bb446-3bb44c CloseHandle 109->112 115 3bb4a0-3bb4a4 110->115 120 3bb458-3bb45e CloseHandle 111->120 121 3bb463-3bb468 111->121 112->111 113->114 130 3bb4e5-3bb4f6 call 3a0175 114->130 123 3bb4b2-3bb4bc 115->123 124 3bb4a6-3bb4b0 115->124 117->117 117->118 134 3bb359-3bb360 118->134 135 3bb362-3bb372 call 354963 118->135 120->121 127 3bb46a-3bb470 CloseHandle 121->127 128 3bb475-3bb49a call 3a09d9 call 3bb536 121->128 131 3bb4be 123->131 132 3bb4c4-3bb4e3 call 33cfa0 CloseHandle 123->132 124->130 127->128 128->115 131->132 132->130 134->134 134->135 146 3bb37d-3bb398 call 34fe14 * 3 135->146 147 3bb374-3bb37b 135->147 146->75 147->146 147->147
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 003BB198
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 003BB1B0
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 003BB1D4
                                                          • _wcslen.LIBCMT ref: 003BB200
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 003BB214
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 003BB236
                                                          • _wcslen.LIBCMT ref: 003BB332
                                                            • Part of subcall function 003A05A7: GetStdHandle.KERNEL32(000000F6), ref: 003A05C6
                                                          • _wcslen.LIBCMT ref: 003BB34B
                                                          • _wcslen.LIBCMT ref: 003BB366
                                                          • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 003BB3B6
                                                          • GetLastError.KERNEL32(00000000), ref: 003BB407
                                                          • CloseHandle.KERNEL32(?), ref: 003BB439
                                                          • CloseHandle.KERNEL32(00000000), ref: 003BB44A
                                                          • CloseHandle.KERNEL32(00000000), ref: 003BB45C
                                                          • CloseHandle.KERNEL32(00000000), ref: 003BB46E
                                                          • CloseHandle.KERNEL32(?), ref: 003BB4E3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 2178637699-0
                                                          • Opcode ID: 53382ce0d75f5a91b2b5dc57d579eb66b6c477acc1203dd67a979565d5dd5ca7
                                                          • Instruction ID: b2f0b13c42bae23d9d8f28f58a0f4f9fce3a4ce17b272bfb8beb92b7916097c5
                                                          • Opcode Fuzzy Hash: 53382ce0d75f5a91b2b5dc57d579eb66b6c477acc1203dd67a979565d5dd5ca7
                                                          • Instruction Fuzzy Hash: 04F1AF315043009FC726EF24C891B6EBBE4AF85318F19895DF9999F2A2CB71EC44CB52
                                                          APIs
                                                          • GetInputState.USER32 ref: 0033D807
                                                          • timeGetTime.WINMM ref: 0033DA07
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0033DB28
                                                          • TranslateMessage.USER32(?), ref: 0033DB7B
                                                          • DispatchMessageW.USER32(?), ref: 0033DB89
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0033DB9F
                                                          • Sleep.KERNELBASE(0000000A), ref: 0033DBB1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                          • String ID:
                                                          • API String ID: 2189390790-0
                                                          • Opcode ID: 199a0167aae3e634421a4d19ffeb404d0b87c6e70f12d8b4c219eb2857405b32
                                                          • Instruction ID: 79df7216a669ff6a6eb20735f1b3d2cec8a6e5b36a757ccad92f430fbb3ecb02
                                                          • Opcode Fuzzy Hash: 199a0167aae3e634421a4d19ffeb404d0b87c6e70f12d8b4c219eb2857405b32
                                                          • Instruction Fuzzy Hash: D942D070608341EFD72BDF24D884FAAB7E5BF86304F1585A9F4568B2A1D770E844CB92

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00332D07
                                                          • RegisterClassExW.USER32(00000030), ref: 00332D31
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00332D42
                                                          • InitCommonControlsEx.COMCTL32(?), ref: 00332D5F
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00332D6F
                                                          • LoadIconW.USER32(000000A9), ref: 00332D85
                                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00332D94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                          • String ID: +$0$AutoIt v3 GUI$H\$TaskbarCreated
                                                          • API String ID: 2914291525-1655652064
                                                          • Opcode ID: 9b1c91bce20f481df113200419c43a87cae09849ee436dd80feb8d800f655328
                                                          • Instruction ID: abee9cb7ef13f2bde5fce441c5f821bba2b0dc48bf862b4628ddfd8a34d079ad
                                                          • Opcode Fuzzy Hash: 9b1c91bce20f481df113200419c43a87cae09849ee436dd80feb8d800f655328
                                                          • Instruction Fuzzy Hash: EA21A0B5911218AFDB019FA4E949B9DBBB8FB08700F00512AEA15F62A0D7B15544CF95

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 457 37065b-37068b call 37042f 460 3706a6-3706b2 call 365221 457->460 461 37068d-370698 call 35f2c6 457->461 467 3706b4-3706c9 call 35f2c6 call 35f2d9 460->467 468 3706cb-370714 call 37039a 460->468 466 37069a-3706a1 call 35f2d9 461->466 475 37097d-370983 466->475 467->466 477 370716-37071f 468->477 478 370781-37078a GetFileType 468->478 482 370756-37077c GetLastError call 35f2a3 477->482 483 370721-370725 477->483 479 3707d3-3707d6 478->479 480 37078c-3707bd GetLastError call 35f2a3 CloseHandle 478->480 487 3707df-3707e5 479->487 488 3707d8-3707dd 479->488 480->466 496 3707c3-3707ce call 35f2d9 480->496 482->466 483->482 484 370727-370754 call 37039a 483->484 484->478 484->482 489 3707e7 487->489 490 3707e9-370837 call 36516a 487->490 488->490 489->490 499 370847-37086b call 37014d 490->499 500 370839-370845 call 3705ab 490->500 496->466 507 37087e-3708c1 499->507 508 37086d 499->508 500->499 506 37086f-370879 call 3686ae 500->506 506->475 510 3708c3-3708c7 507->510 511 3708e2-3708f0 507->511 508->506 510->511 512 3708c9-3708dd 510->512 513 3708f6-3708fa 511->513 514 37097b 511->514 512->511 513->514 516 3708fc-37092f CloseHandle call 37039a 513->516 514->475 519 370963-370977 516->519 520 370931-37095d GetLastError call 35f2a3 call 365333 516->520 519->514 520->519
                                                          APIs
                                                            • Part of subcall function 0037039A: CreateFileW.KERNELBASE(00000000,00000000,?,00370704,?,?,00000000,?,00370704,00000000,0000000C), ref: 003703B7
                                                          • GetLastError.KERNEL32 ref: 0037076F
                                                          • __dosmaperr.LIBCMT ref: 00370776
                                                          • GetFileType.KERNELBASE(00000000), ref: 00370782
                                                          • GetLastError.KERNEL32 ref: 0037078C
                                                          • __dosmaperr.LIBCMT ref: 00370795
                                                          • CloseHandle.KERNEL32(00000000), ref: 003707B5
                                                          • CloseHandle.KERNEL32(?), ref: 003708FF
                                                          • GetLastError.KERNEL32 ref: 00370931
                                                          • __dosmaperr.LIBCMT ref: 00370938
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                          • String ID: H
                                                          • API String ID: 4237864984-2852464175
                                                          • Opcode ID: 5fb936d258de9a6b3f5542c0cca5b1fd16188ee310c7dd3c48718334ec422252
                                                          • Instruction ID: 8d460e997890fe5fb00a014edb5e071f0603a0f68850b1f0421615b5a415ce36
                                                          • Opcode Fuzzy Hash: 5fb936d258de9a6b3f5542c0cca5b1fd16188ee310c7dd3c48718334ec422252
                                                          • Instruction Fuzzy Hash: 8DA12836A101448FDF2E9F68D851BAD7BA0EB06320F14815DF859EF2A1CB399812CB91

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00333A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00401418,?,00332E7F,?,?,?,00000000), ref: 00333A78
                                                            • Part of subcall function 00333357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00333379
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 0033356A
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0037318D
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 003731CE
                                                          • RegCloseKey.ADVAPI32(?), ref: 00373210
                                                          • _wcslen.LIBCMT ref: 00373277
                                                          • _wcslen.LIBCMT ref: 00373286
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                          • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                          • API String ID: 98802146-2727554177
                                                          • Opcode ID: 691f26e48749633949d06aa9fb28403e31981c8a6f3638a0643dfd2920dd8f7d
                                                          • Instruction ID: bad5da69b8f479994890d527d9a5898e3148165fe41895205e224268a54c6774
                                                          • Opcode Fuzzy Hash: 691f26e48749633949d06aa9fb28403e31981c8a6f3638a0643dfd2920dd8f7d
                                                          • Instruction Fuzzy Hash: DF7191714043009EC316EF65DE8599BB7E8FF85340F40583EF949EB1A1DBB49A48CB55

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00332B8E
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00332B9D
                                                          • LoadIconW.USER32(00000063), ref: 00332BB3
                                                          • LoadIconW.USER32(000000A4), ref: 00332BC5
                                                          • LoadIconW.USER32(000000A2), ref: 00332BD7
                                                          • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00332BEF
                                                          • RegisterClassExW.USER32(?), ref: 00332C40
                                                            • Part of subcall function 00332CD4: GetSysColorBrush.USER32(0000000F), ref: 00332D07
                                                            • Part of subcall function 00332CD4: RegisterClassExW.USER32(00000030), ref: 00332D31
                                                            • Part of subcall function 00332CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00332D42
                                                            • Part of subcall function 00332CD4: InitCommonControlsEx.COMCTL32(?), ref: 00332D5F
                                                            • Part of subcall function 00332CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00332D6F
                                                            • Part of subcall function 00332CD4: LoadIconW.USER32(000000A9), ref: 00332D85
                                                            • Part of subcall function 00332CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00332D94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                          • String ID: #$0$AutoIt v3
                                                          • API String ID: 423443420-4155596026
                                                          • Opcode ID: 8b8d22b40dbfe2a97e003a17c687f075f1123f33b039a7f10c735cf3c5cea658
                                                          • Instruction ID: 05f6c6458baa9414931b0625720bfe8fe44a216d83bb908bfe56fb9465286d96
                                                          • Opcode Fuzzy Hash: 8b8d22b40dbfe2a97e003a17c687f075f1123f33b039a7f10c735cf3c5cea658
                                                          • Instruction Fuzzy Hash: A9213974E10314AFEB119FA5EE85AA97FF8FB08B50F04002AF905B66B0D3B11540CF98

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 598 333170-333185 599 333187-33318a 598->599 600 3331e5-3331e7 598->600 602 3331eb 599->602 603 33318c-333193 599->603 600->599 601 3331e9 600->601 606 3331d0-3331d8 DefWindowProcW 601->606 607 3331f1-3331f6 602->607 608 372dfb-372e23 call 3318e2 call 34e499 602->608 604 333265-33326d PostQuitMessage 603->604 605 333199-33319e 603->605 613 333219-33321b 604->613 610 3331a4-3331a8 605->610 611 372e7c-372e90 call 39bf30 605->611 612 3331de-3331e4 606->612 614 3331f8-3331fb 607->614 615 33321d-333244 SetTimer RegisterWindowMessageW 607->615 641 372e28-372e2f 608->641 617 3331ae-3331b3 610->617 618 372e68-372e72 call 39c161 610->618 611->613 635 372e96 611->635 613->612 621 333201-33320f KillTimer call 3330f2 614->621 622 372d9c-372d9f 614->622 615->613 619 333246-333251 CreatePopupMenu 615->619 625 372e4d-372e54 617->625 626 3331b9-3331be 617->626 631 372e77 618->631 619->613 639 333214 call 333c50 621->639 628 372dd7-372df6 MoveWindow 622->628 629 372da1-372da5 622->629 625->606 638 372e5a-372e63 call 390ad7 625->638 633 333253-333263 call 33326f 626->633 634 3331c4-3331ca 626->634 628->613 636 372da7-372daa 629->636 637 372dc6-372dd2 SetFocus 629->637 631->613 633->613 634->606 634->641 635->606 636->634 642 372db0-372dc1 call 3318e2 636->642 637->613 638->606 639->613 641->606 646 372e35-372e48 call 3330f2 call 333837 641->646 642->613 646->606
                                                          APIs
                                                          • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,0033316A,?,?), ref: 003331D8
                                                          • KillTimer.USER32(?,00000001,?,?,?,?,?,0033316A,?,?), ref: 00333204
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00333227
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,0033316A,?,?), ref: 00333232
                                                          • CreatePopupMenu.USER32 ref: 00333246
                                                          • PostQuitMessage.USER32(00000000), ref: 00333267
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                          • String ID: TaskbarCreated
                                                          • API String ID: 129472671-2362178303
                                                          • Opcode ID: a77e39e879be208c7aee944de83c03d55fd2b7968ce353d1632622e0530c358c
                                                          • Instruction ID: 084f7b5e9ee499d318918bc307d2bd6096fa448185630a604c94b4f376a00c80
                                                          • Opcode Fuzzy Hash: a77e39e879be208c7aee944de83c03d55fd2b7968ce353d1632622e0530c358c
                                                          • Instruction Fuzzy Hash: 04412831A50200ABEB272B78DE8DB7A365DE705340F04C135F91AEA5F1C779DA40D769

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 654 331410-331449 655 33144f-331465 mciSendStringW 654->655 656 3724b8-3724b9 DestroyWindow 654->656 657 3316c6-3316d3 655->657 658 33146b-331473 655->658 659 3724c4-3724d1 656->659 661 3316d5-3316f0 UnregisterHotKey 657->661 662 3316f8-3316ff 657->662 658->659 660 331479-331488 call 33182e 658->660 663 3724d3-3724d6 659->663 664 372500-372507 659->664 675 37250e-37251a 660->675 676 33148e-331496 660->676 661->662 666 3316f2-3316f3 call 3310d0 661->666 662->658 667 331705 662->667 668 3724e2-3724e5 FindClose 663->668 669 3724d8-3724e0 call 336246 663->669 664->659 672 372509 664->672 666->662 667->657 674 3724eb-3724f8 668->674 669->674 672->675 674->664 680 3724fa-3724fb call 3a32b1 674->680 677 372524-37252b 675->677 678 37251c-37251e FreeLibrary 675->678 681 372532-37253f 676->681 682 33149c-3314c1 call 33cfa0 676->682 677->675 683 37252d 677->683 678->677 680->664 684 372566-37256d 681->684 685 372541-37255e VirtualFree 681->685 692 3314c3 682->692 693 3314f8-331503 CoUninitialize 682->693 683->681 684->681 689 37256f 684->689 685->684 688 372560-372561 call 3a3317 685->688 688->684 695 372574-372578 689->695 694 3314c6-3314f6 call 331a05 call 3319ae 692->694 693->695 696 331509-33150e 693->696 694->693 695->696 700 37257e-372584 695->700 698 331514-33151e 696->698 699 372589-372596 call 3a32eb 696->699 703 331707-331714 call 34f80e 698->703 704 331524-3315a5 call 33988f call 331944 call 3317d5 call 34fe14 call 33177c call 33988f call 33cfa0 call 3317fe call 34fe14 698->704 712 372598 699->712 700->696 703->704 714 33171a 703->714 716 37259d-3725bf call 34fdcd 704->716 744 3315ab-3315cf call 34fe14 704->744 712->716 714->703 722 3725c1 716->722 726 3725c6-3725e8 call 34fdcd 722->726 732 3725ea 726->732 734 3725ef-372611 call 34fdcd 732->734 740 372613 734->740 743 372618-372625 call 3964d4 740->743 749 372627 743->749 744->726 750 3315d5-3315f9 call 34fe14 744->750 753 37262c-372639 call 34ac64 749->753 750->734 754 3315ff-331619 call 34fe14 750->754 759 37263b 753->759 754->743 760 33161f-331643 call 3317d5 call 34fe14 754->760 762 372640-37264d call 3a3245 759->762 760->753 769 331649-331651 760->769 767 37264f 762->767 770 372654-372661 call 3a32cc 767->770 769->762 771 331657-331675 call 33988f call 33190a 769->771 776 372663 770->776 771->770 780 33167b-331689 771->780 779 372668-372675 call 3a32cc 776->779 786 372677 779->786 780->779 781 33168f-3316c5 call 33988f * 3 call 331876 780->781 786->786
                                                          APIs
                                                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00331459
                                                          • CoUninitialize.COMBASE ref: 003314F8
                                                          • UnregisterHotKey.USER32(?), ref: 003316DD
                                                          • DestroyWindow.USER32(?), ref: 003724B9
                                                          • FreeLibrary.KERNEL32(?), ref: 0037251E
                                                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0037254B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                          • String ID: close all
                                                          • API String ID: 469580280-3243417748
                                                          • Opcode ID: d003386d472a3793b27a29bae206204219e558df60dfd49c3af9180c6cc06e65
                                                          • Instruction ID: 4b768f951e3795bd90df95d18ca54036cf39d8376ed3f55238d0e5e88cec0a43
                                                          • Opcode Fuzzy Hash: d003386d472a3793b27a29bae206204219e558df60dfd49c3af9180c6cc06e65
                                                          • Instruction Fuzzy Hash: D8D15A31701212CFDB2BEF15C899B2AF7A4BF05710F1582ADE84AAB251DB30AD52CF50

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 803 332c63-332cd3 CreateWindowExW * 2 ShowWindow * 2
                                                          APIs
                                                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00332C91
                                                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00332CB2
                                                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,00331CAD,?), ref: 00332CC6
                                                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,00331CAD,?), ref: 00332CCF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$CreateShow
                                                          • String ID: AutoIt v3$edit
                                                          • API String ID: 1584632944-3779509399
                                                          • Opcode ID: d158b2af07d2df6de11881d0006795f118ce40641e90d1b6cb83bbe7a35dd3ea
                                                          • Instruction ID: 98bcb48bdc13650635e317bffa35d1517632f5e214ff3869e6e43d4b0c7a6342
                                                          • Opcode Fuzzy Hash: d158b2af07d2df6de11881d0006795f118ce40641e90d1b6cb83bbe7a35dd3ea
                                                          • Instruction Fuzzy Hash: 95F0B7755503907AEB211717AD08E772EBDD7C6F50F00106EFD04E25B0C6711851DAB8

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1192 39e97b-39e986 1193 39e9f9-39e9fb 1192->1193 1194 39e988 1192->1194 1195 39e98a-39e98c 1194->1195 1196 39e98e-39e991 1194->1196 1197 39e9f3 Sleep 1195->1197 1198 39e993-39e99f QueryPerformanceCounter 1196->1198 1199 39e9f2 1196->1199 1197->1193 1198->1199 1200 39e9a1-39e9a5 QueryPerformanceFrequency 1198->1200 1199->1197 1201 39e9ab-39e9ee Sleep QueryPerformanceCounter call 3720b0 1200->1201 1204 39e9f0 1201->1204 1204->1193
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 0039E997
                                                          • QueryPerformanceFrequency.KERNEL32(?), ref: 0039E9A5
                                                          • Sleep.KERNEL32(00000000), ref: 0039E9AD
                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 0039E9B7
                                                          • Sleep.KERNELBASE ref: 0039E9F3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: PerformanceQuery$CounterSleep$Frequency
                                                          • String ID:
                                                          • API String ID: 2833360925-0
                                                          • Opcode ID: 0ed2784ca579f956c7f3928bdcec1520f6e7addfb8161bbb4ca41de0f67fd0f0
                                                          • Instruction ID: de5f8a3087586b7017ad07987b8f7b39e6c90cd5382df53c46c9d972ecd0c1ee
                                                          • Opcode Fuzzy Hash: 0ed2784ca579f956c7f3928bdcec1520f6e7addfb8161bbb4ca41de0f67fd0f0
                                                          • Instruction Fuzzy Hash: 37015731C11629DBCF02EBE5DC59AEDBB7CFB08300F050946E502B2241CB38A950CBA1

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00331BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00331BF4
                                                            • Part of subcall function 00331BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00331BFC
                                                            • Part of subcall function 00331BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00331C07
                                                            • Part of subcall function 00331BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00331C12
                                                            • Part of subcall function 00331BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00331C1A
                                                            • Part of subcall function 00331BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00331C22
                                                            • Part of subcall function 00331B4A: RegisterWindowMessageW.USER32(00000004,?,003312C4), ref: 00331BA2
                                                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0033136A
                                                          • OleInitialize.OLE32 ref: 00331388
                                                          • CloseHandle.KERNEL32(00000000,00000000), ref: 003724AB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                          • String ID: `o
                                                          • API String ID: 1986988660-1214680542
                                                          • Opcode ID: 1c9ea5762798be36a71bd9bbe15f54bd1257441d650a33224ff9201e77ef3bd1
                                                          • Instruction ID: d5d620b313ddd8b131fc1bb3b8c1ab8039807e4c501568be2ab60fb1a230defb
                                                          • Opcode Fuzzy Hash: 1c9ea5762798be36a71bd9bbe15f54bd1257441d650a33224ff9201e77ef3bd1
                                                          • Instruction Fuzzy Hash: 9371BFB9911300AFC386EF79AE85A553AE4FB88354754863EE44AFB2B1EB344541CF4C

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1284 3686ae-3686c2 call 3653c4 1287 3686c4-3686c6 1284->1287 1288 3686c8-3686d0 1284->1288 1289 368716-368736 call 365333 1287->1289 1290 3686d2-3686d9 1288->1290 1291 3686db-3686de 1288->1291 1299 368744 1289->1299 1300 368738-368742 call 35f2a3 1289->1300 1290->1291 1293 3686e6-3686fa call 3653c4 * 2 1290->1293 1294 3686e0-3686e4 1291->1294 1295 3686fc-36870c call 3653c4 CloseHandle 1291->1295 1293->1287 1293->1295 1294->1293 1294->1295 1295->1287 1306 36870e-368714 GetLastError 1295->1306 1304 368746-368749 1299->1304 1300->1304 1306->1289
                                                          APIs
                                                          • CloseHandle.KERNELBASE(00000000,00000000,?,?,003685CC,?,003F8CC8,0000000C), ref: 00368704
                                                          • GetLastError.KERNEL32(?,003685CC,?,003F8CC8,0000000C), ref: 0036870E
                                                          • __dosmaperr.LIBCMT ref: 00368739
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseErrorHandleLast__dosmaperr
                                                          • String ID:
                                                          • API String ID: 2583163307-2740779761
                                                          • Opcode ID: 61f2ce76636dd31cb1fcf53a544ce68eed9ee0d803907d3f1b08d6e1026cc603
                                                          • Instruction ID: a2b4e3e7df233c8b0465204e4b387440af621f5b20cbdd3e326e6f18be729549
                                                          • Opcode Fuzzy Hash: 61f2ce76636dd31cb1fcf53a544ce68eed9ee0d803907d3f1b08d6e1026cc603
                                                          • Instruction Fuzzy Hash: B4018E3670426016C2336334E845B7E27494B8BB74F3A8329FA48DF1DADEF0CC818250
                                                          APIs
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00333B0F,SwapMouseButtons,00000004,?), ref: 00333B40
                                                          • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00333B0F,SwapMouseButtons,00000004,?), ref: 00333B61
                                                          • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00333B0F,SwapMouseButtons,00000004,?), ref: 00333B83
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseOpenQueryValue
                                                          • String ID: Control Panel\Mouse
                                                          • API String ID: 3677997916-824357125
                                                          • Opcode ID: 8ed34c774835aafb1aff53b4d04c69dc4a7834f1019c271e98a17a7e72f670c5
                                                          • Instruction ID: 8fb63fa251f6ac1061b473c789ead33196ce2d03a474bbc1b6c138ac7689122d
                                                          • Opcode Fuzzy Hash: 8ed34c774835aafb1aff53b4d04c69dc4a7834f1019c271e98a17a7e72f670c5
                                                          • Instruction Fuzzy Hash: 4B112AB5520218FFDB228FA5DC84EAEB7BCEF04744F118459F805D7110D231EE409760
                                                          APIs
                                                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 003733A2
                                                            • Part of subcall function 00336B57: _wcslen.LIBCMT ref: 00336B6A
                                                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00333A04
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: IconLoadNotifyShell_String_wcslen
                                                          • String ID: Line:
                                                          • API String ID: 2289894680-1585850449
                                                          • Opcode ID: 500a1e4cc409848ceab67644b474cea3634b22328de89462a528c505c54d173c
                                                          • Instruction ID: 52dd867cd5ab1c447a32eb929afdef3039bfb1d343310a5a193a336fe7bd94c3
                                                          • Opcode Fuzzy Hash: 500a1e4cc409848ceab67644b474cea3634b22328de89462a528c505c54d173c
                                                          • Instruction Fuzzy Hash: 8031B471508304AED327EB20DC86FEBB7DCAB40714F10852EF999970A1DB749649C7C6
                                                          APIs
                                                          • GetOpenFileNameW.COMDLG32(?), ref: 00372C8C
                                                            • Part of subcall function 00333AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00333A97,?,?,00332E7F,?,?,?,00000000), ref: 00333AC2
                                                            • Part of subcall function 00332DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00332DC4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Name$Path$FileFullLongOpen
                                                          • String ID: X$`e?
                                                          • API String ID: 779396738-120205953
                                                          • Opcode ID: 902d0b7b29530fec6febb7bf2f560b70efad5d2e127bd0393e02aadc9917be7a
                                                          • Instruction ID: a08647a86cf70b5c7741f38ee9e50be0ad3252a03f670c2b425926968420999b
                                                          • Opcode Fuzzy Hash: 902d0b7b29530fec6febb7bf2f560b70efad5d2e127bd0393e02aadc9917be7a
                                                          • Instruction Fuzzy Hash: 0C21A871A0025C9FDB03EF95C846BEE7BFC9F49304F008059E509BB241DBB855498FA1
                                                          APIs
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00350668
                                                            • Part of subcall function 003532A4: RaiseException.KERNEL32(?,?,?,0035068A,?,00401444,?,?,?,?,?,?,0035068A,00331129,003F8738,00331129), ref: 00353304
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00350685
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$ExceptionRaise
                                                          • String ID: Unknown exception
                                                          • API String ID: 3476068407-410509341
                                                          • Opcode ID: bed16886f51b08e6c9d596a9029c6876d09517548b59d96dc91240dd202196e1
                                                          • Instruction ID: 74bf20c3046b6127cf791b60c6b2eefe1438901ffe9a36319f8571908a86aebb
                                                          • Opcode Fuzzy Hash: bed16886f51b08e6c9d596a9029c6876d09517548b59d96dc91240dd202196e1
                                                          • Instruction Fuzzy Hash: 00F0283490020D77CB0BB7A4D846C9D77AC9E00341B604830BD14C94B5EF72EA6DC6C0
                                                          APIs
                                                            • Part of subcall function 00333923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00333A04
                                                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0039C259
                                                          • KillTimer.USER32(?,00000001,?,?), ref: 0039C261
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0039C270
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_Timer$Kill
                                                          • String ID:
                                                          • API String ID: 3500052701-0
                                                          • Opcode ID: 1186b015f4c8101f86d9f70acc619c046b934b965363ec97b03a024522975d2c
                                                          • Instruction ID: f501f514ba9d15956b2309e14eec5f6c30ae6b5908bff72904b0838d36a26280
                                                          • Opcode Fuzzy Hash: 1186b015f4c8101f86d9f70acc619c046b934b965363ec97b03a024522975d2c
                                                          • Instruction Fuzzy Hash: 49319370914384AFEF239F748895BE7BBEC9B06308F00549AD5DEA7242C7746A84CB51
                                                          APIs
                                                          • TranslateMessage.USER32(?), ref: 0033DB7B
                                                          • DispatchMessageW.USER32(?), ref: 0033DB89
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0033DB9F
                                                          • Sleep.KERNELBASE(0000000A), ref: 0033DBB1
                                                          • TranslateAcceleratorW.USER32(?,?,?), ref: 00381CC9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                          • String ID:
                                                          • API String ID: 3288985973-0
                                                          • Opcode ID: 4fcb0fa75210ea9e720969d2de37a8a38b45d3aa89a825fd3d861e60101c3c77
                                                          • Instruction ID: 94d8598ffc70b269193b86f96febae4f111113703800d0c376121c59deac4ff4
                                                          • Opcode Fuzzy Hash: 4fcb0fa75210ea9e720969d2de37a8a38b45d3aa89a825fd3d861e60101c3c77
                                                          • Instruction Fuzzy Hash: 6CF05E316443409BEB31DB60DC89FEA73BCEB45310F104929E64AD70D0DB30A4888B15
                                                          APIs
                                                          • __Init_thread_footer.LIBCMT ref: 003417F6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Init_thread_footer
                                                          • String ID: CALL
                                                          • API String ID: 1385522511-4196123274
                                                          • Opcode ID: 26f357fb5e73e8cccd7996f122603b444f67713d29a040df0896a67cd328fcdc
                                                          • Instruction ID: 0c4493dd2c02044e91d7adeffcaff305e385cc106de173f2bb794c109a3ffa45
                                                          • Opcode Fuzzy Hash: 26f357fb5e73e8cccd7996f122603b444f67713d29a040df0896a67cd328fcdc
                                                          • Instruction Fuzzy Hash: A12299706087019FC716DF24C485A2ABBF5BF86314F19896DF4968F3A2D771E981CB82
                                                          APIs
                                                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00333908
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_
                                                          • String ID:
                                                          • API String ID: 1144537725-0
                                                          • Opcode ID: d312053ae5730140307571533326e806e20c96b5403e19dffbaaca28ade1520c
                                                          • Instruction ID: 3080656ad5565d2ac70d2338e629ff9f9e998a75302f362eafc4aaa90d3c813a
                                                          • Opcode Fuzzy Hash: d312053ae5730140307571533326e806e20c96b5403e19dffbaaca28ade1520c
                                                          • Instruction Fuzzy Hash: 18319170504301DFE722DF24D9C4B97BBE8FB49709F00492EF99997290E771AA48CB92
                                                          APIs
                                                          • timeGetTime.WINMM ref: 0034F661
                                                            • Part of subcall function 0033D730: GetInputState.USER32 ref: 0033D807
                                                          • Sleep.KERNEL32(00000000), ref: 0038F2DE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: InputSleepStateTimetime
                                                          • String ID:
                                                          • API String ID: 4149333218-0
                                                          • Opcode ID: 72f43464984eb7a8cd9ed8c424ebf57278765606203e7051d4508489647502fd
                                                          • Instruction ID: 81ccb101e673f8d8b7a6649159134329fc622a516dc86b5f5ef01f6d89464a8e
                                                          • Opcode Fuzzy Hash: 72f43464984eb7a8cd9ed8c424ebf57278765606203e7051d4508489647502fd
                                                          • Instruction Fuzzy Hash: E9F01C352406059FD315EF69D489F6AF7E8EF46761F004069E95DCB261DB70B800CB91
                                                          APIs
                                                            • Part of subcall function 00334E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00334EDD,?,00401418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00334E9C
                                                            • Part of subcall function 00334E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00334EAE
                                                            • Part of subcall function 00334E90: FreeLibrary.KERNEL32(00000000,?,?,00334EDD,?,00401418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00334EC0
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00401418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00334EFD
                                                            • Part of subcall function 00334E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00373CDE,?,00401418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00334E62
                                                            • Part of subcall function 00334E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00334E74
                                                            • Part of subcall function 00334E59: FreeLibrary.KERNEL32(00000000,?,?,00373CDE,?,00401418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00334E87
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$Load$AddressFreeProc
                                                          • String ID:
                                                          • API String ID: 2632591731-0
                                                          • Opcode ID: f8cfd93e5dd81d902e89944a1648eedf8177f6bf1396e4be99de5d6ccdcf98b1
                                                          • Instruction ID: 0635c3e311656b1488d22117a5f7a59262ce1c8608b7c0a4e73c05c02d53b189
                                                          • Opcode Fuzzy Hash: f8cfd93e5dd81d902e89944a1648eedf8177f6bf1396e4be99de5d6ccdcf98b1
                                                          • Instruction Fuzzy Hash: 5E112332610205AACF27AB64DC82FAD77A9AF40B11F14842DF442AE1C1EE74EE059B50
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: __wsopen_s
                                                          • String ID:
                                                          • API String ID: 3347428461-0
                                                          • Opcode ID: d9b70949f49baccbceb95f83bd8e835c0453960d5decb2a1f572dbd9580bdd68
                                                          • Instruction ID: e03b1860b14c75a4dd8915eefb821daf6a789162ff952bc16afb23bb39350094
                                                          • Opcode Fuzzy Hash: d9b70949f49baccbceb95f83bd8e835c0453960d5decb2a1f572dbd9580bdd68
                                                          • Instruction Fuzzy Hash: B8115E7190410AAFCF06DF58E94099E7BF4EF48300F118159FC08AB311DB30DA11CB64
                                                          APIs
                                                            • Part of subcall function 00364C7D: RtlAllocateHeap.NTDLL(00000008,00331129,00000000,?,00362E29,00000001,00000364,?,?,?,0035F2DE,00363863,00401444,?,0034FDF5,?), ref: 00364CBE
                                                          • _free.LIBCMT ref: 0036506C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap_free
                                                          • String ID:
                                                          • API String ID: 614378929-0
                                                          • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                          • Instruction ID: 0db2f4090693b0787ded5eb7a6b2c2d634521ed33134f84736b05a5367fc33ed
                                                          • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                          • Instruction Fuzzy Hash: 930149726047056BE3328F65D885A9AFBECFB89370F26452DF184872C0EB30A805C7B4
                                                          APIs
                                                          • GetForegroundWindow.USER32(00000000,?,?,?,003C14B5,?), ref: 003C2A01
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ForegroundWindow
                                                          • String ID:
                                                          • API String ID: 2020703349-0
                                                          • Opcode ID: c736c0f2ea0a4a51fc403ba1fbcc51143a4ea03b9fe1585e8aef49150714e980
                                                          • Instruction ID: bb05e346d2b828fa818950f96e44055401601c4882d2caaad92fdfbd65963b58
                                                          • Opcode Fuzzy Hash: c736c0f2ea0a4a51fc403ba1fbcc51143a4ea03b9fe1585e8aef49150714e980
                                                          • Instruction Fuzzy Hash: F3015E3A740A41AFD326CA2DC454F277796EB85314F6A856DD04BCB251DB32FC52C7A0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                          • Instruction ID: b30988700cf2b9736134b6dfb1a057069fffd976fc13dbb9fb189879be87ecf1
                                                          • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                          • Instruction Fuzzy Hash: 43F0F432510A10AAC7373A69DC05F5B339D9F523B3F114B15FC219A1E2CB74D90A86E5
                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(00000008,00331129,00000000,?,00362E29,00000001,00000364,?,?,?,0035F2DE,00363863,00401444,?,0034FDF5,?), ref: 00364CBE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1279760036-0
                                                          • Opcode ID: a88cfc0f677be518a73bd828da07ee03120c6642d1bd61346d32d494c03a6313
                                                          • Instruction ID: 0bacec0b9821714b25b82f874425631add3d9bd6992bc2604906cf18900b6b46
                                                          • Opcode Fuzzy Hash: a88cfc0f677be518a73bd828da07ee03120c6642d1bd61346d32d494c03a6313
                                                          • Instruction Fuzzy Hash: D1F0E931E0222477DB235F669C09F5A379CBF81BA1B16C121FC19EA798CA70D80187E0
                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(00000000,?,00401444,?,0034FDF5,?,?,0033A976,00000010,00401440,003313FC,?,003313C6,?,00331129), ref: 00363852
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1279760036-0
                                                          • Opcode ID: 93c5e6f9285ca844342356fd1a4173c9f6e337cfe358186be3af8497711e59cc
                                                          • Instruction ID: 2cf55821c48fd11a81ab9eb50d58ca704f4469b6abf007a6ff389cc41ee8b237
                                                          • Opcode Fuzzy Hash: 93c5e6f9285ca844342356fd1a4173c9f6e337cfe358186be3af8497711e59cc
                                                          • Instruction Fuzzy Hash: EBE065311012245AE62326679D05FDA364DAF427B1F168121BC15979A5DB21DD0983E1
                                                          APIs
                                                          • FreeLibrary.KERNEL32(?,?,00401418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00334F6D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: FreeLibrary
                                                          • String ID:
                                                          • API String ID: 3664257935-0
                                                          • Opcode ID: 0be41abd3cf50338a4109227ecaca47ce7ca69f05fb9e61b7fafd89702dc594d
                                                          • Instruction ID: 3f4a2224b770f5b943adbb0074c412cbd91a2cac95658aad71e4a650ae29a09d
                                                          • Opcode Fuzzy Hash: 0be41abd3cf50338a4109227ecaca47ce7ca69f05fb9e61b7fafd89702dc594d
                                                          • Instruction Fuzzy Hash: D2F03071105751CFDB369F65D4D0C12B7E4EF1431971989BEE1DA82621C731B844DF10
                                                          APIs
                                                          • IsWindow.USER32(00000000), ref: 003C2A66
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Window
                                                          • String ID:
                                                          • API String ID: 2353593579-0
                                                          • Opcode ID: b2f3650b8a88be9238488c20c1fa5793413826910b91f535e5d6b8f543f3b402
                                                          • Instruction ID: ae30077d85357825e64bc340a7fb99e7f5304bc7ab8594e338a3f13ee269ee97
                                                          • Opcode Fuzzy Hash: b2f3650b8a88be9238488c20c1fa5793413826910b91f535e5d6b8f543f3b402
                                                          • Instruction Fuzzy Hash: 9DE04F7A354116AACB16EB34DC80EFB735CEB51395B10453AEC1AC6500DF309D9597A0
                                                          APIs
                                                          • Shell_NotifyIconW.SHELL32(00000002,?), ref: 0033314E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_
                                                          • String ID:
                                                          • API String ID: 1144537725-0
                                                          • Opcode ID: 271f463ba3f35442831c975ae1bb0f6cc608621e0707cffc70d6bcf72d28edd0
                                                          • Instruction ID: 8fd864f4b1a7bd4a44560f614613a29d3f4bc534c2779b2b471981cb7235b307
                                                          • Opcode Fuzzy Hash: 271f463ba3f35442831c975ae1bb0f6cc608621e0707cffc70d6bcf72d28edd0
                                                          • Instruction Fuzzy Hash: 20F037709143149FF7539B24DC49BD67BBCAB01708F0040E5A948A6291D7745788CF55
                                                          APIs
                                                          • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00332DC4
                                                            • Part of subcall function 00336B57: _wcslen.LIBCMT ref: 00336B6A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: LongNamePath_wcslen
                                                          • String ID:
                                                          • API String ID: 541455249-0
                                                          • Opcode ID: ca38674f1d8a2d04944aede8e5f09eed088d141e927ad5754161c7458c11b5a1
                                                          • Instruction ID: 6346e4f0b0c98929a1b22679263779550ec29980a0d1a42b1304a5e7413182d5
                                                          • Opcode Fuzzy Hash: ca38674f1d8a2d04944aede8e5f09eed088d141e927ad5754161c7458c11b5a1
                                                          • Instruction Fuzzy Hash: 24E0CD72A001245BCB2192589C06FDA77DDDFC8790F044171FD0DD7248D964AD808650
                                                          APIs
                                                            • Part of subcall function 00333837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00333908
                                                            • Part of subcall function 0033D730: GetInputState.USER32 ref: 0033D807
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00332B6B
                                                            • Part of subcall function 003330F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 0033314E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                          • String ID:
                                                          • API String ID: 3667716007-0
                                                          • Opcode ID: 30338caa9a16af36ed05252ac70132b6781e57797240d92e99487c27a41375db
                                                          • Instruction ID: 85978609952f98b87d66c0b07f4000739faeb47cb577b449dc7e6a8b379fd551
                                                          • Opcode Fuzzy Hash: 30338caa9a16af36ed05252ac70132b6781e57797240d92e99487c27a41375db
                                                          • Instruction Fuzzy Hash: A9E08C3270424406CA0ABB74A8D29AEA7599BD1362F40957EF1469F1B3CF788A498352
                                                          APIs
                                                          • CreateFileW.KERNELBASE(00000000,00000000,?,00370704,?,?,00000000,?,00370704,00000000,0000000C), ref: 003703B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateFile
                                                          • String ID:
                                                          • API String ID: 823142352-0
                                                          • Opcode ID: 76a153f5ea98b277bcaec1a628ee2c61c9e0c8e6e4df84a773174413e4fe858e
                                                          • Instruction ID: ac8a46d0addd19556b3628a25f6ae7668807543c71acdddecb0c9aa0ecd51c45
                                                          • Opcode Fuzzy Hash: 76a153f5ea98b277bcaec1a628ee2c61c9e0c8e6e4df84a773174413e4fe858e
                                                          • Instruction Fuzzy Hash: 03D06C3205010DBBDF028F85DD06EDA3BAAFB48714F014000FE1896020C732E821AB90
                                                          APIs
                                                          • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00331CBC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: InfoParametersSystem
                                                          • String ID:
                                                          • API String ID: 3098949447-0
                                                          • Opcode ID: 4e1db591429ac0177464341e0682fafdb1f29eedd06c6486a474855f945b947f
                                                          • Instruction ID: 33387f2f6a3ff370a05c65ba35ef2c45abeaaf9cacc42fb2f3380e888f03731d
                                                          • Opcode Fuzzy Hash: 4e1db591429ac0177464341e0682fafdb1f29eedd06c6486a474855f945b947f
                                                          • Instruction Fuzzy Hash: 39C09236280304AFF3159B80BE4EF107768A348B00F049011FA0EB95F3C3F22821EB58
                                                          APIs
                                                            • Part of subcall function 00349BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00349BB2
                                                          • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 003C961A
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 003C965B
                                                          • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 003C969F
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 003C96C9
                                                          • SendMessageW.USER32 ref: 003C96F2
                                                          • GetKeyState.USER32(00000011), ref: 003C978B
                                                          • GetKeyState.USER32(00000009), ref: 003C9798
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 003C97AE
                                                          • GetKeyState.USER32(00000010), ref: 003C97B8
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 003C97E9
                                                          • SendMessageW.USER32 ref: 003C9810
                                                          • SendMessageW.USER32(?,00001030,?,003C7E95), ref: 003C9918
                                                          • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 003C992E
                                                          • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 003C9941
                                                          • SetCapture.USER32(?), ref: 003C994A
                                                          • ClientToScreen.USER32(?,?), ref: 003C99AF
                                                          • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 003C99BC
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 003C99D6
                                                          • ReleaseCapture.USER32 ref: 003C99E1
                                                          • GetCursorPos.USER32(?), ref: 003C9A19
                                                          • ScreenToClient.USER32(?,?), ref: 003C9A26
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 003C9A80
                                                          • SendMessageW.USER32 ref: 003C9AAE
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 003C9AEB
                                                          • SendMessageW.USER32 ref: 003C9B1A
                                                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 003C9B3B
                                                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 003C9B4A
                                                          • GetCursorPos.USER32(?), ref: 003C9B68
                                                          • ScreenToClient.USER32(?,?), ref: 003C9B75
                                                          • GetParent.USER32(?), ref: 003C9B93
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 003C9BFA
                                                          • SendMessageW.USER32 ref: 003C9C2B
                                                          • ClientToScreen.USER32(?,?), ref: 003C9C84
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 003C9CB4
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 003C9CDE
                                                          • SendMessageW.USER32 ref: 003C9D01
                                                          • ClientToScreen.USER32(?,?), ref: 003C9D4E
                                                          • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 003C9D82
                                                            • Part of subcall function 00349944: GetWindowLongW.USER32(?,000000EB), ref: 00349952
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 003C9E05
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                          • String ID: @GUI_DRAGID$@q$F$p#@
                                                          • API String ID: 3429851547-3508986099
                                                          • Opcode ID: cbc28aeb089667235144f86b62906449acdce280d2217bec7e0506958bb109cd
                                                          • Instruction ID: af9508be6e0fb572f4d1409759fb21310d8a1905771202ecbed07574a2db8918
                                                          • Opcode Fuzzy Hash: cbc28aeb089667235144f86b62906449acdce280d2217bec7e0506958bb109cd
                                                          • Instruction Fuzzy Hash: 44427A75204200AFD726CF24CD48FAABBE9EF49320F16461EF599D72A1D731AD60CB41
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 003C48F3
                                                          • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 003C4908
                                                          • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 003C4927
                                                          • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 003C494B
                                                          • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 003C495C
                                                          • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 003C497B
                                                          • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 003C49AE
                                                          • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 003C49D4
                                                          • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 003C4A0F
                                                          • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 003C4A56
                                                          • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 003C4A7E
                                                          • IsMenu.USER32(?), ref: 003C4A97
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 003C4AF2
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 003C4B20
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 003C4B94
                                                          • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 003C4BE3
                                                          • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 003C4C82
                                                          • wsprintfW.USER32 ref: 003C4CAE
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 003C4CC9
                                                          • GetWindowTextW.USER32(?,00000000,00000001), ref: 003C4CF1
                                                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 003C4D13
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 003C4D33
                                                          • GetWindowTextW.USER32(?,00000000,00000001), ref: 003C4D5A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                          • String ID: %d/%02d/%02d$@q
                                                          • API String ID: 4054740463-1379191876
                                                          • Opcode ID: d0c586e325da7053cf5975de3a4f92fbf945fd9d09292baf2dd3cb88ef4a0dd7
                                                          • Instruction ID: bdb6218166c7d323c4c120638b7c2ef9361ad7744affc44735fe87b1533bc78e
                                                          • Opcode Fuzzy Hash: d0c586e325da7053cf5975de3a4f92fbf945fd9d09292baf2dd3cb88ef4a0dd7
                                                          • Instruction Fuzzy Hash: 9112EF71600214ABEB269F28CD59FAEBBF8EF45310F14412DF51AEA2E1DB74AD41CB50
                                                          APIs
                                                          • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 0034F998
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0038F474
                                                          • IsIconic.USER32(00000000), ref: 0038F47D
                                                          • ShowWindow.USER32(00000000,00000009), ref: 0038F48A
                                                          • SetForegroundWindow.USER32(00000000), ref: 0038F494
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0038F4AA
                                                          • GetCurrentThreadId.KERNEL32 ref: 0038F4B1
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0038F4BD
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 0038F4CE
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 0038F4D6
                                                          • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 0038F4DE
                                                          • SetForegroundWindow.USER32(00000000), ref: 0038F4E1
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0038F4F6
                                                          • keybd_event.USER32(00000012,00000000), ref: 0038F501
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0038F50B
                                                          • keybd_event.USER32(00000012,00000000), ref: 0038F510
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0038F519
                                                          • keybd_event.USER32(00000012,00000000), ref: 0038F51E
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0038F528
                                                          • keybd_event.USER32(00000012,00000000), ref: 0038F52D
                                                          • SetForegroundWindow.USER32(00000000), ref: 0038F530
                                                          • AttachThreadInput.USER32(?,000000FF,00000000), ref: 0038F557
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 4125248594-2988720461
                                                          • Opcode ID: bf10ecbd11464f565d320006afe6fa6795f23f6ea226e4c30e83fbc96c782cd9
                                                          • Instruction ID: c1d1e841566c22dbec90070190faa570de5ddaa237eebe1dddbc9bcbce59ce55
                                                          • Opcode Fuzzy Hash: bf10ecbd11464f565d320006afe6fa6795f23f6ea226e4c30e83fbc96c782cd9
                                                          • Instruction Fuzzy Hash: C531A671A50318BFEB226BB64C4AFBF7E6CEB45B50F151066F604E61D1C7B06D00AB60
                                                          APIs
                                                            • Part of subcall function 003916C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0039170D
                                                            • Part of subcall function 003916C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0039173A
                                                            • Part of subcall function 003916C3: GetLastError.KERNEL32 ref: 0039174A
                                                          • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00391286
                                                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 003912A8
                                                          • CloseHandle.KERNEL32(?), ref: 003912B9
                                                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 003912D1
                                                          • GetProcessWindowStation.USER32 ref: 003912EA
                                                          • SetProcessWindowStation.USER32(00000000), ref: 003912F4
                                                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00391310
                                                            • Part of subcall function 003910BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,003911FC), ref: 003910D4
                                                            • Part of subcall function 003910BF: CloseHandle.KERNEL32(?,?,003911FC), ref: 003910E9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                          • String ID: $default$winsta0$Z?
                                                          • API String ID: 22674027-1168915105
                                                          • Opcode ID: 401e8a695be03213a8472310cc4984359659d09e1b495e40d4f70111455ca92e
                                                          • Instruction ID: 1c43c8cd50b94dfa47795b87a2dd47e63585fc2eec4c31ef8b3326d562d0d6bb
                                                          • Opcode Fuzzy Hash: 401e8a695be03213a8472310cc4984359659d09e1b495e40d4f70111455ca92e
                                                          • Instruction Fuzzy Hash: 2F818B7190020AAFEF229FA5DC49FEE7BB9EF08704F184129FA14F61A0C7319954CB20
                                                          APIs
                                                            • Part of subcall function 003910F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00391114
                                                            • Part of subcall function 003910F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00390B9B,?,?,?), ref: 00391120
                                                            • Part of subcall function 003910F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00390B9B,?,?,?), ref: 0039112F
                                                            • Part of subcall function 003910F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00390B9B,?,?,?), ref: 00391136
                                                            • Part of subcall function 003910F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0039114D
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00390BCC
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00390C00
                                                          • GetLengthSid.ADVAPI32(?), ref: 00390C17
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 00390C51
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00390C6D
                                                          • GetLengthSid.ADVAPI32(?), ref: 00390C84
                                                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00390C8C
                                                          • HeapAlloc.KERNEL32(00000000), ref: 00390C93
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00390CB4
                                                          • CopySid.ADVAPI32(00000000), ref: 00390CBB
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00390CEA
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00390D0C
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00390D1E
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00390D45
                                                          • HeapFree.KERNEL32(00000000), ref: 00390D4C
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00390D55
                                                          • HeapFree.KERNEL32(00000000), ref: 00390D5C
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00390D65
                                                          • HeapFree.KERNEL32(00000000), ref: 00390D6C
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00390D78
                                                          • HeapFree.KERNEL32(00000000), ref: 00390D7F
                                                            • Part of subcall function 00391193: GetProcessHeap.KERNEL32(00000008,00390BB1,?,00000000,?,00390BB1,?), ref: 003911A1
                                                            • Part of subcall function 00391193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00390BB1,?), ref: 003911A8
                                                            • Part of subcall function 00391193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00390BB1,?), ref: 003911B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                          • String ID:
                                                          • API String ID: 4175595110-0
                                                          • Opcode ID: fe98da2956d33a20392d21ccc3817494a777b1dbb92b7143a1a32824ef19fd52
                                                          • Instruction ID: 9124ea8c7de129564b17392fe9250bcfef17763c0f886c2ed4d6ad8d3d73d61a
                                                          • Opcode Fuzzy Hash: fe98da2956d33a20392d21ccc3817494a777b1dbb92b7143a1a32824ef19fd52
                                                          • Instruction Fuzzy Hash: 2771587290021AAFDF16DFA5DC48FAEBBBCBF04304F054615E919E6291D771EA05CBA0
                                                          APIs
                                                          • OpenClipboard.USER32(003CCC08), ref: 003AEB29
                                                          • IsClipboardFormatAvailable.USER32(0000000D), ref: 003AEB37
                                                          • GetClipboardData.USER32(0000000D), ref: 003AEB43
                                                          • CloseClipboard.USER32 ref: 003AEB4F
                                                          • GlobalLock.KERNEL32(00000000), ref: 003AEB87
                                                          • CloseClipboard.USER32 ref: 003AEB91
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 003AEBBC
                                                          • IsClipboardFormatAvailable.USER32(00000001), ref: 003AEBC9
                                                          • GetClipboardData.USER32(00000001), ref: 003AEBD1
                                                          • GlobalLock.KERNEL32(00000000), ref: 003AEBE2
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 003AEC22
                                                          • IsClipboardFormatAvailable.USER32(0000000F), ref: 003AEC38
                                                          • GetClipboardData.USER32(0000000F), ref: 003AEC44
                                                          • GlobalLock.KERNEL32(00000000), ref: 003AEC55
                                                          • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 003AEC77
                                                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 003AEC94
                                                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 003AECD2
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 003AECF3
                                                          • CountClipboardFormats.USER32 ref: 003AED14
                                                          • CloseClipboard.USER32 ref: 003AED59
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                          • String ID:
                                                          • API String ID: 420908878-0
                                                          • Opcode ID: 82130fe0ce43d044762da52469f652e50ba1c5662546efe4e3d8bbb1e0387665
                                                          • Instruction ID: bab2532d7984057a3522fbec8864975af97964e1b534fa44c0b70d3eb5d37218
                                                          • Opcode Fuzzy Hash: 82130fe0ce43d044762da52469f652e50ba1c5662546efe4e3d8bbb1e0387665
                                                          • Instruction Fuzzy Hash: 7D61F435208301AFD302EF24D899F2AB7A8EF85714F09555DF45ADB2A1CB31ED06CB62
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 003A69BE
                                                          • FindClose.KERNEL32(00000000), ref: 003A6A12
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 003A6A4E
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 003A6A75
                                                            • Part of subcall function 00339CB3: _wcslen.LIBCMT ref: 00339CBD
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 003A6AB2
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 003A6ADF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                          • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                          • API String ID: 3830820486-3289030164
                                                          • Opcode ID: b896ae42863568b97ec5f52bee3efd70a8a84cdaa7b90c64ca3a9cd5510e8fdb
                                                          • Instruction ID: 8a57dee008a88b93b18a58b5d539707f4d384203e835906b37b0f6105918e19f
                                                          • Opcode Fuzzy Hash: b896ae42863568b97ec5f52bee3efd70a8a84cdaa7b90c64ca3a9cd5510e8fdb
                                                          • Instruction Fuzzy Hash: 91D160B2508300AFC715EBA4C986EABB7ECEF89704F04491DF585DB191EB74DA44CB62
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,756E8FB0,?,00000000), ref: 003A9663
                                                          • GetFileAttributesW.KERNEL32(?), ref: 003A96A1
                                                          • SetFileAttributesW.KERNEL32(?,?), ref: 003A96BB
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 003A96D3
                                                          • FindClose.KERNEL32(00000000), ref: 003A96DE
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 003A96FA
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 003A974A
                                                          • SetCurrentDirectoryW.KERNEL32(003F6B7C), ref: 003A9768
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 003A9772
                                                          • FindClose.KERNEL32(00000000), ref: 003A977F
                                                          • FindClose.KERNEL32(00000000), ref: 003A978F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                          • String ID: *.*
                                                          • API String ID: 1409584000-438819550
                                                          • Opcode ID: f844ab44184a2a134b4b864076b12cfd988e8aa521e1c09a7fdee7f0efd0fb57
                                                          • Instruction ID: 7b63f622de64c7e50bc6dc2d29264e7d833c5ece09189830cdfc39f2a16236f9
                                                          • Opcode Fuzzy Hash: f844ab44184a2a134b4b864076b12cfd988e8aa521e1c09a7fdee7f0efd0fb57
                                                          • Instruction Fuzzy Hash: 4A31B0325002196ADF16AFB5EC09FEE77ACDF4A321F114596E909E21A0DB35ED448B20
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,756E8FB0,?,00000000), ref: 003A97BE
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 003A9819
                                                          • FindClose.KERNEL32(00000000), ref: 003A9824
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 003A9840
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 003A9890
                                                          • SetCurrentDirectoryW.KERNEL32(003F6B7C), ref: 003A98AE
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 003A98B8
                                                          • FindClose.KERNEL32(00000000), ref: 003A98C5
                                                          • FindClose.KERNEL32(00000000), ref: 003A98D5
                                                            • Part of subcall function 0039DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 0039DB00
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                          • String ID: *.*
                                                          • API String ID: 2640511053-438819550
                                                          • Opcode ID: 1b904fd3367184ed3df09d9b16ebeaa27d77da3b71674caaeb9b99636db6ba51
                                                          • Instruction ID: cccf64afb31ad269354f530ffca349d700e7cf254e0a6db0ad1df614fd45c08a
                                                          • Opcode Fuzzy Hash: 1b904fd3367184ed3df09d9b16ebeaa27d77da3b71674caaeb9b99636db6ba51
                                                          • Instruction Fuzzy Hash: 0E31B0325002196ADF12EFA4EC49FEE77ACDF07320F118556E914F21A0DB39EE458B20
                                                          APIs
                                                            • Part of subcall function 003BC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,003BB6AE,?,?), ref: 003BC9B5
                                                            • Part of subcall function 003BC998: _wcslen.LIBCMT ref: 003BC9F1
                                                            • Part of subcall function 003BC998: _wcslen.LIBCMT ref: 003BCA68
                                                            • Part of subcall function 003BC998: _wcslen.LIBCMT ref: 003BCA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003BBF3E
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 003BBFA9
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 003BBFCD
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 003BC02C
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 003BC0E7
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 003BC154
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 003BC1E9
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 003BC23A
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 003BC2E3
                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 003BC382
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 003BC38F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                          • String ID:
                                                          • API String ID: 3102970594-0
                                                          • Opcode ID: 3c2b468fe926783f4604244eb3d970fdc5652de804d823c2a4bc363503478a18
                                                          • Instruction ID: 67235ae0e9018a3db7e6ce1b2e3c0ac79e7f5a50cd365acb21e3259acc30ec00
                                                          • Opcode Fuzzy Hash: 3c2b468fe926783f4604244eb3d970fdc5652de804d823c2a4bc363503478a18
                                                          • Instruction Fuzzy Hash: 95026D716142009FD726CF28C891E6AB7E4AF89318F19849DF94ADF6A2DB31EC41CB51
                                                          APIs
                                                          • GetLocalTime.KERNEL32(?), ref: 003A8257
                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 003A8267
                                                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 003A8273
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 003A8310
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 003A8324
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 003A8356
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 003A838C
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 003A8395
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectoryTime$File$Local$System
                                                          • String ID: *.*
                                                          • API String ID: 1464919966-438819550
                                                          • Opcode ID: cdb30c16dcb16c6f1c65dd6f974b67c548fb5a66077f92434091043b3aecda30
                                                          • Instruction ID: 7a1f713e16fdd48fdac93cb5a6bcedcfec8d0a3e69484e1e922ee2bec63d56a8
                                                          • Opcode Fuzzy Hash: cdb30c16dcb16c6f1c65dd6f974b67c548fb5a66077f92434091043b3aecda30
                                                          • Instruction Fuzzy Hash: 10615A765043459FDB11EF60C880AAEB3E8FF8A310F048D1AF989DB251DB35E945CB92
                                                          APIs
                                                            • Part of subcall function 00333AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00333A97,?,?,00332E7F,?,?,?,00000000), ref: 00333AC2
                                                            • Part of subcall function 0039E199: GetFileAttributesW.KERNEL32(?,0039CF95), ref: 0039E19A
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 0039D122
                                                          • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 0039D1DD
                                                          • MoveFileW.KERNEL32(?,?), ref: 0039D1F0
                                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 0039D20D
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 0039D237
                                                            • Part of subcall function 0039D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,0039D21C,?,?), ref: 0039D2B2
                                                          • FindClose.KERNEL32(00000000,?,?,?), ref: 0039D253
                                                          • FindClose.KERNEL32(00000000), ref: 0039D264
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 1946585618-1173974218
                                                          • Opcode ID: a72b7b313e5d03cdeb49c638c351b6c1ede21ee7fa5f433b4a56d87b91f07473
                                                          • Instruction ID: fb75530b5c2a28def164653b4b8f5fdc007a45c2f66707c4c21e9511a569e8f8
                                                          • Opcode Fuzzy Hash: a72b7b313e5d03cdeb49c638c351b6c1ede21ee7fa5f433b4a56d87b91f07473
                                                          • Instruction Fuzzy Hash: 4D615F3180510D9FCF07EBE0DA929EDB779AF55300F248565E4467B191EB31AF09CB60
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                          • String ID:
                                                          • API String ID: 1737998785-0
                                                          • Opcode ID: c043fda8aeab1f91e8ef3323119c1ccb09acc07bc037599c5d988d7134054a3f
                                                          • Instruction ID: 2f911999940646a056ec68223d75a779070f3f79345b436ed397cd3acd153cf4
                                                          • Opcode Fuzzy Hash: c043fda8aeab1f91e8ef3323119c1ccb09acc07bc037599c5d988d7134054a3f
                                                          • Instruction Fuzzy Hash: 2341AB35204611AFE722CF15D888F19BBE9EF45329F19D099E8199FA62C735FC42CB90
                                                          APIs
                                                            • Part of subcall function 003916C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0039170D
                                                            • Part of subcall function 003916C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0039173A
                                                            • Part of subcall function 003916C3: GetLastError.KERNEL32 ref: 0039174A
                                                          • ExitWindowsEx.USER32(?,00000000), ref: 0039E932
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                          • String ID: $ $@$SeShutdownPrivilege
                                                          • API String ID: 2234035333-3163812486
                                                          • Opcode ID: a449b0de9da0fd621dc3e6f9bd7bdbc382fd4834fa73a4ac8b628799e15eeb6f
                                                          • Instruction ID: c2e17d0c84c03e6f0a958fae112cc67095678395240af6d6fb6edc9edea87847
                                                          • Opcode Fuzzy Hash: a449b0de9da0fd621dc3e6f9bd7bdbc382fd4834fa73a4ac8b628799e15eeb6f
                                                          • Instruction Fuzzy Hash: D601F973A20215AFEF56B6B49C86FBF726CA714751F150821FD13F61D1DBA96C408290
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 003B1276
                                                          • WSAGetLastError.WSOCK32 ref: 003B1283
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 003B12BA
                                                          • WSAGetLastError.WSOCK32 ref: 003B12C5
                                                          • closesocket.WSOCK32(00000000), ref: 003B12F4
                                                          • listen.WSOCK32(00000000,00000005), ref: 003B1303
                                                          • WSAGetLastError.WSOCK32 ref: 003B130D
                                                          • closesocket.WSOCK32(00000000), ref: 003B133C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$closesocket$bindlistensocket
                                                          • String ID:
                                                          • API String ID: 540024437-0
                                                          • Opcode ID: 75768b99e8851c2092ea8121c1505d3f265da7cc80f175cc8a3594443e3c7fd2
                                                          • Instruction ID: 66726eae312b8e71625800625603e258c26f4c849bff496a15be40cf504bd067
                                                          • Opcode Fuzzy Hash: 75768b99e8851c2092ea8121c1505d3f265da7cc80f175cc8a3594443e3c7fd2
                                                          • Instruction Fuzzy Hash: 0941D435A002009FD711DF24C494B6ABBE5BF46318F598488D95A8F6D2C731FD81CBE0
                                                          APIs
                                                          • _free.LIBCMT ref: 0036B9D4
                                                          • _free.LIBCMT ref: 0036B9F8
                                                          • _free.LIBCMT ref: 0036BB7F
                                                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,003D3700), ref: 0036BB91
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,0040121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0036BC09
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00401270,000000FF,?,0000003F,00000000,?), ref: 0036BC36
                                                          • _free.LIBCMT ref: 0036BD4B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                          • String ID:
                                                          • API String ID: 314583886-0
                                                          • Opcode ID: 4b771f6423f7b0695a9a16ecbbd00232eef023a7adceb66fe2cc4795d3992010
                                                          • Instruction ID: 93602a0bea8ee5e86e0f824aa792dc619ab007b02ca1772f9a0e9c002e708588
                                                          • Opcode Fuzzy Hash: 4b771f6423f7b0695a9a16ecbbd00232eef023a7adceb66fe2cc4795d3992010
                                                          • Instruction Fuzzy Hash: C1C11975A042049FCB279F78CC41AAAFBB9EF41350F15C1AAE495EB259D7309E81CF50
                                                          APIs
                                                            • Part of subcall function 00333AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00333A97,?,?,00332E7F,?,?,?,00000000), ref: 00333AC2
                                                            • Part of subcall function 0039E199: GetFileAttributesW.KERNEL32(?,0039CF95), ref: 0039E19A
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 0039D420
                                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 0039D470
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 0039D481
                                                          • FindClose.KERNEL32(00000000), ref: 0039D498
                                                          • FindClose.KERNEL32(00000000), ref: 0039D4A1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 2649000838-1173974218
                                                          • Opcode ID: 65ba0c05958b0722b693fef3193c5e8659e3fd360cf5c40391449e565d2303fc
                                                          • Instruction ID: 47fe3c2c6fe5f99d8a10ac63505c0d2bd1de4f84176df40e26c57f1fd1c1ce0d
                                                          • Opcode Fuzzy Hash: 65ba0c05958b0722b693fef3193c5e8659e3fd360cf5c40391449e565d2303fc
                                                          • Instruction Fuzzy Hash: D8315C710183459BC706EF64D8929AFB7A8AE91314F448E1DF4D5971A1EF20AA09CB63
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: __floor_pentium4
                                                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                          • API String ID: 4168288129-2761157908
                                                          • Opcode ID: 5c642285a41b7a578ff69738dc4362716adc86a4957abab0706dd8e7e1979771
                                                          • Instruction ID: f2b65f6e36d824acd251a2a20ae2c2d3b77a74e2328c6943c19d0429e7595902
                                                          • Opcode Fuzzy Hash: 5c642285a41b7a578ff69738dc4362716adc86a4957abab0706dd8e7e1979771
                                                          • Instruction Fuzzy Hash: E9C26E75E086288FDB26CF28DD407EAB7B9EB45305F1581EAD80DE7244E774AE858F40
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 003A64DC
                                                          • CoInitialize.OLE32(00000000), ref: 003A6639
                                                          • CoCreateInstance.OLE32(003CFCF8,00000000,00000001,003CFB68,?), ref: 003A6650
                                                          • CoUninitialize.OLE32 ref: 003A68D4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                          • String ID: .lnk
                                                          • API String ID: 886957087-24824748
                                                          • Opcode ID: 8be1e6542d808900d24988852ac8a9bf06c30b081e9bd7d7b8dfb0d46cf68d04
                                                          • Instruction ID: b49147b49d17ee3740a5433d712a262a59f0d61253e5a4e18755aaab5e295825
                                                          • Opcode Fuzzy Hash: 8be1e6542d808900d24988852ac8a9bf06c30b081e9bd7d7b8dfb0d46cf68d04
                                                          • Instruction Fuzzy Hash: 2CD13971508201AFD315EF24C882E6BB7E9FF95704F04496DF5958B2A1EB70ED05CB92
                                                          APIs
                                                          • GetForegroundWindow.USER32(?,?,00000000), ref: 003B22E8
                                                            • Part of subcall function 003AE4EC: GetWindowRect.USER32(?,?), ref: 003AE504
                                                          • GetDesktopWindow.USER32 ref: 003B2312
                                                          • GetWindowRect.USER32(00000000), ref: 003B2319
                                                          • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 003B2355
                                                          • GetCursorPos.USER32(?), ref: 003B2381
                                                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 003B23DF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                          • String ID:
                                                          • API String ID: 2387181109-0
                                                          • Opcode ID: 4e5f11d49a72e5f5de2579bf63eb999e0a66747df1b94abfd03b8e6a9f9f8e4f
                                                          • Instruction ID: 624582774cf13172e0cd514bc8b7ffadd59e6790915dbb90eed1a0d585b9e2d0
                                                          • Opcode Fuzzy Hash: 4e5f11d49a72e5f5de2579bf63eb999e0a66747df1b94abfd03b8e6a9f9f8e4f
                                                          • Instruction Fuzzy Hash: 7431BE72504315ABDB22DF55C849E9BB7E9FB88314F000A19F989D7191DB34E909CB92
                                                          APIs
                                                            • Part of subcall function 00339CB3: _wcslen.LIBCMT ref: 00339CBD
                                                          • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 003A9B78
                                                          • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 003A9C8B
                                                            • Part of subcall function 003A3874: GetInputState.USER32 ref: 003A38CB
                                                            • Part of subcall function 003A3874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 003A3966
                                                          • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 003A9BA8
                                                          • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 003A9C75
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                          • String ID: *.*
                                                          • API String ID: 1972594611-438819550
                                                          • Opcode ID: 7c9a7fe37d6ad92bde28a4457294e4923a78b10abce00db776cb76fbc61ba643
                                                          • Instruction ID: e59ffa90888ece704b0d1197acc1cf245ffa9a5c0ea0056709b0b4e8e961b92b
                                                          • Opcode Fuzzy Hash: 7c9a7fe37d6ad92bde28a4457294e4923a78b10abce00db776cb76fbc61ba643
                                                          • Instruction Fuzzy Hash: 9441307194460A9FCF16DFA4C985BEEBBB8EF06311F248156E905B6191EB309E44CF60
                                                          APIs
                                                            • Part of subcall function 00349BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00349BB2
                                                          • DefDlgProcW.USER32(?,?,?,?,?), ref: 00349A4E
                                                          • GetSysColor.USER32(0000000F), ref: 00349B23
                                                          • SetBkColor.GDI32(?,00000000), ref: 00349B36
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$LongProcWindow
                                                          • String ID:
                                                          • API String ID: 3131106179-0
                                                          • Opcode ID: 30d893dec7e2f41d89bb7b65b2902b39ab7b960546b9ba9dc0c5d76044e7f70b
                                                          • Instruction ID: ccc2c9f3ac840612bc20cc63fcfbfd93267e7e63c35db068a32e50363d256a5f
                                                          • Opcode Fuzzy Hash: 30d893dec7e2f41d89bb7b65b2902b39ab7b960546b9ba9dc0c5d76044e7f70b
                                                          • Instruction Fuzzy Hash: 17A1FA70108554AEE727BA3C8C89F7B2ADEDB82350F26425BF502DEA91CA25FD01D375
                                                          APIs
                                                            • Part of subcall function 003B304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 003B307A
                                                            • Part of subcall function 003B304E: _wcslen.LIBCMT ref: 003B309B
                                                          • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 003B185D
                                                          • WSAGetLastError.WSOCK32 ref: 003B1884
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 003B18DB
                                                          • WSAGetLastError.WSOCK32 ref: 003B18E6
                                                          • closesocket.WSOCK32(00000000), ref: 003B1915
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 1601658205-0
                                                          • Opcode ID: 6f846360ec075c4541c9f1a5530034d9101a4caa6f926ecb50699ad34919a3d6
                                                          • Instruction ID: 858fdf1ca7918442159595ea6ac2b36a1e2e5549f4d4394aac32936f18047765
                                                          • Opcode Fuzzy Hash: 6f846360ec075c4541c9f1a5530034d9101a4caa6f926ecb50699ad34919a3d6
                                                          • Instruction Fuzzy Hash: B551C675A002006FEB12AF24C8D6F6A77E5AB44718F44845CFA059F7D3C771AD418BA1
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                          • String ID:
                                                          • API String ID: 292994002-0
                                                          • Opcode ID: b756db0362fae5436db8881977d3a4fbe4d9d1849edbde80c880f9f5c250304f
                                                          • Instruction ID: 8c6d46de37e3654da65fd0feecbf3f28732e22c8954194536372a3d2db79cbcc
                                                          • Opcode Fuzzy Hash: b756db0362fae5436db8881977d3a4fbe4d9d1849edbde80c880f9f5c250304f
                                                          • Instruction Fuzzy Hash: AB2191317402105FD7229F1AC884F6A7BA9EF96315F1AD06CE84ACB352CB71EC42DB90
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                          • API String ID: 0-1546025612
                                                          • Opcode ID: 17eac49ce974cf8ad8fa92a7830afccd0b4cc022d234b9d3d630b4d7f949b4c2
                                                          • Instruction ID: 32c543e1319d82574ac451ef6b42341d37e8f0ea581a6d3d301411560b42454d
                                                          • Opcode Fuzzy Hash: 17eac49ce974cf8ad8fa92a7830afccd0b4cc022d234b9d3d630b4d7f949b4c2
                                                          • Instruction Fuzzy Hash: D4A2A174E0061ACBDF36CF58C8917AEB7B1BF44310F2585A9E819AB681DB749D81CF90
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 003982AA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: lstrlen
                                                          • String ID: ($tb?$|
                                                          • API String ID: 1659193697-3876775998
                                                          • Opcode ID: 1707fe567807c0055992674115a40c6388bdb07d31ea0ba57a5634af38e2cf7b
                                                          • Instruction ID: 19b434b85b6818954757c90e8d4a3b2e87b616321c5a0961e58d22a92e9f8d09
                                                          • Opcode Fuzzy Hash: 1707fe567807c0055992674115a40c6388bdb07d31ea0ba57a5634af38e2cf7b
                                                          • Instruction Fuzzy Hash: 34323679A006059FCB29CF59C481A6AB7F0FF88710B15C46EE59ADB7A1EB70E941CB40
                                                          APIs
                                                          • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 0039AAAC
                                                          • SetKeyboardState.USER32(00000080), ref: 0039AAC8
                                                          • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 0039AB36
                                                          • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 0039AB88
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: 28bb049169103dfebe68eace05a3f8cbf38d26b140437faccb59a5c462e76f88
                                                          • Instruction ID: 3a30f7031821ea092ed3f1cc24f454f04d4cd3f1b9816adb6206d0b91777532a
                                                          • Opcode Fuzzy Hash: 28bb049169103dfebe68eace05a3f8cbf38d26b140437faccb59a5c462e76f88
                                                          • Instruction Fuzzy Hash: 16313930A40A08AFFF37CB69CC05BFA7BAAAB45310F04431AF585961D0D7749981C7E2
                                                          APIs
                                                          • InternetReadFile.WININET(?,?,00000400,?), ref: 003ACE89
                                                          • GetLastError.KERNEL32(?,00000000), ref: 003ACEEA
                                                          • SetEvent.KERNEL32(?,?,00000000), ref: 003ACEFE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorEventFileInternetLastRead
                                                          • String ID:
                                                          • API String ID: 234945975-0
                                                          • Opcode ID: 092eb6751e440012f1e456bd59e503515cd5bd2ca66594799defec3f2b12dc7d
                                                          • Instruction ID: 846471081dff75d0e1203f9e704612a671f28718d053a83691fded423dc8a8bd
                                                          • Opcode Fuzzy Hash: 092eb6751e440012f1e456bd59e503515cd5bd2ca66594799defec3f2b12dc7d
                                                          • Instruction Fuzzy Hash: 5321BDB1510305AFEB22CF65C948FA677FCEB02355F10582EE646D2551EB70EE08CB90
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 003A5CC1
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 003A5D17
                                                          • FindClose.KERNEL32(?), ref: 003A5D5F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$CloseFirstNext
                                                          • String ID:
                                                          • API String ID: 3541575487-0
                                                          • Opcode ID: c17a7c33d3946bae98fb0972bfe731e476b979491bbca4d007b5ad56fdabaea0
                                                          • Instruction ID: 7f5a5bd4d1c107af27fbc7000110c3facabde792f11016e2fa7ac9e1b407d2ea
                                                          • Opcode Fuzzy Hash: c17a7c33d3946bae98fb0972bfe731e476b979491bbca4d007b5ad56fdabaea0
                                                          • Instruction Fuzzy Hash: D4517674604A019FC716DF28C494E9AB7E4FF4A324F15855DE99A8B3A1CB30E905CF91
                                                          APIs
                                                          • IsDebuggerPresent.KERNEL32 ref: 0036271A
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00362724
                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 00362731
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                          • String ID:
                                                          • API String ID: 3906539128-0
                                                          • Opcode ID: 94862e27eb190f6264ae365915462a1616b0b624d9041701aeeb16129acfa56d
                                                          • Instruction ID: 2ca9a34d2f398b57737d398b075726577ebed4bb580a4a943537b43efcaf787a
                                                          • Opcode Fuzzy Hash: 94862e27eb190f6264ae365915462a1616b0b624d9041701aeeb16129acfa56d
                                                          • Instruction Fuzzy Hash: 5831D67491121C9BCB22DF64DC88BDDB7B8AF08310F5081EAE80CA7261E7349F858F54
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 003A51DA
                                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 003A5238
                                                          • SetErrorMode.KERNEL32(00000000), ref: 003A52A1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DiskFreeSpace
                                                          • String ID:
                                                          • API String ID: 1682464887-0
                                                          • Opcode ID: b26487d99dd36895851bc88b150e1fcc3991f02425174918f05972149d0b4fff
                                                          • Instruction ID: 75f928f6152a403f2a0f7bc0adb3b284f1713daeb9fd204a3edb79d4b338f7c0
                                                          • Opcode Fuzzy Hash: b26487d99dd36895851bc88b150e1fcc3991f02425174918f05972149d0b4fff
                                                          • Instruction Fuzzy Hash: 82315A75A10508DFDB01DF54D884EADBBB4FF49314F088499E809AB362CB31E846CB90
                                                          APIs
                                                            • Part of subcall function 0034FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00350668
                                                            • Part of subcall function 0034FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00350685
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0039170D
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0039173A
                                                          • GetLastError.KERNEL32 ref: 0039174A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                          • String ID:
                                                          • API String ID: 577356006-0
                                                          • Opcode ID: 8060325c3d0547ed9e2cbe9040c214bdc7269b0bcca9657e36d825ad49ab866d
                                                          • Instruction ID: 0deebe9c8d881015b913e5af9d5a556d6a2b5e1de37ef15fb0c3845e0d429959
                                                          • Opcode Fuzzy Hash: 8060325c3d0547ed9e2cbe9040c214bdc7269b0bcca9657e36d825ad49ab866d
                                                          • Instruction Fuzzy Hash: FD11BFB2810205AFE7199F54EC86D6AB7FDEF04714B24852EE05696241EB70FC418B20
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0039D608
                                                          • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 0039D645
                                                          • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0039D650
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseControlCreateDeviceFileHandle
                                                          • String ID:
                                                          • API String ID: 33631002-0
                                                          • Opcode ID: 984e11ebae04e20158526c3b3d46f0d6daddc902f3e85a6b54d4def1a4d62e1c
                                                          • Instruction ID: 79cfc0ec1a97c7d93ffd90e208e935751d77f3705b3b2d058903051104dd0bd1
                                                          • Opcode Fuzzy Hash: 984e11ebae04e20158526c3b3d46f0d6daddc902f3e85a6b54d4def1a4d62e1c
                                                          • Instruction Fuzzy Hash: A711A175E01228BFDB118F95EC45FAFBFBCEB45B50F108115F908E7290C2705A018BA1
                                                          APIs
                                                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0039168C
                                                          • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 003916A1
                                                          • FreeSid.ADVAPI32(?), ref: 003916B1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: AllocateCheckFreeInitializeMembershipToken
                                                          • String ID:
                                                          • API String ID: 3429775523-0
                                                          • Opcode ID: 2e41b33a641486af0e3d3d6bcc38b73e1f903bb5e3c5962d8f3835959a37bb92
                                                          • Instruction ID: 4ba5c7f60f2a58d293f6a71a2878d68bf2faafe9ea32e2bf6cb027b93f617523
                                                          • Opcode Fuzzy Hash: 2e41b33a641486af0e3d3d6bcc38b73e1f903bb5e3c5962d8f3835959a37bb92
                                                          • Instruction Fuzzy Hash: D4F0F4B1950309FBDF01DFE49C89EAEBBBCFB08704F504565E901E2181E774EA448B54
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: /
                                                          • API String ID: 0-2043925204
                                                          • Opcode ID: aad2d7cdedc2058f7affeede67c4e62502cf105445713f730075560273c1c41a
                                                          • Instruction ID: cb6919c20c520b5182a3ac5e288743cb954d780f89be4fd0a97b8e03b52f82ab
                                                          • Opcode Fuzzy Hash: aad2d7cdedc2058f7affeede67c4e62502cf105445713f730075560273c1c41a
                                                          • Instruction Fuzzy Hash: F64149769002196FCB21DFB9CC5CDBB7778EB84314F208669F945CB284E6709D41CB50
                                                          APIs
                                                          • GetUserNameW.ADVAPI32(?,?), ref: 0038D28C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: NameUser
                                                          • String ID: X64
                                                          • API String ID: 2645101109-893830106
                                                          • Opcode ID: 86eba263fb376722b1e9f2a3a6828ea27b0ce143c6e5556056b2fbbb0894293b
                                                          • Instruction ID: 363d56b22d780909813bd55e568af4b2faaecc502cdb76d6a3c820b3b231020f
                                                          • Opcode Fuzzy Hash: 86eba263fb376722b1e9f2a3a6828ea27b0ce143c6e5556056b2fbbb0894293b
                                                          • Instruction Fuzzy Hash: 8ED0C9B481112DEACB91DB90EC88DD9B3BCBB04305F100591F106E2440D730A5488F10
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                          • Instruction ID: f76c324b289243f8693f42b04ab4b297a4ecee824b769ca2411fc15330637f63
                                                          • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                          • Instruction Fuzzy Hash: F2022C71E102199FDF15CFA9C880AADFBF1EF48319F259169D819EB390D731AA45CB80
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Variable is not of type 'Object'.$p#@
                                                          • API String ID: 0-655357629
                                                          • Opcode ID: e3379b9f2f4d84fca8d61720c38b9fef26b9ef9500a54cd6f64e68dbf15e14b2
                                                          • Instruction ID: de056fd003c6b108c66c28cd131e343256a9a302ac1dea53186fc0103097868c
                                                          • Opcode Fuzzy Hash: e3379b9f2f4d84fca8d61720c38b9fef26b9ef9500a54cd6f64e68dbf15e14b2
                                                          • Instruction Fuzzy Hash: 1532AE34910218DBCF1AEF90C9C1AEDB7B9BF05304F1550A9E806BF292D775AE49CB50
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 003A6918
                                                          • FindClose.KERNEL32(00000000), ref: 003A6961
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseFileFirst
                                                          • String ID:
                                                          • API String ID: 2295610775-0
                                                          • Opcode ID: 4c2ddd1b6423d6a46ac7d4afdd1ed68ea5c801242453ba065ef2a9f94e2d715b
                                                          • Instruction ID: 2e1a02ba322a66087af522935cace89899ae4c91850f513adfc575a51bf61fab
                                                          • Opcode Fuzzy Hash: 4c2ddd1b6423d6a46ac7d4afdd1ed68ea5c801242453ba065ef2a9f94e2d715b
                                                          • Instruction Fuzzy Hash: 7311D0356142009FC711CF29C4C9A16BBE4FF89328F09C69DE4698F6A2CB30EC05CB90
                                                          APIs
                                                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,003B4891,?,?,00000035,?), ref: 003A37E4
                                                          • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,003B4891,?,?,00000035,?), ref: 003A37F4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorFormatLastMessage
                                                          • String ID:
                                                          • API String ID: 3479602957-0
                                                          • Opcode ID: 1cc43e238fce0cbd9975b9465255a25540994e0cccb793747070d5bc6c6bf202
                                                          • Instruction ID: 15bcf667a97e9d6ffcfa69f812351a6d6ddffe552c7bf640785b202ce22031f9
                                                          • Opcode Fuzzy Hash: 1cc43e238fce0cbd9975b9465255a25540994e0cccb793747070d5bc6c6bf202
                                                          • Instruction Fuzzy Hash: 4DF0E5B16053286AEB2257669C4DFEB3AAEEFC5761F000265F509D2281D9A09904C7B0
                                                          APIs
                                                          • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 0039B25D
                                                          • keybd_event.USER32(?,7608C0D0,?,00000000), ref: 0039B270
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: InputSendkeybd_event
                                                          • String ID:
                                                          • API String ID: 3536248340-0
                                                          • Opcode ID: 7b2976840c5976b8cd3bb0e60f15c41a1f44b51e558dc0bcb9409b9e239ad7da
                                                          • Instruction ID: d03bd8d88810756b560ab416273272ea8ed65d5895f6c44b29fd36be6072136f
                                                          • Opcode Fuzzy Hash: 7b2976840c5976b8cd3bb0e60f15c41a1f44b51e558dc0bcb9409b9e239ad7da
                                                          • Instruction Fuzzy Hash: 73F06D7080424DABDF069FA0C805BAEBBB4FF04305F00840AF955E5192C37992019F94
                                                          APIs
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,003911FC), ref: 003910D4
                                                          • CloseHandle.KERNEL32(?,?,003911FC), ref: 003910E9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: AdjustCloseHandlePrivilegesToken
                                                          • String ID:
                                                          • API String ID: 81990902-0
                                                          • Opcode ID: 286a81e7a7d0811d468b66feb220f82c8b5acaa6470ff5ddb52cd666be37ffcc
                                                          • Instruction ID: 88e9f763a27dc47ace0d1d6b0b452fb8d537e97a478c1ff1737e332bb70e5eca
                                                          • Opcode Fuzzy Hash: 286a81e7a7d0811d468b66feb220f82c8b5acaa6470ff5ddb52cd666be37ffcc
                                                          • Instruction Fuzzy Hash: 7AE0BF72014651AEE7262B51FC05E7777EDFB04311F14882DF5A6844B5DB62BC90DB50
                                                          APIs
                                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00366766,?,?,00000008,?,?,0036FEFE,00000000), ref: 00366998
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ExceptionRaise
                                                          • String ID:
                                                          • API String ID: 3997070919-0
                                                          • Opcode ID: 5b6a1589b80ec558d59c3fe25b0cdd221120a2112f4893ef341921830b32eaa3
                                                          • Instruction ID: d7ed77ba6054bb5d523508c280ce8799470c110edab6bdb84e16fb58a09c3699
                                                          • Opcode Fuzzy Hash: 5b6a1589b80ec558d59c3fe25b0cdd221120a2112f4893ef341921830b32eaa3
                                                          • Instruction Fuzzy Hash: DAB13A716106089FD716CF28C48AB657BE0FF453A4F2AC65CE899CF2A6C335E991CB40
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID: 0-3916222277
                                                          • Opcode ID: 91a2cac8dc4da12abc6023437480da3687d9d64314569f624b018ad9a39e2a4a
                                                          • Instruction ID: 21f3bb1cb53c90364f522f1f1585a802f9efaf1e54ae6137473967c12c668fc0
                                                          • Opcode Fuzzy Hash: 91a2cac8dc4da12abc6023437480da3687d9d64314569f624b018ad9a39e2a4a
                                                          • Instruction Fuzzy Hash: 67126E759002299FCB26DF59C880AEEB7F5FF48310F55819AE849EB251DB709E81CF90
                                                          APIs
                                                          • BlockInput.USER32(00000001), ref: 003AEABD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: BlockInput
                                                          • String ID:
                                                          • API String ID: 3456056419-0
                                                          • Opcode ID: 94c4fddd41e4fd3c6d9e8af8e0175542941e9220c4715b5238f79e0e7ffe22e8
                                                          • Instruction ID: d473bd03eb43609c711225ce92a3f5e91156f8c4a38fb40925a843746b9f566c
                                                          • Opcode Fuzzy Hash: 94c4fddd41e4fd3c6d9e8af8e0175542941e9220c4715b5238f79e0e7ffe22e8
                                                          • Instruction Fuzzy Hash: 92E01A362202049FD711EF59D844E9AF7EDEF99760F00841AFD49DB351DA70AC408B90
                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,003503EE), ref: 003509DA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: 7e3fb02ebf6dc3b12a4f888f200c6e03437fce0a10f339fec2caa037051c5189
                                                          • Instruction ID: 6194fd11ecca6938c5ef420c80c741148b50d3afcd87d08ef425616cca335706
                                                          • Opcode Fuzzy Hash: 7e3fb02ebf6dc3b12a4f888f200c6e03437fce0a10f339fec2caa037051c5189
                                                          • Instruction Fuzzy Hash:
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0
                                                          • API String ID: 0-4108050209
                                                          • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                          • Instruction ID: f1968dd1a50a5da8f6c701b57a2c3476d648fbefaa0fa1e4bd4f40afd9bb10d0
                                                          • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                          • Instruction Fuzzy Hash: 7F51677160C6455BDB3B8628A85FFFE23999B12343F190509DC82DB6B2C715EE0DD3A2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0&@
                                                          • API String ID: 0-1848180278
                                                          • Opcode ID: 5bec0f454ff8e4b06f871400d07f5d20693cbe5e45254eb8c834d25586d0f7ff
                                                          • Instruction ID: 9de7b97fbf7528f52a019c4a515bdacf3607961dc7c54bf4d612678c579202fe
                                                          • Opcode Fuzzy Hash: 5bec0f454ff8e4b06f871400d07f5d20693cbe5e45254eb8c834d25586d0f7ff
                                                          • Instruction Fuzzy Hash: 2521D5322206118BD728CE79C92267F73E5EB54310F158A2EE4A7D73D0DE7AA904DB84
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: bd9af9f2d04dd9838f72a2c4aad2394e77dbc3f51be658f62c830b97f66ecca9
                                                          • Instruction ID: 87b1cebe20a055e0e646aaf7721ccca6b24fc8e1b4257e4b8001c9091c69b1e1
                                                          • Opcode Fuzzy Hash: bd9af9f2d04dd9838f72a2c4aad2394e77dbc3f51be658f62c830b97f66ecca9
                                                          • Instruction Fuzzy Hash: 86323422D2AF414DD7239635DC22336A34DAFB73C9F55D737E82AB59A9EB29C4834100
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e55149ace45c7def1be7fb61e160e67d56db4945c9785c408e81ed85a4a2600d
                                                          • Instruction ID: 87922e76f4e6d2fd5d3c938dc8fa292d67330d1c10064cc05516cf8c9a47f5a5
                                                          • Opcode Fuzzy Hash: e55149ace45c7def1be7fb61e160e67d56db4945c9785c408e81ed85a4a2600d
                                                          • Instruction Fuzzy Hash: 5F322931A203058BCF2BEF28C4D467D77E5EB45300F2AA5A6D959CB691D334ED82DB60
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 03389ff84d1222ebc6a35f42efefa5893504ffc6bd537ddd69ff7590af34ed98
                                                          • Instruction ID: b6eb8ae1ee6b93fa5049093fe66cede10633e858352e03797b0a45cd189a05d1
                                                          • Opcode Fuzzy Hash: 03389ff84d1222ebc6a35f42efefa5893504ffc6bd537ddd69ff7590af34ed98
                                                          • Instruction Fuzzy Hash: 3022C5B0A04609DFDF2ACF64C881BAEB7F5FF44300F148529E816AB291E779AD55CB50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 39e27e28945c3733e36530ace5d0772ef205408771a76de073e019de5035d704
                                                          • Instruction ID: a7d6568ea985bfd08146b545012f90ad704c955f8f8a54da772715e7f8e639ee
                                                          • Opcode Fuzzy Hash: 39e27e28945c3733e36530ace5d0772ef205408771a76de073e019de5035d704
                                                          • Instruction Fuzzy Hash: 8202C7B1E0010AEFDB16DF54D881AAEB7B5FF48300F118169E81ADF290E735EA50CB91
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                          • Instruction ID: 3a9756473ca93097744823709d188ca7979b38f64e769c3963f3a9d3c1607c6c
                                                          • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                          • Instruction Fuzzy Hash: E49176321080E34ADB2B463A8535A7EFFF15A523A371B079DDCF2CA1E5EE10895CD620
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                          • Instruction ID: 2115388321932e1fc467189b9025db696693b645c345a8c02604e3e6c2dc723c
                                                          • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                          • Instruction Fuzzy Hash: 489162722090A34ADB2F427A857493EFFE55A923A331B079DDCF2CA1E1FE14855CD620
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5c7949ccfd2543fe1f458a2429c216c18799797b714e129f0d1d6ee25222db85
                                                          • Instruction ID: 24792e704e75b2cc33db58e763e26862aea1949da438974faa2a8e0e60c2dd03
                                                          • Opcode Fuzzy Hash: 5c7949ccfd2543fe1f458a2429c216c18799797b714e129f0d1d6ee25222db85
                                                          • Instruction Fuzzy Hash: 7461677160878957EA3B9A28B899FBE2398DF41303F150919EC43DF3B1DA119E4E8355
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2ebbc7bcb8d8f7fb0e78d999dfd2b6e9102fdd9727f556312b7c99453cedebec
                                                          • Instruction ID: eb7329674dd2250a7e7fad5dc95f17bbf47f05f294ee46dd4d81c7f80690f181
                                                          • Opcode Fuzzy Hash: 2ebbc7bcb8d8f7fb0e78d999dfd2b6e9102fdd9727f556312b7c99453cedebec
                                                          • Instruction Fuzzy Hash: 8C61997120870957DE3B5A287896FBE23E8AF02703F110949EC43DF6B1EA129D4E8251
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                          • Instruction ID: d5080c76cfcf36ab21411d02bca05b3ebdc67adb365ee61284d1b994834fc9ff
                                                          • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                          • Instruction Fuzzy Hash: FB8187725080A309DB6F423D8534A7EFFE15A923A371B079DDCF2CA1E1EE14995CE660
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 003B2B30
                                                          • DeleteObject.GDI32(00000000), ref: 003B2B43
                                                          • DestroyWindow.USER32 ref: 003B2B52
                                                          • GetDesktopWindow.USER32 ref: 003B2B6D
                                                          • GetWindowRect.USER32(00000000), ref: 003B2B74
                                                          • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 003B2CA3
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 003B2CB1
                                                          • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003B2CF8
                                                          • GetClientRect.USER32(00000000,?), ref: 003B2D04
                                                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 003B2D40
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003B2D62
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003B2D75
                                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003B2D80
                                                          • GlobalLock.KERNEL32(00000000), ref: 003B2D89
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003B2D98
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 003B2DA1
                                                          • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003B2DA8
                                                          • GlobalFree.KERNEL32(00000000), ref: 003B2DB3
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003B2DC5
                                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,003CFC38,00000000), ref: 003B2DDB
                                                          • GlobalFree.KERNEL32(00000000), ref: 003B2DEB
                                                          • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 003B2E11
                                                          • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 003B2E30
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003B2E52
                                                          • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003B303F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                          • String ID: $AutoIt v3$DISPLAY$static
                                                          • API String ID: 2211948467-2373415609
                                                          • Opcode ID: 5a15b29d0f92d6443157d77f33eaa8f4a3937e3f0f29ae87378681213ebd7574
                                                          • Instruction ID: 1de84994881bc7ba5186d394dc5446646b45e41f7bdbbae5efb9268e0dcd2ec8
                                                          • Opcode Fuzzy Hash: 5a15b29d0f92d6443157d77f33eaa8f4a3937e3f0f29ae87378681213ebd7574
                                                          • Instruction Fuzzy Hash: FD027C71910219AFDB16DF64CD89EAE7BB9EF49314F048518F919EB2A1CB70ED01CB60
                                                          APIs
                                                          • SetTextColor.GDI32(?,00000000), ref: 003C712F
                                                          • GetSysColorBrush.USER32(0000000F), ref: 003C7160
                                                          • GetSysColor.USER32(0000000F), ref: 003C716C
                                                          • SetBkColor.GDI32(?,000000FF), ref: 003C7186
                                                          • SelectObject.GDI32(?,?), ref: 003C7195
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 003C71C0
                                                          • GetSysColor.USER32(00000010), ref: 003C71C8
                                                          • CreateSolidBrush.GDI32(00000000), ref: 003C71CF
                                                          • FrameRect.USER32(?,?,00000000), ref: 003C71DE
                                                          • DeleteObject.GDI32(00000000), ref: 003C71E5
                                                          • InflateRect.USER32(?,000000FE,000000FE), ref: 003C7230
                                                          • FillRect.USER32(?,?,?), ref: 003C7262
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 003C7284
                                                            • Part of subcall function 003C73E8: GetSysColor.USER32(00000012), ref: 003C7421
                                                            • Part of subcall function 003C73E8: SetTextColor.GDI32(?,?), ref: 003C7425
                                                            • Part of subcall function 003C73E8: GetSysColorBrush.USER32(0000000F), ref: 003C743B
                                                            • Part of subcall function 003C73E8: GetSysColor.USER32(0000000F), ref: 003C7446
                                                            • Part of subcall function 003C73E8: GetSysColor.USER32(00000011), ref: 003C7463
                                                            • Part of subcall function 003C73E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 003C7471
                                                            • Part of subcall function 003C73E8: SelectObject.GDI32(?,00000000), ref: 003C7482
                                                            • Part of subcall function 003C73E8: SetBkColor.GDI32(?,00000000), ref: 003C748B
                                                            • Part of subcall function 003C73E8: SelectObject.GDI32(?,?), ref: 003C7498
                                                            • Part of subcall function 003C73E8: InflateRect.USER32(?,000000FF,000000FF), ref: 003C74B7
                                                            • Part of subcall function 003C73E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 003C74CE
                                                            • Part of subcall function 003C73E8: GetWindowLongW.USER32(00000000,000000F0), ref: 003C74DB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                          • String ID:
                                                          • API String ID: 4124339563-0
                                                          • Opcode ID: 45ee0658936098a11ad0077ac4c5b6a54aecaab0616f8be1073f24f57ae35711
                                                          • Instruction ID: 287f7da80c1d5ea5cb6ab1ebe75e7da88d9714212613e536b2618f1be68aba8c
                                                          • Opcode Fuzzy Hash: 45ee0658936098a11ad0077ac4c5b6a54aecaab0616f8be1073f24f57ae35711
                                                          • Instruction Fuzzy Hash: 9FA19D72018301AFDB029F61DC48E6BBBA9FB89320F141A19F966D61E1D731F944CF91
                                                          APIs
                                                          • DestroyWindow.USER32(?,?), ref: 00348E14
                                                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 00386AC5
                                                          • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00386AFE
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00386F43
                                                            • Part of subcall function 00348F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00348BE8,?,00000000,?,?,?,?,00348BBA,00000000,?), ref: 00348FC5
                                                          • SendMessageW.USER32(?,00001053), ref: 00386F7F
                                                          • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00386F96
                                                          • ImageList_Destroy.COMCTL32(00000000,?), ref: 00386FAC
                                                          • ImageList_Destroy.COMCTL32(00000000,?), ref: 00386FB7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                          • String ID: 0$@q
                                                          • API String ID: 2760611726-1450264679
                                                          • Opcode ID: 8d28a93bcbc8230c57210f5d1d60ffe34123cab7fc3f653e841107345a8f4329
                                                          • Instruction ID: f0819ad5859bbb569006bfb543da91db37a5760e6f40e7f1e65dd70b3916c996
                                                          • Opcode Fuzzy Hash: 8d28a93bcbc8230c57210f5d1d60ffe34123cab7fc3f653e841107345a8f4329
                                                          • Instruction Fuzzy Hash: D912AB30600201DFDB27EF24C995BAAB7E9FB44300F1544A9E589DB662CB31FC92DB91
                                                          APIs
                                                          • DestroyWindow.USER32(00000000), ref: 003B273E
                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 003B286A
                                                          • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 003B28A9
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 003B28B9
                                                          • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 003B2900
                                                          • GetClientRect.USER32(00000000,?), ref: 003B290C
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 003B2955
                                                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 003B2964
                                                          • GetStockObject.GDI32(00000011), ref: 003B2974
                                                          • SelectObject.GDI32(00000000,00000000), ref: 003B2978
                                                          • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 003B2988
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 003B2991
                                                          • DeleteDC.GDI32(00000000), ref: 003B299A
                                                          • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 003B29C6
                                                          • SendMessageW.USER32(00000030,00000000,00000001), ref: 003B29DD
                                                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 003B2A1D
                                                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 003B2A31
                                                          • SendMessageW.USER32(00000404,00000001,00000000), ref: 003B2A42
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 003B2A77
                                                          • GetStockObject.GDI32(00000011), ref: 003B2A82
                                                          • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 003B2A8D
                                                          • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 003B2A97
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                          • API String ID: 2910397461-517079104
                                                          • Opcode ID: d3acf987375aa4005f98f9d9ed8871945171250656263509393ffb4df2e5bdad
                                                          • Instruction ID: 47d3c41e0db9b6075c80a6dae26884b68283f6b53f1be8cacb8f46508ac3dabc
                                                          • Opcode Fuzzy Hash: d3acf987375aa4005f98f9d9ed8871945171250656263509393ffb4df2e5bdad
                                                          • Instruction Fuzzy Hash: 32B16F71A10215AFEB15DF69CD8AFAF7BA9EB09714F004114FA14EB6A0D770ED40CB54
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 003A4AED
                                                          • GetDriveTypeW.KERNEL32(?,003CCB68,?,\\.\,003CCC08), ref: 003A4BCA
                                                          • SetErrorMode.KERNEL32(00000000,003CCB68,?,\\.\,003CCC08), ref: 003A4D36
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DriveType
                                                          • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                          • API String ID: 2907320926-4222207086
                                                          • Opcode ID: aa1d843e30b8bf25d6b1e2476a2d4acf56e6064aaaeca6166b66b9f1c96c6ff7
                                                          • Instruction ID: 8e601fa9b2b52eda7385b550fa07c232c82e35b140d6f3e6617f19caf608e3cb
                                                          • Opcode Fuzzy Hash: aa1d843e30b8bf25d6b1e2476a2d4acf56e6064aaaeca6166b66b9f1c96c6ff7
                                                          • Instruction Fuzzy Hash: 0061D330605309EBCB07DF28CA83DBC77B4EB86350B248415F90AABA56DBB1ED41DB51
                                                          APIs
                                                          • GetSysColor.USER32(00000012), ref: 003C7421
                                                          • SetTextColor.GDI32(?,?), ref: 003C7425
                                                          • GetSysColorBrush.USER32(0000000F), ref: 003C743B
                                                          • GetSysColor.USER32(0000000F), ref: 003C7446
                                                          • CreateSolidBrush.GDI32(?), ref: 003C744B
                                                          • GetSysColor.USER32(00000011), ref: 003C7463
                                                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 003C7471
                                                          • SelectObject.GDI32(?,00000000), ref: 003C7482
                                                          • SetBkColor.GDI32(?,00000000), ref: 003C748B
                                                          • SelectObject.GDI32(?,?), ref: 003C7498
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 003C74B7
                                                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 003C74CE
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 003C74DB
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 003C752A
                                                          • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 003C7554
                                                          • InflateRect.USER32(?,000000FD,000000FD), ref: 003C7572
                                                          • DrawFocusRect.USER32(?,?), ref: 003C757D
                                                          • GetSysColor.USER32(00000011), ref: 003C758E
                                                          • SetTextColor.GDI32(?,00000000), ref: 003C7596
                                                          • DrawTextW.USER32(?,003C70F5,000000FF,?,00000000), ref: 003C75A8
                                                          • SelectObject.GDI32(?,?), ref: 003C75BF
                                                          • DeleteObject.GDI32(?), ref: 003C75CA
                                                          • SelectObject.GDI32(?,?), ref: 003C75D0
                                                          • DeleteObject.GDI32(?), ref: 003C75D5
                                                          • SetTextColor.GDI32(?,?), ref: 003C75DB
                                                          • SetBkColor.GDI32(?,?), ref: 003C75E5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                          • String ID:
                                                          • API String ID: 1996641542-0
                                                          • Opcode ID: 34b059f7895b1d2a9d6573e295de1a75f24c49ad9b65cec028a0e10be12db1c3
                                                          • Instruction ID: 715b4e6cee5a6aebe8a912339a843f62d286d9c097b4e938db49f3cb53a7add1
                                                          • Opcode Fuzzy Hash: 34b059f7895b1d2a9d6573e295de1a75f24c49ad9b65cec028a0e10be12db1c3
                                                          • Instruction Fuzzy Hash: C8615972900218AFDB029FA5DC49EAEBFB9EB09320F155115F919EB2A1D771AD40CF90
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 003C1128
                                                          • GetDesktopWindow.USER32 ref: 003C113D
                                                          • GetWindowRect.USER32(00000000), ref: 003C1144
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 003C1199
                                                          • DestroyWindow.USER32(?), ref: 003C11B9
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 003C11ED
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 003C120B
                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 003C121D
                                                          • SendMessageW.USER32(00000000,00000421,?,?), ref: 003C1232
                                                          • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 003C1245
                                                          • IsWindowVisible.USER32(00000000), ref: 003C12A1
                                                          • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 003C12BC
                                                          • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 003C12D0
                                                          • GetWindowRect.USER32(00000000,?), ref: 003C12E8
                                                          • MonitorFromPoint.USER32(?,?,00000002), ref: 003C130E
                                                          • GetMonitorInfoW.USER32(00000000,?), ref: 003C1328
                                                          • CopyRect.USER32(?,?), ref: 003C133F
                                                          • SendMessageW.USER32(00000000,00000412,00000000), ref: 003C13AA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                          • String ID: ($0$tooltips_class32
                                                          • API String ID: 698492251-4156429822
                                                          • Opcode ID: b8bb5b61e1cde6a897ef62bac4bd09794732bb412181b59c29f8a36f39094080
                                                          • Instruction ID: d072f7e5bcbb4962c96b3df070fe53ce5d5aba2c2707745c411075c11a1247f3
                                                          • Opcode Fuzzy Hash: b8bb5b61e1cde6a897ef62bac4bd09794732bb412181b59c29f8a36f39094080
                                                          • Instruction Fuzzy Hash: 25B16671604341AFD711DF64C984F6ABBE8AB89344F00891CF999DB2A2C771EC44DB92
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 003C02E5
                                                          • _wcslen.LIBCMT ref: 003C031F
                                                          • _wcslen.LIBCMT ref: 003C0389
                                                          • _wcslen.LIBCMT ref: 003C03F1
                                                          • _wcslen.LIBCMT ref: 003C0475
                                                          • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 003C04C5
                                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 003C0504
                                                            • Part of subcall function 0034F9F2: _wcslen.LIBCMT ref: 0034F9FD
                                                            • Part of subcall function 0039223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00392258
                                                            • Part of subcall function 0039223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0039228A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$MessageSend$BuffCharUpper
                                                          • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                          • API String ID: 1103490817-719923060
                                                          • Opcode ID: 88391434dd26fc6533f9f8e43855adebc272b59e36de61f419c590cb5555ac5f
                                                          • Instruction ID: 6d98e9eee2ffa1eadc5d12138b3a0e985c9b8d16ef9273168fcf4f26de49852d
                                                          • Opcode Fuzzy Hash: 88391434dd26fc6533f9f8e43855adebc272b59e36de61f419c590cb5555ac5f
                                                          • Instruction Fuzzy Hash: BDE19B35208281CFCB1ADF24C591E2AB3E6BF89714F15495CF896AB6A1DB30ED45CB41
                                                          APIs
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00348968
                                                          • GetSystemMetrics.USER32(00000007), ref: 00348970
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0034899B
                                                          • GetSystemMetrics.USER32(00000008), ref: 003489A3
                                                          • GetSystemMetrics.USER32(00000004), ref: 003489C8
                                                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 003489E5
                                                          • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 003489F5
                                                          • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00348A28
                                                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00348A3C
                                                          • GetClientRect.USER32(00000000,000000FF), ref: 00348A5A
                                                          • GetStockObject.GDI32(00000011), ref: 00348A76
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00348A81
                                                            • Part of subcall function 0034912D: GetCursorPos.USER32(?), ref: 00349141
                                                            • Part of subcall function 0034912D: ScreenToClient.USER32(00000000,?), ref: 0034915E
                                                            • Part of subcall function 0034912D: GetAsyncKeyState.USER32(00000001), ref: 00349183
                                                            • Part of subcall function 0034912D: GetAsyncKeyState.USER32(00000002), ref: 0034919D
                                                          • SetTimer.USER32(00000000,00000000,00000028,003490FC), ref: 00348AA8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                          • String ID: AutoIt v3 GUI
                                                          • API String ID: 1458621304-248962490
                                                          • Opcode ID: 5b6ffdc352d1a73cf8d5ce4c84410de40ed05238ee719a23d1827a935062b7b9
                                                          • Instruction ID: a6d4c405e7dc08f85e6c8a23f6d3b57781c2327a42bfb293571dc5b431fe5992
                                                          • Opcode Fuzzy Hash: 5b6ffdc352d1a73cf8d5ce4c84410de40ed05238ee719a23d1827a935062b7b9
                                                          • Instruction Fuzzy Hash: 6DB17D71A002099FDB16EFA8CD45FAE3BB5FB48314F114229FA15EB2A0DB74E940CB55
                                                          APIs
                                                            • Part of subcall function 003910F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00391114
                                                            • Part of subcall function 003910F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00390B9B,?,?,?), ref: 00391120
                                                            • Part of subcall function 003910F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00390B9B,?,?,?), ref: 0039112F
                                                            • Part of subcall function 003910F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00390B9B,?,?,?), ref: 00391136
                                                            • Part of subcall function 003910F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0039114D
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00390DF5
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00390E29
                                                          • GetLengthSid.ADVAPI32(?), ref: 00390E40
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 00390E7A
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00390E96
                                                          • GetLengthSid.ADVAPI32(?), ref: 00390EAD
                                                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00390EB5
                                                          • HeapAlloc.KERNEL32(00000000), ref: 00390EBC
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00390EDD
                                                          • CopySid.ADVAPI32(00000000), ref: 00390EE4
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00390F13
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00390F35
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00390F47
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00390F6E
                                                          • HeapFree.KERNEL32(00000000), ref: 00390F75
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00390F7E
                                                          • HeapFree.KERNEL32(00000000), ref: 00390F85
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00390F8E
                                                          • HeapFree.KERNEL32(00000000), ref: 00390F95
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00390FA1
                                                          • HeapFree.KERNEL32(00000000), ref: 00390FA8
                                                            • Part of subcall function 00391193: GetProcessHeap.KERNEL32(00000008,00390BB1,?,00000000,?,00390BB1,?), ref: 003911A1
                                                            • Part of subcall function 00391193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00390BB1,?), ref: 003911A8
                                                            • Part of subcall function 00391193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00390BB1,?), ref: 003911B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                          • String ID:
                                                          • API String ID: 4175595110-0
                                                          • Opcode ID: 9118ff68a6fa784a231ee95420e28172719fed76c4b9c8bfb3561ecf612338a6
                                                          • Instruction ID: 591d971b0f1597b3d5939c7dfc5c3007eb66dd5c2b79112fbaf8c5791a471300
                                                          • Opcode Fuzzy Hash: 9118ff68a6fa784a231ee95420e28172719fed76c4b9c8bfb3561ecf612338a6
                                                          • Instruction Fuzzy Hash: D871597290021AAFDF269FA5DC48FAEBBBCFF04300F054115F91AE6291D731AA05CB60
                                                          APIs
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003BC4BD
                                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,003CCC08,00000000,?,00000000,?,?), ref: 003BC544
                                                          • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 003BC5A4
                                                          • _wcslen.LIBCMT ref: 003BC5F4
                                                          • _wcslen.LIBCMT ref: 003BC66F
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 003BC6B2
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 003BC7C1
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 003BC84D
                                                          • RegCloseKey.ADVAPI32(?), ref: 003BC881
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 003BC88E
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 003BC960
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                          • API String ID: 9721498-966354055
                                                          • Opcode ID: 1975a16c4e6d69dcfc9a85a37d06a15d27819108750c82ae45ca2170a1884062
                                                          • Instruction ID: 6f11561fe6292c89576c63abb5bc83f46801c57097d88303a9f37c2d5e22fbd2
                                                          • Opcode Fuzzy Hash: 1975a16c4e6d69dcfc9a85a37d06a15d27819108750c82ae45ca2170a1884062
                                                          • Instruction Fuzzy Hash: C01287752142009FDB26DF14C881E6AB7E5EF89718F05885DF98A9B7A2DB31FC41CB81
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 003C09C6
                                                          • _wcslen.LIBCMT ref: 003C0A01
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 003C0A54
                                                          • _wcslen.LIBCMT ref: 003C0A8A
                                                          • _wcslen.LIBCMT ref: 003C0B06
                                                          • _wcslen.LIBCMT ref: 003C0B81
                                                            • Part of subcall function 0034F9F2: _wcslen.LIBCMT ref: 0034F9FD
                                                            • Part of subcall function 00392BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00392BFA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$MessageSend$BuffCharUpper
                                                          • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                          • API String ID: 1103490817-4258414348
                                                          • Opcode ID: 1efeb9daeccfdde1dbecda061492c0be34fbb97194629e0991d863646eeafa4f
                                                          • Instruction ID: f24ed68e8ecccad1ec1a7c4a5ff5d992e74fbc8c0b3e2e6e820fd2c4bb57b205
                                                          • Opcode Fuzzy Hash: 1efeb9daeccfdde1dbecda061492c0be34fbb97194629e0991d863646eeafa4f
                                                          • Instruction Fuzzy Hash: D0E17935208741DFCB1AEF28C490A2AB7E1BF98314F15895CF8969B762D731ED45CB81
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharUpper
                                                          • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                          • API String ID: 1256254125-909552448
                                                          • Opcode ID: d6b6a0f05573936316549639a5926843304a40e639883f248469301292f6536e
                                                          • Instruction ID: 0d3f1788521cc8f6aa39382c0ff705bae852c994b1549ed7e359c294a2a97f2a
                                                          • Opcode Fuzzy Hash: d6b6a0f05573936316549639a5926843304a40e639883f248469301292f6536e
                                                          • Instruction Fuzzy Hash: 5C71163262012A8BCB32DE3CCD415FF3795AB60758F262128FE55ABA85E731DD4583A0
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 003C835A
                                                          • _wcslen.LIBCMT ref: 003C836E
                                                          • _wcslen.LIBCMT ref: 003C8391
                                                          • _wcslen.LIBCMT ref: 003C83B4
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 003C83F2
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,003C5BF2), ref: 003C844E
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 003C8487
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 003C84CA
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 003C8501
                                                          • FreeLibrary.KERNEL32(?), ref: 003C850D
                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 003C851D
                                                          • DestroyIcon.USER32(?,?,?,?,?,003C5BF2), ref: 003C852C
                                                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 003C8549
                                                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 003C8555
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                          • String ID: .dll$.exe$.icl
                                                          • API String ID: 799131459-1154884017
                                                          • Opcode ID: 1186b7de7a8355f07e742aa3b1bdd89cc28f8d98754c2b4d16bfe0ce78a4ca9d
                                                          • Instruction ID: dbf1df8364cc47aaf3a4433a38a89b3db209f552023ece8fd9f1ca7503793675
                                                          • Opcode Fuzzy Hash: 1186b7de7a8355f07e742aa3b1bdd89cc28f8d98754c2b4d16bfe0ce78a4ca9d
                                                          • Instruction Fuzzy Hash: E661DF71500219BAEB1ADF65CC81FBE77ACBB05B11F10460AF915DA0D1DBB4AE90CBA0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                          • API String ID: 0-1645009161
                                                          • Opcode ID: a0396894db1251b8e592d1c2b438f321de7d3cac8d249ed750f7f1c7370447a5
                                                          • Instruction ID: 33e84e0f95355229927dca2fb428bd8f31c398fae41fb9122931e4e88fdf4af3
                                                          • Opcode Fuzzy Hash: a0396894db1251b8e592d1c2b438f321de7d3cac8d249ed750f7f1c7370447a5
                                                          • Instruction Fuzzy Hash: FA81E5B1A04605BBDB37AF60CC83FBE77A8AF15301F058025F909AE192EBB5D945C791
                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?), ref: 003A3EF8
                                                          • _wcslen.LIBCMT ref: 003A3F03
                                                          • _wcslen.LIBCMT ref: 003A3F5A
                                                          • _wcslen.LIBCMT ref: 003A3F98
                                                          • GetDriveTypeW.KERNEL32(?), ref: 003A3FD6
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 003A401E
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 003A4059
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 003A4087
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                          • API String ID: 1839972693-4113822522
                                                          • Opcode ID: 01c2645e361f64a93713bdebed6b60b8e279a38c6d9476cd7630e3ade0fab1b7
                                                          • Instruction ID: 4fb2c93ee8c15bb90003d7e1e81ee0f61d608080ff44e92048c1ed62f91a23a3
                                                          • Opcode Fuzzy Hash: 01c2645e361f64a93713bdebed6b60b8e279a38c6d9476cd7630e3ade0fab1b7
                                                          • Instruction Fuzzy Hash: BD71F2326042019FC712EF24C88287AF7F4EF95758F11892DF9969B261EB30ED45CB91
                                                          APIs
                                                          • LoadIconW.USER32(00000063), ref: 00395A2E
                                                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00395A40
                                                          • SetWindowTextW.USER32(?,?), ref: 00395A57
                                                          • GetDlgItem.USER32(?,000003EA), ref: 00395A6C
                                                          • SetWindowTextW.USER32(00000000,?), ref: 00395A72
                                                          • GetDlgItem.USER32(?,000003E9), ref: 00395A82
                                                          • SetWindowTextW.USER32(00000000,?), ref: 00395A88
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00395AA9
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00395AC3
                                                          • GetWindowRect.USER32(?,?), ref: 00395ACC
                                                          • _wcslen.LIBCMT ref: 00395B33
                                                          • SetWindowTextW.USER32(?,?), ref: 00395B6F
                                                          • GetDesktopWindow.USER32 ref: 00395B75
                                                          • GetWindowRect.USER32(00000000), ref: 00395B7C
                                                          • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00395BD3
                                                          • GetClientRect.USER32(?,?), ref: 00395BE0
                                                          • PostMessageW.USER32(?,00000005,00000000,?), ref: 00395C05
                                                          • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00395C2F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                          • String ID:
                                                          • API String ID: 895679908-0
                                                          • Opcode ID: f89c70822905873ccd8d2efd8f26344a064b5b7b044f32abbe24a23b6e0bc86e
                                                          • Instruction ID: 9d155fa364839b97715f5940dc23709533ce2c72d559c11c906c59d1bfcf24d3
                                                          • Opcode Fuzzy Hash: f89c70822905873ccd8d2efd8f26344a064b5b7b044f32abbe24a23b6e0bc86e
                                                          • Instruction Fuzzy Hash: E7716C31900B09AFDF22DFA8CE85E6EBBF9FF48704F104518E586A65A0D775A990CB50
                                                          APIs
                                                          • LoadCursorW.USER32(00000000,00007F89), ref: 003AFE27
                                                          • LoadCursorW.USER32(00000000,00007F8A), ref: 003AFE32
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 003AFE3D
                                                          • LoadCursorW.USER32(00000000,00007F03), ref: 003AFE48
                                                          • LoadCursorW.USER32(00000000,00007F8B), ref: 003AFE53
                                                          • LoadCursorW.USER32(00000000,00007F01), ref: 003AFE5E
                                                          • LoadCursorW.USER32(00000000,00007F81), ref: 003AFE69
                                                          • LoadCursorW.USER32(00000000,00007F88), ref: 003AFE74
                                                          • LoadCursorW.USER32(00000000,00007F80), ref: 003AFE7F
                                                          • LoadCursorW.USER32(00000000,00007F86), ref: 003AFE8A
                                                          • LoadCursorW.USER32(00000000,00007F83), ref: 003AFE95
                                                          • LoadCursorW.USER32(00000000,00007F85), ref: 003AFEA0
                                                          • LoadCursorW.USER32(00000000,00007F82), ref: 003AFEAB
                                                          • LoadCursorW.USER32(00000000,00007F84), ref: 003AFEB6
                                                          • LoadCursorW.USER32(00000000,00007F04), ref: 003AFEC1
                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 003AFECC
                                                          • GetCursorInfo.USER32(?), ref: 003AFEDC
                                                          • GetLastError.KERNEL32 ref: 003AFF1E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Cursor$Load$ErrorInfoLast
                                                          • String ID:
                                                          • API String ID: 3215588206-0
                                                          • Opcode ID: 2bf1dd637cab2a6d78a8e165e59b7e0a6da9458d56f0257376337003b0b46c13
                                                          • Instruction ID: 88d943cae7987bd3399086b888cfb7ea90da31aa311ec816d08c01ec162e0bc9
                                                          • Opcode Fuzzy Hash: 2bf1dd637cab2a6d78a8e165e59b7e0a6da9458d56f0257376337003b0b46c13
                                                          • Instruction Fuzzy Hash: A84161B0D083196EDB119FBA8C89C5EBFE8FF05754B54452AE11DEB281DB78A901CF90
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[?
                                                          • API String ID: 176396367-1448639043
                                                          • Opcode ID: 177f9012f259230eaef32e03a4e049040d473e58597badfbf6ba2b8fdd91261e
                                                          • Instruction ID: a555c3974ee41f83575249f658547f4227308302b012e0a1f58f26fc0f89f15f
                                                          • Opcode Fuzzy Hash: 177f9012f259230eaef32e03a4e049040d473e58597badfbf6ba2b8fdd91261e
                                                          • Instruction Fuzzy Hash: 25E1E572A00516ABCF1B9FA8C481BFEFBB4BF44710F568119E556FB250DB30AE858790
                                                          APIs
                                                            • Part of subcall function 00349BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00349BB2
                                                          • DragQueryPoint.SHELL32(?,?), ref: 003C9147
                                                            • Part of subcall function 003C7674: ClientToScreen.USER32(?,?), ref: 003C769A
                                                            • Part of subcall function 003C7674: GetWindowRect.USER32(?,?), ref: 003C7710
                                                            • Part of subcall function 003C7674: PtInRect.USER32(?,?,003C8B89), ref: 003C7720
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 003C91B0
                                                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 003C91BB
                                                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 003C91DE
                                                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 003C9225
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 003C923E
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 003C9255
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 003C9277
                                                          • DragFinish.SHELL32(?), ref: 003C927E
                                                          • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 003C9371
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$@q$p#@
                                                          • API String ID: 221274066-3419139634
                                                          • Opcode ID: 32ff6184d0ded994427a584d460225cb3c12cbc23ea0ce1299fda2f055b18252
                                                          • Instruction ID: 30d93a0a6c1d8c0b9b7961b2b1be459276aceaeb193245c306838f8668ef1494
                                                          • Opcode Fuzzy Hash: 32ff6184d0ded994427a584d460225cb3c12cbc23ea0ce1299fda2f055b18252
                                                          • Instruction Fuzzy Hash: 76618D71108305AFC702DF64DD89EAFBBE8EF88750F00492EF595971A0DB70AA49CB52
                                                          APIs
                                                          • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 003500C6
                                                            • Part of subcall function 003500ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0040070C,00000FA0,ADD06086,?,?,?,?,003723B3,000000FF), ref: 0035011C
                                                            • Part of subcall function 003500ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,003723B3,000000FF), ref: 00350127
                                                            • Part of subcall function 003500ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,003723B3,000000FF), ref: 00350138
                                                            • Part of subcall function 003500ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 0035014E
                                                            • Part of subcall function 003500ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0035015C
                                                            • Part of subcall function 003500ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0035016A
                                                            • Part of subcall function 003500ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00350195
                                                            • Part of subcall function 003500ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 003501A0
                                                          • ___scrt_fastfail.LIBCMT ref: 003500E7
                                                            • Part of subcall function 003500A3: __onexit.LIBCMT ref: 003500A9
                                                          Strings
                                                          • kernel32.dll, xrefs: 00350133
                                                          • SleepConditionVariableCS, xrefs: 00350154
                                                          • WakeAllConditionVariable, xrefs: 00350162
                                                          • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00350122
                                                          • InitializeConditionVariable, xrefs: 00350148
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                          • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                          • API String ID: 66158676-1714406822
                                                          • Opcode ID: d2bdadc748447ed92e835bba67dba1c6cb7131944385cbb1b335c974ab02eb2e
                                                          • Instruction ID: f7d25b1379f92bbe78ead8d11d2a6f82e8f3e6be4527bf8ad27d93b8e7e19d91
                                                          • Opcode Fuzzy Hash: d2bdadc748447ed92e835bba67dba1c6cb7131944385cbb1b335c974ab02eb2e
                                                          • Instruction Fuzzy Hash: C62129366407006FE7176B64AC0AF6A73D8DB04B52F05013AFC05E72E1DF75AC048B95
                                                          APIs
                                                          • CharLowerBuffW.USER32(00000000,00000000,003CCC08), ref: 003A4527
                                                          • _wcslen.LIBCMT ref: 003A453B
                                                          • _wcslen.LIBCMT ref: 003A4599
                                                          • _wcslen.LIBCMT ref: 003A45F4
                                                          • _wcslen.LIBCMT ref: 003A463F
                                                          • _wcslen.LIBCMT ref: 003A46A7
                                                            • Part of subcall function 0034F9F2: _wcslen.LIBCMT ref: 0034F9FD
                                                          • GetDriveTypeW.KERNEL32(?,003F6BF0,00000061), ref: 003A4743
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharDriveLowerType
                                                          • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                          • API String ID: 2055661098-1000479233
                                                          • Opcode ID: 8c7c612ad472570d836c1a929963307f481245e4fe2cdb9d5da436be480df8e7
                                                          • Instruction ID: d20f191a2182f97e402e432ce5054bc56b0a8e9140cd04428b6d3984406a1b0a
                                                          • Opcode Fuzzy Hash: 8c7c612ad472570d836c1a929963307f481245e4fe2cdb9d5da436be480df8e7
                                                          • Instruction Fuzzy Hash: 61B1EF316083029FC716DF28C891A6AB7E5EFE7720F51491DF496CB2A1E7B1D844CB92
                                                          APIs
                                                          • DestroyWindow.USER32(00000000,?), ref: 003C6DEB
                                                            • Part of subcall function 00336B57: _wcslen.LIBCMT ref: 00336B6A
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 003C6E5F
                                                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 003C6E81
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 003C6E94
                                                          • DestroyWindow.USER32(?), ref: 003C6EB5
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00330000,00000000), ref: 003C6EE4
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 003C6EFD
                                                          • GetDesktopWindow.USER32 ref: 003C6F16
                                                          • GetWindowRect.USER32(00000000), ref: 003C6F1D
                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 003C6F35
                                                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 003C6F4D
                                                            • Part of subcall function 00349944: GetWindowLongW.USER32(?,000000EB), ref: 00349952
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                          • String ID: 0$@q$tooltips_class32
                                                          • API String ID: 2429346358-1692312886
                                                          • Opcode ID: b8a484f45dc8b0909883ab872700d9f666d1a5ff5fe8e38d81ff747b3057125c
                                                          • Instruction ID: b850a23b0fa6f4ad20362ede217385762b1bff5e92c01c5f539be380254f1753
                                                          • Opcode Fuzzy Hash: b8a484f45dc8b0909883ab872700d9f666d1a5ff5fe8e38d81ff747b3057125c
                                                          • Instruction Fuzzy Hash: 6D715574104244AFDB22DF28DD59FAABBE9EF89304F08442EF989D7261C770AD06DB15
                                                          APIs
                                                          • GetMenuItemCount.USER32(00401990), ref: 00372F8D
                                                          • GetMenuItemCount.USER32(00401990), ref: 0037303D
                                                          • GetCursorPos.USER32(?), ref: 00373081
                                                          • SetForegroundWindow.USER32(00000000), ref: 0037308A
                                                          • TrackPopupMenuEx.USER32(00401990,00000000,?,00000000,00000000,00000000), ref: 0037309D
                                                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 003730A9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                          • String ID: 0
                                                          • API String ID: 36266755-4108050209
                                                          • Opcode ID: 7abd737fdab54452e0026d1bea10e283f0635fc1404304a7622d49be763d13ae
                                                          • Instruction ID: b575dc201b0a9176f2d6f136a9b6340a41a27d1118852640351e9e71f31d53e0
                                                          • Opcode Fuzzy Hash: 7abd737fdab54452e0026d1bea10e283f0635fc1404304a7622d49be763d13ae
                                                          • Instruction Fuzzy Hash: 3F71E671644205BEEB338F25DC89FABBF68FF05364F208216F519AA1E0C7B5A910DB50
                                                          APIs
                                                            • Part of subcall function 00348F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00348BE8,?,00000000,?,?,?,?,00348BBA,00000000,?), ref: 00348FC5
                                                          • DestroyWindow.USER32(?), ref: 00348C81
                                                          • KillTimer.USER32(00000000,?,?,?,?,00348BBA,00000000,?), ref: 00348D1B
                                                          • DestroyAcceleratorTable.USER32(00000000), ref: 00386973
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00348BBA,00000000,?), ref: 003869A1
                                                          • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00348BBA,00000000,?), ref: 003869B8
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00348BBA,00000000), ref: 003869D4
                                                          • DeleteObject.GDI32(00000000), ref: 003869E6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                          • String ID: @q
                                                          • API String ID: 641708696-962691702
                                                          • Opcode ID: 4a9aebc986ef8dc2a303b0086e883644fab3776a2c94a49019d18cd8acee7a59
                                                          • Instruction ID: 8e0e7c5f1bcc7f64df366fd208e21300ea2487ed63d62ca343bf45ee07faaff3
                                                          • Opcode Fuzzy Hash: 4a9aebc986ef8dc2a303b0086e883644fab3776a2c94a49019d18cd8acee7a59
                                                          • Instruction Fuzzy Hash: 36617871502710DFCB27AF14DA89B29B7F5FB40312F159568E046AA9B0CB35BD90CF94
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 003AC4B0
                                                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 003AC4C3
                                                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 003AC4D7
                                                          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 003AC4F0
                                                          • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 003AC533
                                                          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 003AC549
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 003AC554
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 003AC584
                                                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 003AC5DC
                                                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 003AC5F0
                                                          • InternetCloseHandle.WININET(00000000), ref: 003AC5FB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                          • String ID:
                                                          • API String ID: 3800310941-3916222277
                                                          • Opcode ID: a52d36612e1ca7d774226ce587fe01af40080d33ab892460f2e9cf1a11af7e68
                                                          • Instruction ID: ef53319b3283116355678a7b77bbe0bf56d54c63adae3c8ec743ee2e7f8fdba9
                                                          • Opcode Fuzzy Hash: a52d36612e1ca7d774226ce587fe01af40080d33ab892460f2e9cf1a11af7e68
                                                          • Instruction Fuzzy Hash: 99514BB1510204BFDB238F61C948EAA7BFCFF0A744F006519F949D6610DB35E944DB60
                                                          APIs
                                                            • Part of subcall function 00349944: GetWindowLongW.USER32(?,000000EB), ref: 00349952
                                                          • GetSysColor.USER32(0000000F), ref: 00349862
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ColorLongWindow
                                                          • String ID: @q
                                                          • API String ID: 259745315-962691702
                                                          • Opcode ID: 9320c48d443e5b82404dbade91b60119ed4079fa97096230c6f5663ba2c6469e
                                                          • Instruction ID: cea4c19b6bb1628bbceae7e752306fff377673fdf6d883762f4029431c03b37b
                                                          • Opcode Fuzzy Hash: 9320c48d443e5b82404dbade91b60119ed4079fa97096230c6f5663ba2c6469e
                                                          • Instruction Fuzzy Hash: A34185311046409FDB225F3D9C44FBA37E9AB46330F294656F9A68B1E1D731EC42DB10
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 003C8592
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 003C85A2
                                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 003C85AD
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 003C85BA
                                                          • GlobalLock.KERNEL32(00000000), ref: 003C85C8
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 003C85D7
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 003C85E0
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 003C85E7
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 003C85F8
                                                          • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,003CFC38,?), ref: 003C8611
                                                          • GlobalFree.KERNEL32(00000000), ref: 003C8621
                                                          • GetObjectW.GDI32(?,00000018,?), ref: 003C8641
                                                          • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 003C8671
                                                          • DeleteObject.GDI32(?), ref: 003C8699
                                                          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 003C86AF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                          • String ID:
                                                          • API String ID: 3840717409-0
                                                          • Opcode ID: a6d57486e6006a32aae337b1257b8d263bc6e84a536abd7ae929fb99f500cace
                                                          • Instruction ID: 97481e60935a43c1c16f7d23834e6ab07d61d21bb08d91a0730459e76b1e04d6
                                                          • Opcode Fuzzy Hash: a6d57486e6006a32aae337b1257b8d263bc6e84a536abd7ae929fb99f500cace
                                                          • Instruction Fuzzy Hash: 7A410C75610204AFDB129FA5DC48EAABBBCFF89711F154458F909E7260DB70AE01DB60
                                                          APIs
                                                          • VariantInit.OLEAUT32(00000000), ref: 003A1502
                                                          • VariantCopy.OLEAUT32(?,?), ref: 003A150B
                                                          • VariantClear.OLEAUT32(?), ref: 003A1517
                                                          • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 003A15FB
                                                          • VarR8FromDec.OLEAUT32(?,?), ref: 003A1657
                                                          • VariantInit.OLEAUT32(?), ref: 003A1708
                                                          • SysFreeString.OLEAUT32(?), ref: 003A178C
                                                          • VariantClear.OLEAUT32(?), ref: 003A17D8
                                                          • VariantClear.OLEAUT32(?), ref: 003A17E7
                                                          • VariantInit.OLEAUT32(00000000), ref: 003A1823
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                          • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                          • API String ID: 1234038744-3931177956
                                                          • Opcode ID: bf9578426dbab9cc62aa7bb2d469b1e1cdb246704e62d45b71f6efc8c1fa2ad1
                                                          • Instruction ID: ed5174aaf77762885d7e0af0d2bfa7797c1d105e32500908807435ffa9eed73a
                                                          • Opcode Fuzzy Hash: bf9578426dbab9cc62aa7bb2d469b1e1cdb246704e62d45b71f6efc8c1fa2ad1
                                                          • Instruction Fuzzy Hash: 26D10E32E00505EBDB02AFA5D895BB9B7B9FF47700F14805AE846AF580DB30EC41DBA1
                                                          APIs
                                                            • Part of subcall function 00339CB3: _wcslen.LIBCMT ref: 00339CBD
                                                            • Part of subcall function 003BC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,003BB6AE,?,?), ref: 003BC9B5
                                                            • Part of subcall function 003BC998: _wcslen.LIBCMT ref: 003BC9F1
                                                            • Part of subcall function 003BC998: _wcslen.LIBCMT ref: 003BCA68
                                                            • Part of subcall function 003BC998: _wcslen.LIBCMT ref: 003BCA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003BB6F4
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 003BB772
                                                          • RegDeleteValueW.ADVAPI32(?,?), ref: 003BB80A
                                                          • RegCloseKey.ADVAPI32(?), ref: 003BB87E
                                                          • RegCloseKey.ADVAPI32(?), ref: 003BB89C
                                                          • LoadLibraryA.KERNEL32(advapi32.dll), ref: 003BB8F2
                                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 003BB904
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 003BB922
                                                          • FreeLibrary.KERNEL32(00000000), ref: 003BB983
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 003BB994
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 146587525-4033151799
                                                          • Opcode ID: 4b315ca804c4b4b1902c199458acc86794bafd1ee74d1eb6995fd2a60756bf34
                                                          • Instruction ID: f9f510fb033d6afbcb4213ee6e6b8c3293e8fcb49172fa0a99ab916e0d7f9c15
                                                          • Opcode Fuzzy Hash: 4b315ca804c4b4b1902c199458acc86794bafd1ee74d1eb6995fd2a60756bf34
                                                          • Instruction Fuzzy Hash: 93C19D34208201AFD712DF14C495F6AFBE5FF84318F15849CE69A8B6A2CBB1ED45CB91
                                                          APIs
                                                            • Part of subcall function 00349BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00349BB2
                                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 003C8D5A
                                                          • GetFocus.USER32 ref: 003C8D6A
                                                          • GetDlgCtrlID.USER32(00000000), ref: 003C8D75
                                                          • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 003C8E1D
                                                          • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 003C8ECF
                                                          • GetMenuItemCount.USER32(?), ref: 003C8EEC
                                                          • GetMenuItemID.USER32(?,00000000), ref: 003C8EFC
                                                          • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 003C8F2E
                                                          • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 003C8F70
                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 003C8FA1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                          • String ID: 0$@q
                                                          • API String ID: 1026556194-1450264679
                                                          • Opcode ID: 6b07957c97fab6d38843646eb24975cbc2410a4904c6bbbcabcffaf6ae60c0bb
                                                          • Instruction ID: 234f33bd56213dbd3803d9b6c134c70a19ae7c1999002fbcd41038655583ccca
                                                          • Opcode Fuzzy Hash: 6b07957c97fab6d38843646eb24975cbc2410a4904c6bbbcabcffaf6ae60c0bb
                                                          • Instruction Fuzzy Hash: 58817B715083019BD712CF24D884EABBBE9FB89754F15092DF989DB291DB30EE01CBA1
                                                          APIs
                                                          • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 003C5504
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 003C5515
                                                          • CharNextW.USER32(00000158), ref: 003C5544
                                                          • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 003C5585
                                                          • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 003C559B
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 003C55AC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CharNext
                                                          • String ID: @q
                                                          • API String ID: 1350042424-962691702
                                                          • Opcode ID: f21112e81912598c437ed54f0767f0a3d534810b190190dca693c82580fb77c0
                                                          • Instruction ID: 626ba5d3d33078b0fa81ff6e589171cba67c51633fc7029a6b8baa7bfa8fd69c
                                                          • Opcode Fuzzy Hash: f21112e81912598c437ed54f0767f0a3d534810b190190dca693c82580fb77c0
                                                          • Instruction Fuzzy Hash: 64619C31904608ABDF129F55CC84EFE7BBDEB0A321F148149F925EA291D774AEC0DB60
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 003B25D8
                                                          • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 003B25E8
                                                          • CreateCompatibleDC.GDI32(?), ref: 003B25F4
                                                          • SelectObject.GDI32(00000000,?), ref: 003B2601
                                                          • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 003B266D
                                                          • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 003B26AC
                                                          • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 003B26D0
                                                          • SelectObject.GDI32(?,?), ref: 003B26D8
                                                          • DeleteObject.GDI32(?), ref: 003B26E1
                                                          • DeleteDC.GDI32(?), ref: 003B26E8
                                                          • ReleaseDC.USER32(00000000,?), ref: 003B26F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                          • String ID: (
                                                          • API String ID: 2598888154-3887548279
                                                          • Opcode ID: e278e2df4b5b3c7e85d637b30600309714828d1916bea0a4dd5eb4ebffbe64a2
                                                          • Instruction ID: a6b80b54b716300d19dbed2ed2fd355c3818698280649b8ccc60aca294d095be
                                                          • Opcode Fuzzy Hash: e278e2df4b5b3c7e85d637b30600309714828d1916bea0a4dd5eb4ebffbe64a2
                                                          • Instruction Fuzzy Hash: F161E275D00219EFCB05CFA8D884EAEBBB9FF48310F248529EA59A7650D770A951CF50
                                                          APIs
                                                          • ___free_lconv_mon.LIBCMT ref: 0036DAA1
                                                            • Part of subcall function 0036D63C: _free.LIBCMT ref: 0036D659
                                                            • Part of subcall function 0036D63C: _free.LIBCMT ref: 0036D66B
                                                            • Part of subcall function 0036D63C: _free.LIBCMT ref: 0036D67D
                                                            • Part of subcall function 0036D63C: _free.LIBCMT ref: 0036D68F
                                                            • Part of subcall function 0036D63C: _free.LIBCMT ref: 0036D6A1
                                                            • Part of subcall function 0036D63C: _free.LIBCMT ref: 0036D6B3
                                                            • Part of subcall function 0036D63C: _free.LIBCMT ref: 0036D6C5
                                                            • Part of subcall function 0036D63C: _free.LIBCMT ref: 0036D6D7
                                                            • Part of subcall function 0036D63C: _free.LIBCMT ref: 0036D6E9
                                                            • Part of subcall function 0036D63C: _free.LIBCMT ref: 0036D6FB
                                                            • Part of subcall function 0036D63C: _free.LIBCMT ref: 0036D70D
                                                            • Part of subcall function 0036D63C: _free.LIBCMT ref: 0036D71F
                                                            • Part of subcall function 0036D63C: _free.LIBCMT ref: 0036D731
                                                          • _free.LIBCMT ref: 0036DA96
                                                            • Part of subcall function 003629C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0036D7D1,00000000,00000000,00000000,00000000,?,0036D7F8,00000000,00000007,00000000,?,0036DBF5,00000000), ref: 003629DE
                                                            • Part of subcall function 003629C8: GetLastError.KERNEL32(00000000,?,0036D7D1,00000000,00000000,00000000,00000000,?,0036D7F8,00000000,00000007,00000000,?,0036DBF5,00000000,00000000), ref: 003629F0
                                                          • _free.LIBCMT ref: 0036DAB8
                                                          • _free.LIBCMT ref: 0036DACD
                                                          • _free.LIBCMT ref: 0036DAD8
                                                          • _free.LIBCMT ref: 0036DAFA
                                                          • _free.LIBCMT ref: 0036DB0D
                                                          • _free.LIBCMT ref: 0036DB1B
                                                          • _free.LIBCMT ref: 0036DB26
                                                          • _free.LIBCMT ref: 0036DB5E
                                                          • _free.LIBCMT ref: 0036DB65
                                                          • _free.LIBCMT ref: 0036DB82
                                                          • _free.LIBCMT ref: 0036DB9A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                          • String ID:
                                                          • API String ID: 161543041-0
                                                          • Opcode ID: 278177196097487cac48de3a350a71367e66c0310c5230840ccae3f19cb8f322
                                                          • Instruction ID: dfc110e27de1b08c7e9c5d28a5194ca201564474e56af22a5237be7576bcf861
                                                          • Opcode Fuzzy Hash: 278177196097487cac48de3a350a71367e66c0310c5230840ccae3f19cb8f322
                                                          • Instruction Fuzzy Hash: A6315A31B046049FEB27AA79E845B6B77E9FF42350F16C419E449DB199DB30AC508720
                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 0039369C
                                                          • _wcslen.LIBCMT ref: 003936A7
                                                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00393797
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 0039380C
                                                          • GetDlgCtrlID.USER32(?), ref: 0039385D
                                                          • GetWindowRect.USER32(?,?), ref: 00393882
                                                          • GetParent.USER32(?), ref: 003938A0
                                                          • ScreenToClient.USER32(00000000), ref: 003938A7
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00393921
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 0039395D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                          • String ID: %s%u
                                                          • API String ID: 4010501982-679674701
                                                          • Opcode ID: 5748febb2b875b52b7824c17dc473fbeb6ca6a0dd5ecd003dacd9614d32afd35
                                                          • Instruction ID: a648bcd9a0d8653c253dd18489b8d66cd5745203d74aaeb2d8ee2e2aad52fb8f
                                                          • Opcode Fuzzy Hash: 5748febb2b875b52b7824c17dc473fbeb6ca6a0dd5ecd003dacd9614d32afd35
                                                          • Instruction Fuzzy Hash: 1791B3B1204606AFDB1ADF64C885FEAF7A8FF44350F008529F999D6190DB30EA59CB91
                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 00394994
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 003949DA
                                                          • _wcslen.LIBCMT ref: 003949EB
                                                          • CharUpperBuffW.USER32(?,00000000), ref: 003949F7
                                                          • _wcsstr.LIBVCRUNTIME ref: 00394A2C
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00394A64
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 00394A9D
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00394AE6
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 00394B20
                                                          • GetWindowRect.USER32(?,?), ref: 00394B8B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                          • String ID: ThumbnailClass
                                                          • API String ID: 1311036022-1241985126
                                                          • Opcode ID: 210c1f81d6bb26001a7abf102b0a2b2a5b867d8f13517cefe66c46e7e29ed6d6
                                                          • Instruction ID: f5db9d029bac249ef57305214df8310d543c629ec440f2e50064f5608c127cc6
                                                          • Opcode Fuzzy Hash: 210c1f81d6bb26001a7abf102b0a2b2a5b867d8f13517cefe66c46e7e29ed6d6
                                                          • Instruction Fuzzy Hash: BA91A1721082059FDF06DF14C985FAA77E8FF84314F05846AFD899A196EB30ED46CBA1
                                                          APIs
                                                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 003C3A9D
                                                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 003C3AA0
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 003C3AC7
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 003C3AEA
                                                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 003C3B62
                                                          • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 003C3BAC
                                                          • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 003C3BC7
                                                          • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 003C3BE2
                                                          • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 003C3BF6
                                                          • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 003C3C13
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$LongWindow
                                                          • String ID: @q
                                                          • API String ID: 312131281-962691702
                                                          • Opcode ID: 26b5531d4a7ea3b957e06b9065284c0a13683d04dcfefc3ce1d7da5a74432f59
                                                          • Instruction ID: f2f70812aee2608e0b5ad3995fbe8d521817498e62f6b6a424d07b88d3379393
                                                          • Opcode Fuzzy Hash: 26b5531d4a7ea3b957e06b9065284c0a13683d04dcfefc3ce1d7da5a74432f59
                                                          • Instruction Fuzzy Hash: 38616B75900248AFDB11DFA8CD81FEE77B8EB09700F1081A9FA15EB2A1D774AE45DB50
                                                          APIs
                                                          • GetFileVersionInfoSizeW.VERSION(?,?), ref: 0039DC20
                                                          • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 0039DC46
                                                          • _wcslen.LIBCMT ref: 0039DC50
                                                          • _wcsstr.LIBVCRUNTIME ref: 0039DCA0
                                                          • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 0039DCBC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                                          • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                          • API String ID: 1939486746-1459072770
                                                          • Opcode ID: 250232911d954b52b1045e0c9fc09c17214a215b22a1dfff2f808309eb8a01c7
                                                          • Instruction ID: 67e0d47ec28dfcf9665c95966379efb694eab1354ccf75ba46f845ddaed42042
                                                          • Opcode Fuzzy Hash: 250232911d954b52b1045e0c9fc09c17214a215b22a1dfff2f808309eb8a01c7
                                                          • Instruction Fuzzy Hash: 71413332940204BAEB17AB748C47FFF77ACEF46751F14046AF904EA192EB74AD0187A4
                                                          APIs
                                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 003BCC64
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 003BCC8D
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 003BCD48
                                                            • Part of subcall function 003BCC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 003BCCAA
                                                            • Part of subcall function 003BCC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 003BCCBD
                                                            • Part of subcall function 003BCC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 003BCCCF
                                                            • Part of subcall function 003BCC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 003BCD05
                                                            • Part of subcall function 003BCC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 003BCD28
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 003BCCF3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 2734957052-4033151799
                                                          • Opcode ID: 79634a6c6e22e14e546e98f3014191d0ce55a44d14f00d2020aead9a063b073f
                                                          • Instruction ID: a43ffb52aa72931739b60d47447d44d2582763403a39ff6c64ac50f65ac4f65f
                                                          • Opcode Fuzzy Hash: 79634a6c6e22e14e546e98f3014191d0ce55a44d14f00d2020aead9a063b073f
                                                          • Instruction Fuzzy Hash: 7C31A075911129BBD7328B51DC88EFFBB7CEF51744F001169EA0AE2100D6309A46DBA0
                                                          APIs
                                                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 003A3D40
                                                          • _wcslen.LIBCMT ref: 003A3D6D
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 003A3D9D
                                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 003A3DBE
                                                          • RemoveDirectoryW.KERNEL32(?), ref: 003A3DCE
                                                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 003A3E55
                                                          • CloseHandle.KERNEL32(00000000), ref: 003A3E60
                                                          • CloseHandle.KERNEL32(00000000), ref: 003A3E6B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                          • String ID: :$\$\??\%s
                                                          • API String ID: 1149970189-3457252023
                                                          • Opcode ID: 3bb663f31cdf899763a251524a5b1eed83481df6f28c52c52687b3dccf5b5034
                                                          • Instruction ID: 147c97d67ffc27786b93a36e5bd99985fdc4abaf657f527c906cc6598af742f1
                                                          • Opcode Fuzzy Hash: 3bb663f31cdf899763a251524a5b1eed83481df6f28c52c52687b3dccf5b5034
                                                          • Instruction Fuzzy Hash: 2031C276910209ABDB229FA0DC49FEF37BCEF89740F1141B5FA09D6060EB74A7448B64
                                                          APIs
                                                          • timeGetTime.WINMM ref: 0039E6B4
                                                            • Part of subcall function 0034E551: timeGetTime.WINMM(?,?,0039E6D4), ref: 0034E555
                                                          • Sleep.KERNEL32(0000000A), ref: 0039E6E1
                                                          • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 0039E705
                                                          • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 0039E727
                                                          • SetActiveWindow.USER32 ref: 0039E746
                                                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0039E754
                                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 0039E773
                                                          • Sleep.KERNEL32(000000FA), ref: 0039E77E
                                                          • IsWindow.USER32 ref: 0039E78A
                                                          • EndDialog.USER32(00000000), ref: 0039E79B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                          • String ID: BUTTON
                                                          • API String ID: 1194449130-3405671355
                                                          • Opcode ID: be737da9fb929e383571a955436125f0c82f3ae6c695beee5843a908c82b4f26
                                                          • Instruction ID: ebb1aa120ed037245db8b26b3c5e69ffd9e376789b486543b344a98aa56c72f4
                                                          • Opcode Fuzzy Hash: be737da9fb929e383571a955436125f0c82f3ae6c695beee5843a908c82b4f26
                                                          • Instruction Fuzzy Hash: EE2150B0210205AFFF03AF61EE8DE253B6DF755748F181834F915E15A1DBB2AC408B19
                                                          APIs
                                                            • Part of subcall function 00339CB3: _wcslen.LIBCMT ref: 00339CBD
                                                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0039EA5D
                                                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0039EA73
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0039EA84
                                                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0039EA96
                                                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0039EAA7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: SendString$_wcslen
                                                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                          • API String ID: 2420728520-1007645807
                                                          • Opcode ID: 7af52402bff7cbbd550038b61d434d240f5be0d11ed818a6f214b1214d44723a
                                                          • Instruction ID: 18d869fd9af7cc97c36932f1d242e6ef5431f4344e293f3f38239a94e9d51967
                                                          • Opcode Fuzzy Hash: 7af52402bff7cbbd550038b61d434d240f5be0d11ed818a6f214b1214d44723a
                                                          • Instruction Fuzzy Hash: 84117331A9025D79EB22E7A1DC8AEFF6A7CEBD1B00F404429F501A60E1EFB05D05C6B0
                                                          APIs
                                                          • GetDlgItem.USER32(?,00000001), ref: 00395CE2
                                                          • GetWindowRect.USER32(00000000,?), ref: 00395CFB
                                                          • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00395D59
                                                          • GetDlgItem.USER32(?,00000002), ref: 00395D69
                                                          • GetWindowRect.USER32(00000000,?), ref: 00395D7B
                                                          • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00395DCF
                                                          • GetDlgItem.USER32(?,000003E9), ref: 00395DDD
                                                          • GetWindowRect.USER32(00000000,?), ref: 00395DEF
                                                          • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00395E31
                                                          • GetDlgItem.USER32(?,000003EA), ref: 00395E44
                                                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00395E5A
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00395E67
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMoveRect$Invalidate
                                                          • String ID:
                                                          • API String ID: 3096461208-0
                                                          • Opcode ID: bbbb8b30795dc8d805294a2373fde12f5eb007d78286525bd5acc2dfcad9a973
                                                          • Instruction ID: c04fe0b5d07e128d35d6adc3ca1b8750af2a824d7ed06abfefab392f042b5ac9
                                                          • Opcode Fuzzy Hash: bbbb8b30795dc8d805294a2373fde12f5eb007d78286525bd5acc2dfcad9a973
                                                          • Instruction Fuzzy Hash: 2F512DB1B10605AFDF19DF68CD89EAEBBB9FB48300F148129F519E6290D770AE40CB50
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: .5
                                                          • API String ID: 0-4279605997
                                                          • Opcode ID: 6e74fb9ef035ad728cab610ef64f8ca428c56f403ef154eba81718253c84b15a
                                                          • Instruction ID: d5c903947fd9e1a93b36358c201cc5ba80de059ce4d2226aa7d400276af59efd
                                                          • Opcode Fuzzy Hash: 6e74fb9ef035ad728cab610ef64f8ca428c56f403ef154eba81718253c84b15a
                                                          • Instruction Fuzzy Hash: A3C1F674D04249AFCF13DFA8D841BADBBB8AF0D310F05815AF815AB396CB719941CB61
                                                          APIs
                                                          • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 003C5186
                                                          • ShowWindow.USER32(?,00000000), ref: 003C51C7
                                                          • ShowWindow.USER32(?,00000005,?,00000000), ref: 003C51CD
                                                          • SetFocus.USER32(?,?,00000005,?,00000000), ref: 003C51D1
                                                            • Part of subcall function 003C6FBA: DeleteObject.GDI32(00000000), ref: 003C6FE6
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 003C520D
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 003C521A
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 003C524D
                                                          • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 003C5287
                                                          • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 003C5296
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                          • String ID: @q
                                                          • API String ID: 3210457359-962691702
                                                          • Opcode ID: 2e3559d66c1b37e77705442ec7fbfdc7b2e10e323fde04131ca4e7f09ed80f0f
                                                          • Instruction ID: bb8ca34b6e25b1bc27e653dcfc8d70e2ecfc47889d0f2d46607ab432b678e359
                                                          • Opcode Fuzzy Hash: 2e3559d66c1b37e77705442ec7fbfdc7b2e10e323fde04131ca4e7f09ed80f0f
                                                          • Instruction Fuzzy Hash: F351B130A50A08BEEF229F24CC4AFD97BA9EB05321F59441AF615DA2E1C775BDD0DB40
                                                          APIs
                                                            • Part of subcall function 00349BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00349BB2
                                                            • Part of subcall function 0034912D: GetCursorPos.USER32(?), ref: 00349141
                                                            • Part of subcall function 0034912D: ScreenToClient.USER32(00000000,?), ref: 0034915E
                                                            • Part of subcall function 0034912D: GetAsyncKeyState.USER32(00000001), ref: 00349183
                                                            • Part of subcall function 0034912D: GetAsyncKeyState.USER32(00000002), ref: 0034919D
                                                          • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 003C8B6B
                                                          • ImageList_EndDrag.COMCTL32 ref: 003C8B71
                                                          • ReleaseCapture.USER32 ref: 003C8B77
                                                          • SetWindowTextW.USER32(?,00000000), ref: 003C8C12
                                                          • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 003C8C25
                                                          • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 003C8CFF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                          • String ID: @GUI_DRAGFILE$@GUI_DROPID$@q$p#@
                                                          • API String ID: 1924731296-1600226210
                                                          • Opcode ID: 5cb343b44576dcbe8630222a41b273ab774f4412d830dc15291b42d48d7fe7a1
                                                          • Instruction ID: c12e06f26dbef3d3ebae04ea9392cfc7e8f5530fead4e9ee5b96408c1d51cb87
                                                          • Opcode Fuzzy Hash: 5cb343b44576dcbe8630222a41b273ab774f4412d830dc15291b42d48d7fe7a1
                                                          • Instruction Fuzzy Hash: 62515B71104304AFD706EF24D995FAA77E4FB88714F00062DF956AB2E1CB71AE44CB62
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,0037F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00399717
                                                          • LoadStringW.USER32(00000000,?,0037F7F8,00000001), ref: 00399720
                                                            • Part of subcall function 00339CB3: _wcslen.LIBCMT ref: 00339CBD
                                                          • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,0037F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00399742
                                                          • LoadStringW.USER32(00000000,?,0037F7F8,00000001), ref: 00399745
                                                          • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00399866
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message_wcslen
                                                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                          • API String ID: 747408836-2268648507
                                                          • Opcode ID: a77d6fc594b57b4905aa7d3ea5f24b5626677e96dac756ef37af0ef58e1ca77a
                                                          • Instruction ID: d8199f90e3e5e1f3f5981dc8fe3aa7bbf71795182e6faa6172313a7aeed73516
                                                          • Opcode Fuzzy Hash: a77d6fc594b57b4905aa7d3ea5f24b5626677e96dac756ef37af0ef58e1ca77a
                                                          • Instruction Fuzzy Hash: 76414072904109AACF06FBE4CE86EEE737CAF55340F10406AF6057A092EB756F48CB61
                                                          APIs
                                                            • Part of subcall function 00336B57: _wcslen.LIBCMT ref: 00336B6A
                                                          • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 003907A2
                                                          • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 003907BE
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 003907DA
                                                          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00390804
                                                          • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 0039082C
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00390837
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0039083C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                          • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                          • API String ID: 323675364-22481851
                                                          • Opcode ID: e57c1433d0dba7a52a9ac717bf690938220e184be316cd02c42104f773c0c76c
                                                          • Instruction ID: 18d130fdfe1bfb7c468a31f999b82813247d0794c837a29c3d65f25f6f1ac539
                                                          • Opcode Fuzzy Hash: e57c1433d0dba7a52a9ac717bf690938220e184be316cd02c42104f773c0c76c
                                                          • Instruction Fuzzy Hash: DD411672D10229AFCF16EBA4DC95DEEB778BF44350F058169E905A7160EB70AE04CBA0
                                                          APIs
                                                          • CreateMenu.USER32 ref: 003C3C79
                                                          • SetMenu.USER32(?,00000000), ref: 003C3C88
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 003C3D10
                                                          • IsMenu.USER32(?), ref: 003C3D24
                                                          • CreatePopupMenu.USER32 ref: 003C3D2E
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 003C3D5B
                                                          • DrawMenuBar.USER32 ref: 003C3D63
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                          • String ID: 0$@q$F
                                                          • API String ID: 161812096-2100655439
                                                          • Opcode ID: 5b7ac8a325afb560152c3f053aeb4a9d1a80b2b070959cc40a574ceb75a214d3
                                                          • Instruction ID: 292b0ed4645cce2b5dfc9be98ade5e7ac90803390a47bea86ca1cbe88facf5c2
                                                          • Opcode Fuzzy Hash: 5b7ac8a325afb560152c3f053aeb4a9d1a80b2b070959cc40a574ceb75a214d3
                                                          • Instruction Fuzzy Hash: FF415975A01209AFDB15CF64D848FAA7BB9FF4A350F15402CE946E7360D731AE10CB94
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 003B3C5C
                                                          • CoInitialize.OLE32(00000000), ref: 003B3C8A
                                                          • CoUninitialize.OLE32 ref: 003B3C94
                                                          • _wcslen.LIBCMT ref: 003B3D2D
                                                          • GetRunningObjectTable.OLE32(00000000,?), ref: 003B3DB1
                                                          • SetErrorMode.KERNEL32(00000001,00000029), ref: 003B3ED5
                                                          • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 003B3F0E
                                                          • CoGetObject.OLE32(?,00000000,003CFB98,?), ref: 003B3F2D
                                                          • SetErrorMode.KERNEL32(00000000), ref: 003B3F40
                                                          • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 003B3FC4
                                                          • VariantClear.OLEAUT32(?), ref: 003B3FD8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                          • String ID:
                                                          • API String ID: 429561992-0
                                                          • Opcode ID: a1f1cdc8e3faf352e59a46e82ed33d5fc63a7b0f14f99c76fd91d4e4ffd6cf5e
                                                          • Instruction ID: 78cd39ea43c748729d74e0037ada10ea9b5b5c83eae1a73bdcefa253f2ea7bc5
                                                          • Opcode Fuzzy Hash: a1f1cdc8e3faf352e59a46e82ed33d5fc63a7b0f14f99c76fd91d4e4ffd6cf5e
                                                          • Instruction Fuzzy Hash: 4AC133716083159FD702DF68C88496BBBE9FF89748F14491DFA8A9B610DB30EE05CB52
                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 003A7AF3
                                                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 003A7B8F
                                                          • SHGetDesktopFolder.SHELL32(?), ref: 003A7BA3
                                                          • CoCreateInstance.OLE32(003CFD08,00000000,00000001,003F6E6C,?), ref: 003A7BEF
                                                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 003A7C74
                                                          • CoTaskMemFree.OLE32(?,?), ref: 003A7CCC
                                                          • SHBrowseForFolderW.SHELL32(?), ref: 003A7D57
                                                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 003A7D7A
                                                          • CoTaskMemFree.OLE32(00000000), ref: 003A7D81
                                                          • CoTaskMemFree.OLE32(00000000), ref: 003A7DD6
                                                          • CoUninitialize.OLE32 ref: 003A7DDC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                          • String ID:
                                                          • API String ID: 2762341140-0
                                                          • Opcode ID: a69dca986f000bcdea0397e9fbb151549eec519e806077af1009081aa13cc71f
                                                          • Instruction ID: 8e061cccada9b1a6df678ac32e7a08089a3db931223882e89ea4a05acd496960
                                                          • Opcode Fuzzy Hash: a69dca986f000bcdea0397e9fbb151549eec519e806077af1009081aa13cc71f
                                                          • Instruction Fuzzy Hash: A0C11975A04209AFDB15DF64C8C8DAEBBB9FF49314F148499E81ADB261DB30ED41CB90
                                                          APIs
                                                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 0038FAAF
                                                          • SafeArrayAllocData.OLEAUT32(?), ref: 0038FB08
                                                          • VariantInit.OLEAUT32(?), ref: 0038FB1A
                                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 0038FB3A
                                                          • VariantCopy.OLEAUT32(?,?), ref: 0038FB8D
                                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 0038FBA1
                                                          • VariantClear.OLEAUT32(?), ref: 0038FBB6
                                                          • SafeArrayDestroyData.OLEAUT32(?), ref: 0038FBC3
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0038FBCC
                                                          • VariantClear.OLEAUT32(?), ref: 0038FBDE
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0038FBE9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                          • String ID:
                                                          • API String ID: 2706829360-0
                                                          • Opcode ID: fea73892ba9267a2ac5d0ae0923b9df779f6ee6516a61563f6f1157ac6b67fc6
                                                          • Instruction ID: a8036d78228577713be62477fbfec92dc105e5df2a0807285849826922621b11
                                                          • Opcode Fuzzy Hash: fea73892ba9267a2ac5d0ae0923b9df779f6ee6516a61563f6f1157ac6b67fc6
                                                          • Instruction Fuzzy Hash: FF414035A102199FCF06EF65C854DAEBBB9FF48354F008069E94AEB261DB34A945CF90
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 00399CA1
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 00399D22
                                                          • GetKeyState.USER32(000000A0), ref: 00399D3D
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 00399D57
                                                          • GetKeyState.USER32(000000A1), ref: 00399D6C
                                                          • GetAsyncKeyState.USER32(00000011), ref: 00399D84
                                                          • GetKeyState.USER32(00000011), ref: 00399D96
                                                          • GetAsyncKeyState.USER32(00000012), ref: 00399DAE
                                                          • GetKeyState.USER32(00000012), ref: 00399DC0
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 00399DD8
                                                          • GetKeyState.USER32(0000005B), ref: 00399DEA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: b98c7967782f442c2b3fded549523d997c5d185dd8961d8226728cbadfeea2cf
                                                          • Instruction ID: 2b3450c2721d428efbef5f0b450f49eb4270e5d2071ee807e3c20b32c77d21a1
                                                          • Opcode Fuzzy Hash: b98c7967782f442c2b3fded549523d997c5d185dd8961d8226728cbadfeea2cf
                                                          • Instruction Fuzzy Hash: 7E41E7349047C96DFF33876988447B5BEA06F12344F09805FDAC6565C2EBA5ADC8CBA2
                                                          APIs
                                                          • WSAStartup.WSOCK32(00000101,?), ref: 003B05BC
                                                          • inet_addr.WSOCK32(?), ref: 003B061C
                                                          • gethostbyname.WSOCK32(?), ref: 003B0628
                                                          • IcmpCreateFile.IPHLPAPI ref: 003B0636
                                                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 003B06C6
                                                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 003B06E5
                                                          • IcmpCloseHandle.IPHLPAPI(?), ref: 003B07B9
                                                          • WSACleanup.WSOCK32 ref: 003B07BF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                          • String ID: Ping
                                                          • API String ID: 1028309954-2246546115
                                                          • Opcode ID: ca60d827dc32a1774105f22411896c192e7ea1bfbfe3ab40341bb7dc1d1ebc4a
                                                          • Instruction ID: 6d2aa10958ee4f5f17ef04fcb883f46f0e2eb050c562e85890404565c9fdad84
                                                          • Opcode Fuzzy Hash: ca60d827dc32a1774105f22411896c192e7ea1bfbfe3ab40341bb7dc1d1ebc4a
                                                          • Instruction Fuzzy Hash: 86918C356082019FD326DF15C889F5ABBE4EF44318F1985A9E5698FAA2CB30FD41CF81
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharLower
                                                          • String ID: cdecl$none$stdcall$winapi
                                                          • API String ID: 707087890-567219261
                                                          • Opcode ID: 675da58a37a4f1bef0f6adae3d0e05855f85c38f3ccac47b0b06820331407fe0
                                                          • Instruction ID: a85944c476fdbb752786f7c2737a2d5d6162752842f0496ea8cc5f1a2fb298aa
                                                          • Opcode Fuzzy Hash: 675da58a37a4f1bef0f6adae3d0e05855f85c38f3ccac47b0b06820331407fe0
                                                          • Instruction Fuzzy Hash: 5551A431A041169BCF16DF6CC9519FEB7A9BF64328B21422AEA56EB6C4DB30DD40C790
                                                          APIs
                                                          • CoInitialize.OLE32 ref: 003B3774
                                                          • CoUninitialize.OLE32 ref: 003B377F
                                                          • CoCreateInstance.OLE32(?,00000000,00000017,003CFB78,?), ref: 003B37D9
                                                          • IIDFromString.OLE32(?,?), ref: 003B384C
                                                          • VariantInit.OLEAUT32(?), ref: 003B38E4
                                                          • VariantClear.OLEAUT32(?), ref: 003B3936
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                          • API String ID: 636576611-1287834457
                                                          • Opcode ID: 36fbcd15a4042c74752b99d856bfd0f25aefa7a015b50762f8aeb36f15491a8d
                                                          • Instruction ID: 6c2145bdeead7718e51a84abba2150945bef5494e42ae324d084d3358f3a7efd
                                                          • Opcode Fuzzy Hash: 36fbcd15a4042c74752b99d856bfd0f25aefa7a015b50762f8aeb36f15491a8d
                                                          • Instruction Fuzzy Hash: 7961B171608321AFD712DF54C889FAAB7E8EF49718F004809F685DB691D770EE48CB92
                                                          APIs
                                                          • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 003A33CF
                                                            • Part of subcall function 00339CB3: _wcslen.LIBCMT ref: 00339CBD
                                                          • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 003A33F0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: LoadString$_wcslen
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 4099089115-3080491070
                                                          • Opcode ID: 065efaeebd0c1db42549896b97385dad9f45ab479c69129533afb7bf4def65ff
                                                          • Instruction ID: 94d66acb8dfe47d23b566a440513900d68ccecd0b59de5942d836da1b91f7433
                                                          • Opcode Fuzzy Hash: 065efaeebd0c1db42549896b97385dad9f45ab479c69129533afb7bf4def65ff
                                                          • Instruction Fuzzy Hash: 11518F72D00209AADF17EBA0CD86EEEB778EF05340F108166F5057A062EB716F58DB60
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharUpper
                                                          • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                          • API String ID: 1256254125-769500911
                                                          • Opcode ID: ade565452ec94c7356d9eebce60abb4553e05a29da88626a4a516b345ad0bbb1
                                                          • Instruction ID: 96d3b64e85b544d0daae8fc646399a6cb80f3c916a0e808293005defd1b34887
                                                          • Opcode Fuzzy Hash: ade565452ec94c7356d9eebce60abb4553e05a29da88626a4a516b345ad0bbb1
                                                          • Instruction Fuzzy Hash: 7D41F832A000279BCF116F7DDE915BEF7A5AFA0754B264229E461DB284E731ED81C790
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0039BCFD
                                                          • IsMenu.USER32(00000000), ref: 0039BD1D
                                                          • CreatePopupMenu.USER32 ref: 0039BD53
                                                          • GetMenuItemCount.USER32(hq), ref: 0039BDA4
                                                          • InsertMenuItemW.USER32(hq,?,00000001,00000030), ref: 0039BDCC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                          • String ID: 0$2$hq$hq
                                                          • API String ID: 93392585-2030470674
                                                          • Opcode ID: 7ed4526e5f47551ec796f20d2ceecf1375ac33fc614b41b3a2f3b2b679f33879
                                                          • Instruction ID: 610b3cfaaec524c7bb936f072b9074982a1ed9f9a090bddb223bdfa593717d53
                                                          • Opcode Fuzzy Hash: 7ed4526e5f47551ec796f20d2ceecf1375ac33fc614b41b3a2f3b2b679f33879
                                                          • Instruction Fuzzy Hash: 9D51C070A00209DBDF12DFA9EA88BAEFBF8FF45314F144159E445EB2A0D770A945CB61
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 003A53A0
                                                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 003A5416
                                                          • GetLastError.KERNEL32 ref: 003A5420
                                                          • SetErrorMode.KERNEL32(00000000,READY), ref: 003A54A7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Error$Mode$DiskFreeLastSpace
                                                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                          • API String ID: 4194297153-14809454
                                                          • Opcode ID: ac2a2c96f2756d6f2e4d7d95ac0d67541d44cf8a6d3ca421f8e07bde624a7034
                                                          • Instruction ID: 2056a1371d0bfa673f0b16fafd0cc8533d71c99014063813e573572eb57ca595
                                                          • Opcode Fuzzy Hash: ac2a2c96f2756d6f2e4d7d95ac0d67541d44cf8a6d3ca421f8e07bde624a7034
                                                          • Instruction Fuzzy Hash: A631D335A00604DFC712DF6AC485EA97BB8EF1A305F188055E505CF652DB74ED82CB90
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 0039B151
                                                          • GetForegroundWindow.USER32(00000000,?,?,?,?,?,0039A1E1,?,00000001), ref: 0039B165
                                                          • GetWindowThreadProcessId.USER32(00000000), ref: 0039B16C
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0039A1E1,?,00000001), ref: 0039B17B
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 0039B18D
                                                          • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,0039A1E1,?,00000001), ref: 0039B1A6
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0039A1E1,?,00000001), ref: 0039B1B8
                                                          • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,0039A1E1,?,00000001), ref: 0039B1FD
                                                          • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,0039A1E1,?,00000001), ref: 0039B212
                                                          • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,0039A1E1,?,00000001), ref: 0039B21D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                          • String ID:
                                                          • API String ID: 2156557900-0
                                                          • Opcode ID: 8644f06fca59fc5928128aa42e70354a4fe2e3bd07fd519b71b5ac2dd2eae7ec
                                                          • Instruction ID: ea0823f9069c55081f8496f7f1a1952c4d5cb9b85a0064f450f72886f2e73844
                                                          • Opcode Fuzzy Hash: 8644f06fca59fc5928128aa42e70354a4fe2e3bd07fd519b71b5ac2dd2eae7ec
                                                          • Instruction Fuzzy Hash: F331EC71510204BFDF129F24EE48FAEBBADFB1031AF154428FA44E6190C7B4EA018F28
                                                          APIs
                                                          • _free.LIBCMT ref: 00362C94
                                                            • Part of subcall function 003629C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0036D7D1,00000000,00000000,00000000,00000000,?,0036D7F8,00000000,00000007,00000000,?,0036DBF5,00000000), ref: 003629DE
                                                            • Part of subcall function 003629C8: GetLastError.KERNEL32(00000000,?,0036D7D1,00000000,00000000,00000000,00000000,?,0036D7F8,00000000,00000007,00000000,?,0036DBF5,00000000,00000000), ref: 003629F0
                                                          • _free.LIBCMT ref: 00362CA0
                                                          • _free.LIBCMT ref: 00362CAB
                                                          • _free.LIBCMT ref: 00362CB6
                                                          • _free.LIBCMT ref: 00362CC1
                                                          • _free.LIBCMT ref: 00362CCC
                                                          • _free.LIBCMT ref: 00362CD7
                                                          • _free.LIBCMT ref: 00362CE2
                                                          • _free.LIBCMT ref: 00362CED
                                                          • _free.LIBCMT ref: 00362CFB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 4691296bc750b94a2409472ee81b0a70e260c9a0efe49d3b49088edeed79e8e1
                                                          • Instruction ID: 3b06803e0e14af01bb3303c2585da209a1c99ce02c6a4707cf5cadf7692a63c7
                                                          • Opcode Fuzzy Hash: 4691296bc750b94a2409472ee81b0a70e260c9a0efe49d3b49088edeed79e8e1
                                                          • Instruction Fuzzy Hash: 47119676600508AFCB07EF54D842CDE3BA5FF46390F4284A5F9485F226D731EA609B90
                                                          APIs
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 003A7FAD
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 003A7FC1
                                                          • GetFileAttributesW.KERNEL32(?), ref: 003A7FEB
                                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 003A8005
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 003A8017
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 003A8060
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 003A80B0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory$AttributesFile
                                                          • String ID: *.*
                                                          • API String ID: 769691225-438819550
                                                          • Opcode ID: dd3dc384290170efcb75840d2ba35448aeb333a36a0dd810d81b930beeec8b45
                                                          • Instruction ID: 94419334b6e70c1ffabaae2b275aefc26640d118e7cfd1350a428651f28d1311
                                                          • Opcode Fuzzy Hash: dd3dc384290170efcb75840d2ba35448aeb333a36a0dd810d81b930beeec8b45
                                                          • Instruction Fuzzy Hash: AE81B272518241ABCB26DF14C884DAAB3E8FF8A310F154C5EF885DB250EB35DD498B52
                                                          APIs
                                                          • SetWindowLongW.USER32(?,000000EB), ref: 00335C7A
                                                            • Part of subcall function 00335D0A: GetClientRect.USER32(?,?), ref: 00335D30
                                                            • Part of subcall function 00335D0A: GetWindowRect.USER32(?,?), ref: 00335D71
                                                            • Part of subcall function 00335D0A: ScreenToClient.USER32(?,?), ref: 00335D99
                                                          • GetDC.USER32 ref: 003746F5
                                                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00374708
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00374716
                                                          • SelectObject.GDI32(00000000,00000000), ref: 0037472B
                                                          • ReleaseDC.USER32(?,00000000), ref: 00374733
                                                          • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 003747C4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                          • String ID: U
                                                          • API String ID: 4009187628-3372436214
                                                          • Opcode ID: 30ffac31c2a2a0a43e4347f36548b5ab555fd6af1fd3eaa210bc48d7670ccb51
                                                          • Instruction ID: 50679cf20b9d83c47f550d744b8dce5c36f311a6f197887ffa9e055e8895cbf7
                                                          • Opcode Fuzzy Hash: 30ffac31c2a2a0a43e4347f36548b5ab555fd6af1fd3eaa210bc48d7670ccb51
                                                          • Instruction Fuzzy Hash: 0671CF31400245DFCF378F64C984ABA7BB9FF4A314F198269E96A9A166C335A881DF50
                                                          APIs
                                                          • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 003A35E4
                                                            • Part of subcall function 00339CB3: _wcslen.LIBCMT ref: 00339CBD
                                                          • LoadStringW.USER32(00402390,?,00000FFF,?), ref: 003A360A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: LoadString$_wcslen
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 4099089115-2391861430
                                                          • Opcode ID: 47b9a6862aa2d3e4bea148c068a5068b697ed0e31a90a1f4e963711dad95edc3
                                                          • Instruction ID: 616e476da83c5d6205f365b904c93e44b61844531304d77c23df3905afc7c6f3
                                                          • Opcode Fuzzy Hash: 47b9a6862aa2d3e4bea148c068a5068b697ed0e31a90a1f4e963711dad95edc3
                                                          • Instruction Fuzzy Hash: EF518F72900209BBDF16EBA0CD82EEDBB78EF05310F148125F5057A1A1EB711A99DFA0
                                                          APIs
                                                          • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 003C2E1C
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 003C2E4F
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 003C2E84
                                                          • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 003C2EB6
                                                          • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 003C2EE0
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 003C2EF1
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 003C2F0B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$MessageSend
                                                          • String ID: @q
                                                          • API String ID: 2178440468-962691702
                                                          • Opcode ID: b9990ca09d7f702880a94cf1e5fe05ef0580aac1abbe77d3bae3555b0a76f936
                                                          • Instruction ID: 1a6ec41be08c7b3831b184fbbf6028170ff563e8e7f63c8e68294ff1ab73d986
                                                          • Opcode Fuzzy Hash: b9990ca09d7f702880a94cf1e5fe05ef0580aac1abbe77d3bae3555b0a76f936
                                                          • Instruction Fuzzy Hash: 9D310330604254AFDB22DF68DD84FA637E5EB8A710F1A1168F944EF2B1CB71AC50DB41
                                                          APIs
                                                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 003AC272
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 003AC29A
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 003AC2CA
                                                          • GetLastError.KERNEL32 ref: 003AC322
                                                          • SetEvent.KERNEL32(?), ref: 003AC336
                                                          • InternetCloseHandle.WININET(00000000), ref: 003AC341
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                          • String ID:
                                                          • API String ID: 3113390036-3916222277
                                                          • Opcode ID: 09c6892ce8ccde329d1cea6e0fcfc2a752b85a8691a7ac748b358bdde0760697
                                                          • Instruction ID: 0dcb1599485d4e8ed1b3c741b4e68ff391984fc986a6e42a5a77ec6d00f078e0
                                                          • Opcode Fuzzy Hash: 09c6892ce8ccde329d1cea6e0fcfc2a752b85a8691a7ac748b358bdde0760697
                                                          • Instruction Fuzzy Hash: 98319FB5520204AFDB239F648C88EAB7BFCEB4A740F14A51EF44AD6640DB34ED059B60
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00373AAF,?,?,Bad directive syntax error,003CCC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 003998BC
                                                          • LoadStringW.USER32(00000000,?,00373AAF,?), ref: 003998C3
                                                            • Part of subcall function 00339CB3: _wcslen.LIBCMT ref: 00339CBD
                                                          • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00399987
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadMessageModuleString_wcslen
                                                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                          • API String ID: 858772685-4153970271
                                                          • Opcode ID: 5bae579a15b3cd5f1d0844af559bcd77bbc01bf6ca3f2d5e431ce793eee5b58d
                                                          • Instruction ID: 42a86dfc067c3c54a7d03ea61ce84c158d1659c5e9059f88a98c2b74551bac8a
                                                          • Opcode Fuzzy Hash: 5bae579a15b3cd5f1d0844af559bcd77bbc01bf6ca3f2d5e431ce793eee5b58d
                                                          • Instruction Fuzzy Hash: 63212F3194021DABCF17AF90CC46EED7779FF18700F04945AF5156A0A1EB71AA18DB51
                                                          APIs
                                                          • GetParent.USER32 ref: 003920AB
                                                          • GetClassNameW.USER32(00000000,?,00000100), ref: 003920C0
                                                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0039214D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameParentSend
                                                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                          • API String ID: 1290815626-3381328864
                                                          • Opcode ID: b41aa45aea91ccd190ebcc0eb90264b5c53843a904097938a9f7c589b7e9ad66
                                                          • Instruction ID: 810663421ba8956b222b796727817650dd32de253ea519d525e4fbe4e36f5108
                                                          • Opcode Fuzzy Hash: b41aa45aea91ccd190ebcc0eb90264b5c53843a904097938a9f7c589b7e9ad66
                                                          • Instruction Fuzzy Hash: 85112976688B0ABAFE072620DC0BDF7779CDB14329F210016FB04E91E1FE616C655614
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                          • String ID:
                                                          • API String ID: 1282221369-0
                                                          • Opcode ID: 7b5664ac40bf08d8950480ebab8685a7e4db928cb668a689bcef489946abea76
                                                          • Instruction ID: cc7e9303b79155c90e16e578a74a78baeb1aaf79681798ee472b03cda994e824
                                                          • Opcode Fuzzy Hash: 7b5664ac40bf08d8950480ebab8685a7e4db928cb668a689bcef489946abea76
                                                          • Instruction Fuzzy Hash: E1614A71A04301AFDB27AFB49C41B7A7BA5EF06350F06C16DF984AF249D7329D0187A0
                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00386890
                                                          • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 003868A9
                                                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 003868B9
                                                          • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 003868D1
                                                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 003868F2
                                                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00348874,00000000,00000000,00000000,000000FF,00000000), ref: 00386901
                                                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0038691E
                                                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00348874,00000000,00000000,00000000,000000FF,00000000), ref: 0038692D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                          • String ID:
                                                          • API String ID: 1268354404-0
                                                          • Opcode ID: 99eb88ef82c564c2edca5600891d728ecbf5c1cba58701107ec02efccd694e46
                                                          • Instruction ID: 4753c51287c0d3330b7f10c7b0f505c3bc5d0f6e083dbdabdef7fc008520723c
                                                          • Opcode Fuzzy Hash: 99eb88ef82c564c2edca5600891d728ecbf5c1cba58701107ec02efccd694e46
                                                          • Instruction Fuzzy Hash: 22514970600305AFDB22DF25CC56FAA7BB9EB44750F104528F956DA2A0DB70E991DB50
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 003AC182
                                                          • GetLastError.KERNEL32 ref: 003AC195
                                                          • SetEvent.KERNEL32(?), ref: 003AC1A9
                                                            • Part of subcall function 003AC253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 003AC272
                                                            • Part of subcall function 003AC253: GetLastError.KERNEL32 ref: 003AC322
                                                            • Part of subcall function 003AC253: SetEvent.KERNEL32(?), ref: 003AC336
                                                            • Part of subcall function 003AC253: InternetCloseHandle.WININET(00000000), ref: 003AC341
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                          • String ID:
                                                          • API String ID: 337547030-0
                                                          • Opcode ID: 57d17a86eaef8aef3836bfccf98c291e9238b8a1cb137c1d724559e46298f0b1
                                                          • Instruction ID: b4a7cb2b55c1817c39263daf55ea6d469cfaa13dffd464c74ff99435e24916ba
                                                          • Opcode Fuzzy Hash: 57d17a86eaef8aef3836bfccf98c291e9238b8a1cb137c1d724559e46298f0b1
                                                          • Instruction Fuzzy Hash: 93319271220605AFDF229FA5DD44A66BBFCFF1A300F04681DF95AC6A11D731E814DBA0
                                                          APIs
                                                            • Part of subcall function 00393A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00393A57
                                                            • Part of subcall function 00393A3D: GetCurrentThreadId.KERNEL32 ref: 00393A5E
                                                            • Part of subcall function 00393A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,003925B3), ref: 00393A65
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 003925BD
                                                          • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 003925DB
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 003925DF
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 003925E9
                                                          • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00392601
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00392605
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 0039260F
                                                          • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00392623
                                                          • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00392627
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                          • String ID:
                                                          • API String ID: 2014098862-0
                                                          • Opcode ID: 93044fb3aad5468c8b85b3c1024fa2cf923f9fd0855b41460a67abb36d52222b
                                                          • Instruction ID: a60c99f244a82fe7823acd25991b7a2366f235888459df3b575f258c94a34b4e
                                                          • Opcode Fuzzy Hash: 93044fb3aad5468c8b85b3c1024fa2cf923f9fd0855b41460a67abb36d52222b
                                                          • Instruction Fuzzy Hash: 8B01DF307A0610BBFB2167699C8AF5A7F5DDB4EB12F111001F358EE1E1C9E224448BAA
                                                          APIs
                                                          • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00391449,?,?,00000000), ref: 0039180C
                                                          • HeapAlloc.KERNEL32(00000000,?,00391449,?,?,00000000), ref: 00391813
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00391449,?,?,00000000), ref: 00391828
                                                          • GetCurrentProcess.KERNEL32(?,00000000,?,00391449,?,?,00000000), ref: 00391830
                                                          • DuplicateHandle.KERNEL32(00000000,?,00391449,?,?,00000000), ref: 00391833
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00391449,?,?,00000000), ref: 00391843
                                                          • GetCurrentProcess.KERNEL32(00391449,00000000,?,00391449,?,?,00000000), ref: 0039184B
                                                          • DuplicateHandle.KERNEL32(00000000,?,00391449,?,?,00000000), ref: 0039184E
                                                          • CreateThread.KERNEL32(00000000,00000000,00391874,00000000,00000000,00000000), ref: 00391868
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                          • String ID:
                                                          • API String ID: 1957940570-0
                                                          • Opcode ID: eaa40f481eb2e7add0321592056a9f682d1f07d4055a789078cc9274d4e8946e
                                                          • Instruction ID: b1b700a873c485e482fd71dca7e9392ba09844114cf726ae414e8345e66cba38
                                                          • Opcode Fuzzy Hash: eaa40f481eb2e7add0321592056a9f682d1f07d4055a789078cc9274d4e8946e
                                                          • Instruction Fuzzy Hash: 3501CDB5250348BFE711AFB6DC4DF6B3BACEB89B11F045411FA09DB1A1CA74A800CB20
                                                          APIs
                                                            • Part of subcall function 00337620: _wcslen.LIBCMT ref: 00337625
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0039C6EE
                                                          • _wcslen.LIBCMT ref: 0039C735
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0039C79C
                                                          • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0039C7CA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info_wcslen$Default
                                                          • String ID: 0$hq$hq
                                                          • API String ID: 1227352736-3650232366
                                                          • Opcode ID: 37c3776b4b62988f999bfc66e4ba0c40584e764dfab72d3c7b59375c94aa995d
                                                          • Instruction ID: 2c2055b45f246f24631369c05e52af54afa4fc8607dfee1ff71c133893b29fbb
                                                          • Opcode Fuzzy Hash: 37c3776b4b62988f999bfc66e4ba0c40584e764dfab72d3c7b59375c94aa995d
                                                          • Instruction Fuzzy Hash: 2751EF726243009FDB129F68C885B6BB7E8AF49310F082A2DF995E71E0DB74DD04CB52
                                                          APIs
                                                            • Part of subcall function 0039D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 0039D501
                                                            • Part of subcall function 0039D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 0039D50F
                                                            • Part of subcall function 0039D4DC: CloseHandle.KERNELBASE(00000000), ref: 0039D5DC
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 003BA16D
                                                          • GetLastError.KERNEL32 ref: 003BA180
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 003BA1B3
                                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 003BA268
                                                          • GetLastError.KERNEL32(00000000), ref: 003BA273
                                                          • CloseHandle.KERNEL32(00000000), ref: 003BA2C4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                          • String ID: SeDebugPrivilege
                                                          • API String ID: 2533919879-2896544425
                                                          • Opcode ID: 449ad78bd87a00d82e89e4024a4819bd6fb7c6b3d5700f8e1bd1791b0d266c96
                                                          • Instruction ID: a207151200fc5af053a5e8eb23148e5c5a06724e922290acc59c596a0e763207
                                                          • Opcode Fuzzy Hash: 449ad78bd87a00d82e89e4024a4819bd6fb7c6b3d5700f8e1bd1791b0d266c96
                                                          • Instruction Fuzzy Hash: 7D61DF34204A42AFD722DF18C484F55BBE4AF44318F19848CE5668FBA3C776EC45CB82
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 003C3925
                                                          • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 003C393A
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 003C3954
                                                          • _wcslen.LIBCMT ref: 003C3999
                                                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 003C39C6
                                                          • SendMessageW.USER32(?,00001061,?,0000000F), ref: 003C39F4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window_wcslen
                                                          • String ID: SysListView32
                                                          • API String ID: 2147712094-78025650
                                                          • Opcode ID: e8703e918ef61a2947f6e6e0d53aa54279994193260cb9f6789ea85e8b2e0471
                                                          • Instruction ID: db07ba5dd6e9be34636e0de25a13e994670e54c9d709724978957ada5982eedb
                                                          • Opcode Fuzzy Hash: e8703e918ef61a2947f6e6e0d53aa54279994193260cb9f6789ea85e8b2e0471
                                                          • Instruction Fuzzy Hash: 3541D431A00318ABEF229F64CC45FEA7BA9FF08350F11452AF958E7291D7719E94CB90
                                                          APIs
                                                          • _ValidateLocalCookies.LIBCMT ref: 00352D4B
                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00352D53
                                                          • _ValidateLocalCookies.LIBCMT ref: 00352DE1
                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00352E0C
                                                          • _ValidateLocalCookies.LIBCMT ref: 00352E61
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                          • String ID: &H5$csm
                                                          • API String ID: 1170836740-3207714950
                                                          • Opcode ID: 8b4475d9261b5722502fc78fac7b62f483cf61a9aa47167a273b0f1b3b17a854
                                                          • Instruction ID: 7303c40605d5e6402411e5a1fc2584b8fd825eed0015074bfee6c7471b105db0
                                                          • Opcode Fuzzy Hash: 8b4475d9261b5722502fc78fac7b62f483cf61a9aa47167a273b0f1b3b17a854
                                                          • Instruction Fuzzy Hash: 3F419434A00209DBCF16DF68C845E9FBBF5BF46366F158155EC24AB362D731AA09CB90
                                                          APIs
                                                          • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,0038F3AB,00000000,?,?,00000000,?,0038682C,00000004,00000000,00000000), ref: 003C824C
                                                          • EnableWindow.USER32(?,00000000), ref: 003C8272
                                                          • ShowWindow.USER32(FFFFFFFF,00000000), ref: 003C82D1
                                                          • ShowWindow.USER32(?,00000004), ref: 003C82E5
                                                          • EnableWindow.USER32(?,00000001), ref: 003C830B
                                                          • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 003C832F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Show$Enable$MessageSend
                                                          • String ID: @q
                                                          • API String ID: 642888154-962691702
                                                          • Opcode ID: c29b87169cb2cef1ae14100d2324e8fd691b3270df35eb1b35bf0a4952933788
                                                          • Instruction ID: 85361f9034726c9eead3bd9465f2abb9acb70f645d4db18a0717f1bea566d4ad
                                                          • Opcode Fuzzy Hash: c29b87169cb2cef1ae14100d2324e8fd691b3270df35eb1b35bf0a4952933788
                                                          • Instruction Fuzzy Hash: FA418E78601644AFDB22CF15C999FA47BF0FB0A714F1952ADE508DB2B2CB32AD41CB54
                                                          APIs
                                                          • LoadIconW.USER32(00000000,00007F03), ref: 0039C913
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: IconLoad
                                                          • String ID: blank$info$question$stop$warning
                                                          • API String ID: 2457776203-404129466
                                                          • Opcode ID: b9faec9c173ab57c1955b909a7c29104882f85e2a8b33c7e3224c5a068fa0319
                                                          • Instruction ID: dd97bf855fd3eb458460b9adbc45feab16707e2b8921f62b1916931b31f15dd6
                                                          • Opcode Fuzzy Hash: b9faec9c173ab57c1955b909a7c29104882f85e2a8b33c7e3224c5a068fa0319
                                                          • Instruction Fuzzy Hash: D6110D3169D30ABAEF076B549C83CEB779CDF15359B21102AF904A6192D7706D445364
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                          • String ID: 0.0.0.0
                                                          • API String ID: 642191829-3771769585
                                                          • Opcode ID: 0a792427d6449081519c7a3591d985c5fce257b2137503ca26eae71c15e14333
                                                          • Instruction ID: 22a8c3206d2bef710e4b75912ed85fc63098780571168b88dda3a430f7fd8cbe
                                                          • Opcode Fuzzy Hash: 0a792427d6449081519c7a3591d985c5fce257b2137503ca26eae71c15e14333
                                                          • Instruction Fuzzy Hash: 2311E172904209AFCF27AB649C4BEEF77ACDB11751F010169F549EA0A1EF719A818B60
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$LocalTime
                                                          • String ID:
                                                          • API String ID: 952045576-0
                                                          • Opcode ID: 4b617a2600b6f1758d0505ee2f38c7528731c3987b62f97d81b1c69dfeacc731
                                                          • Instruction ID: 354658e010cf9b9ddf364570575040eca64697fd6ba7675e3a6347afc7f3108a
                                                          • Opcode Fuzzy Hash: 4b617a2600b6f1758d0505ee2f38c7528731c3987b62f97d81b1c69dfeacc731
                                                          • Instruction Fuzzy Hash: E5418065C1021875CB12EBB4888BDDFB7B8AF45711F508866E918E7132FB34E259C3E5
                                                          APIs
                                                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0038682C,00000004,00000000,00000000), ref: 0034F953
                                                          • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,0038682C,00000004,00000000,00000000), ref: 0038F3D1
                                                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0038682C,00000004,00000000,00000000), ref: 0038F454
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ShowWindow
                                                          • String ID:
                                                          • API String ID: 1268545403-0
                                                          • Opcode ID: 48b2b04d575b2fccf4cd6748d51597ebe0122daf4a2d7f723da7ba817db42526
                                                          • Instruction ID: fe02a9a0c272762e68d89e9b64c303a04cba782f9e97d67dde06c86838a58c48
                                                          • Opcode Fuzzy Hash: 48b2b04d575b2fccf4cd6748d51597ebe0122daf4a2d7f723da7ba817db42526
                                                          • Instruction Fuzzy Hash: FC41D931618740BED7379F298988B2A7BD5AB56314F1D443DE0479F970C771B980C711
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 003C2D1B
                                                          • GetDC.USER32(00000000), ref: 003C2D23
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 003C2D2E
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 003C2D3A
                                                          • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 003C2D76
                                                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 003C2D87
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,003C5A65,?,?,000000FF,00000000,?,000000FF,?), ref: 003C2DC2
                                                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 003C2DE1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                          • String ID:
                                                          • API String ID: 3864802216-0
                                                          • Opcode ID: c6395a60523ca25258029fc719969b66b5d7128e5ad041c7cd0f10ff3878dbfd
                                                          • Instruction ID: 076895cf6918434b9e03ea59e2a23f55b5c060add4db5a2b1b10225b210eeab1
                                                          • Opcode Fuzzy Hash: c6395a60523ca25258029fc719969b66b5d7128e5ad041c7cd0f10ff3878dbfd
                                                          • Instruction Fuzzy Hash: BA319C72211214BFEB128F50CC8AFEB3BADEF19711F084055FE09DA291C675AC51CBA0
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: 67b466794834f65e3f414b44121b391586d1d8d2487cf351a28d8e7438f5d26a
                                                          • Instruction ID: 725f5b10d6513255fce0f7b741ef83a92355ca1906c1a7e14e25c278beccfd2e
                                                          • Opcode Fuzzy Hash: 67b466794834f65e3f414b44121b391586d1d8d2487cf351a28d8e7438f5d26a
                                                          • Instruction Fuzzy Hash: 8721DB66741A097BDA175E209D92FFB335DAF20385F444034FD04DEA81F720EE5483A5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: NULL Pointer assignment$Not an Object type
                                                          • API String ID: 0-572801152
                                                          • Opcode ID: e484d9a536c0a1b4cfcc9427c626ea2e5e28a8ba71f7c786d68fd27d1a9db6ea
                                                          • Instruction ID: 0cefa0c9726128e1cc8c5ef9cd7c7dbbc8abd8f0656588efd3c1a81a48dc3d79
                                                          • Opcode Fuzzy Hash: e484d9a536c0a1b4cfcc9427c626ea2e5e28a8ba71f7c786d68fd27d1a9db6ea
                                                          • Instruction Fuzzy Hash: A5D1D075A0060A9FDF12DFA8C880FEEB7B5BF48348F158069EA15AB680D770DD41CB90
                                                          APIs
                                                          • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,003717FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 003715CE
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,003717FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00371651
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,003717FB,?,003717FB,00000000,00000000,?,00000000,?,?,?,?), ref: 003716E4
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,003717FB,00000000,00000000,?,00000000,?,?,?,?), ref: 003716FB
                                                            • Part of subcall function 00363820: RtlAllocateHeap.NTDLL(00000000,?,00401444,?,0034FDF5,?,?,0033A976,00000010,00401440,003313FC,?,003313C6,?,00331129), ref: 00363852
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,003717FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00371777
                                                          • __freea.LIBCMT ref: 003717A2
                                                          • __freea.LIBCMT ref: 003717AE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                          • String ID:
                                                          • API String ID: 2829977744-0
                                                          • Opcode ID: 00b2636993de815f8edfcb20ee78838f84da1d89983d35e12a869fbe2a3607f1
                                                          • Instruction ID: 4d5683c9a4314e790555b88daafe4319bccec91cf055dd8ceddf00bda716c8ba
                                                          • Opcode Fuzzy Hash: 00b2636993de815f8edfcb20ee78838f84da1d89983d35e12a869fbe2a3607f1
                                                          • Instruction Fuzzy Hash: 2A91D573E102469ADB3A8E6CC881EEE7BB9AF45710F198519E809E7140D739DC44CBA0
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit
                                                          • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                          • API String ID: 2610073882-625585964
                                                          • Opcode ID: ad715e11b0fbfdb225408f2bf02ec56e466d7cbe764a35a0c46341c8c7eb62fe
                                                          • Instruction ID: 75a60b4187353414c85a56d600e567e855b1a72abac8051e818c3f2782f776f6
                                                          • Opcode Fuzzy Hash: ad715e11b0fbfdb225408f2bf02ec56e466d7cbe764a35a0c46341c8c7eb62fe
                                                          • Instruction Fuzzy Hash: C191C570A00219AFCF22CFA5C845FEEB7B8EF46714F108559F615AB682DB709941CFA4
                                                          APIs
                                                          • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 003A125C
                                                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 003A1284
                                                          • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 003A12A8
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 003A12D8
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 003A135F
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 003A13C4
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 003A1430
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                          • String ID:
                                                          • API String ID: 2550207440-0
                                                          • Opcode ID: 4eb5823ceb68e240330a77df1e37e1b8a929e389fa9fd5acd040d300c152914b
                                                          • Instruction ID: cb9bbc8e52674bb705b8ac1a48ce8e9abe9241c3b68b4d0dcf841ae786a1fbf9
                                                          • Opcode Fuzzy Hash: 4eb5823ceb68e240330a77df1e37e1b8a929e389fa9fd5acd040d300c152914b
                                                          • Instruction Fuzzy Hash: 28913475A00208AFDB07DF99C884BBEB7B9FF06321F118429E941EB291D774E941CB90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ObjectSelect$BeginCreatePath
                                                          • String ID:
                                                          • API String ID: 3225163088-0
                                                          • Opcode ID: 193bfafaed8713ac8f1af2c483efbb12d8cba41b7347e996c4d6ea3286bc1c78
                                                          • Instruction ID: 797007579a0e28533807adc3e9f975ca7893f8858cc9af3b6328c6f1ede3e4a7
                                                          • Opcode Fuzzy Hash: 193bfafaed8713ac8f1af2c483efbb12d8cba41b7347e996c4d6ea3286bc1c78
                                                          • Instruction Fuzzy Hash: 1B913A71D00219EFCB12CFA9CC84AEEBBB9FF49320F25459AE515BB251D374A941CB60
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 003B396B
                                                          • CharUpperBuffW.USER32(?,?), ref: 003B3A7A
                                                          • _wcslen.LIBCMT ref: 003B3A8A
                                                          • VariantClear.OLEAUT32(?), ref: 003B3C1F
                                                            • Part of subcall function 003A0CDF: VariantInit.OLEAUT32(00000000), ref: 003A0D1F
                                                            • Part of subcall function 003A0CDF: VariantCopy.OLEAUT32(?,?), ref: 003A0D28
                                                            • Part of subcall function 003A0CDF: VariantClear.OLEAUT32(?), ref: 003A0D34
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                          • API String ID: 4137639002-1221869570
                                                          • Opcode ID: 8746c0601a3a4665a068d7ae02ad4c6d84a5cdcb46ec15d11f38d37865dcd34b
                                                          • Instruction ID: 0df644045c66102540d143ff37577256178a5dce3525cc45c5e98cb80bb3884e
                                                          • Opcode Fuzzy Hash: 8746c0601a3a4665a068d7ae02ad4c6d84a5cdcb46ec15d11f38d37865dcd34b
                                                          • Instruction Fuzzy Hash: E4919B756083059FCB05DF28C4819AAB7E4FF89318F14882DF98A9B751DB30EE05CB82
                                                          APIs
                                                            • Part of subcall function 0039000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0038FF41,80070057,?,?,?,0039035E), ref: 0039002B
                                                            • Part of subcall function 0039000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0038FF41,80070057,?,?), ref: 00390046
                                                            • Part of subcall function 0039000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0038FF41,80070057,?,?), ref: 00390054
                                                            • Part of subcall function 0039000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0038FF41,80070057,?), ref: 00390064
                                                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 003B4C51
                                                          • _wcslen.LIBCMT ref: 003B4D59
                                                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 003B4DCF
                                                          • CoTaskMemFree.OLE32(?), ref: 003B4DDA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                          • String ID: NULL Pointer assignment
                                                          • API String ID: 614568839-2785691316
                                                          • Opcode ID: cae17fc5eb6ef2b9e0a4356ff3d67c5a3483056aa6bd06b1c8d66199aa5f69d1
                                                          • Instruction ID: 2d0893a1946bb391a3cc08195c700352a46244aaad5167382d4d9677d11f03d3
                                                          • Opcode Fuzzy Hash: cae17fc5eb6ef2b9e0a4356ff3d67c5a3483056aa6bd06b1c8d66199aa5f69d1
                                                          • Instruction Fuzzy Hash: D8910771D0021DAFDF16DFA4D891EEEB7B8BF48314F10816AE915AB251DB709A44CFA0
                                                          APIs
                                                          • GetMenu.USER32(?), ref: 003C2183
                                                          • GetMenuItemCount.USER32(00000000), ref: 003C21B5
                                                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 003C21DD
                                                          • _wcslen.LIBCMT ref: 003C2213
                                                          • GetMenuItemID.USER32(?,?), ref: 003C224D
                                                          • GetSubMenu.USER32(?,?), ref: 003C225B
                                                            • Part of subcall function 00393A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00393A57
                                                            • Part of subcall function 00393A3D: GetCurrentThreadId.KERNEL32 ref: 00393A5E
                                                            • Part of subcall function 00393A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,003925B3), ref: 00393A65
                                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 003C22E3
                                                            • Part of subcall function 0039E97B: Sleep.KERNELBASE ref: 0039E9F3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                          • String ID:
                                                          • API String ID: 4196846111-0
                                                          • Opcode ID: e9ddbda1bde53f15e3a691d207a5ceb7660545202a07599acfa1c377dffa9f6f
                                                          • Instruction ID: fa04670a1da774262168231863629c5162e7224012d9cfa02a18da1e1a34680d
                                                          • Opcode Fuzzy Hash: e9ddbda1bde53f15e3a691d207a5ceb7660545202a07599acfa1c377dffa9f6f
                                                          • Instruction Fuzzy Hash: A5716C75A00205AFCB16EF69C885FAEB7F5EF48320F158859E816EB351DB34ED418B90
                                                          APIs
                                                          • GetParent.USER32(?), ref: 0039AEF9
                                                          • GetKeyboardState.USER32(?), ref: 0039AF0E
                                                          • SetKeyboardState.USER32(?), ref: 0039AF6F
                                                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 0039AF9D
                                                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 0039AFBC
                                                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 0039AFFD
                                                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 0039B020
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: 9cc9a9a53937adcdb695f77ca84fa6863c640e84bd90c31df2d3d25f6981ad11
                                                          • Instruction ID: 23c7e8563b71916482b1f8f02d03f38f79f0ae4027870af6171b6ca6929dc1e0
                                                          • Opcode Fuzzy Hash: 9cc9a9a53937adcdb695f77ca84fa6863c640e84bd90c31df2d3d25f6981ad11
                                                          • Instruction Fuzzy Hash: 5B51E4A0A04BD53DFF3743348D49BBABEE95B06304F098589E1DA858C2C3D8ACD8D791
                                                          APIs
                                                          • GetParent.USER32(00000000), ref: 0039AD19
                                                          • GetKeyboardState.USER32(?), ref: 0039AD2E
                                                          • SetKeyboardState.USER32(?), ref: 0039AD8F
                                                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 0039ADBB
                                                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 0039ADD8
                                                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 0039AE17
                                                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 0039AE38
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: 3337f804bd5b225902d9fe8102b86692726affeb85b994d4818d98aeb82d90a1
                                                          • Instruction ID: 61bfbadbc31200cdeb335b970cb3b50f459233702c2f4e4df2bcd7f31c4cdcf4
                                                          • Opcode Fuzzy Hash: 3337f804bd5b225902d9fe8102b86692726affeb85b994d4818d98aeb82d90a1
                                                          • Instruction Fuzzy Hash: 2451F9A1904BD53DFF3783348C55B7ABED85B46300F098689E1D54A8C2D394EC94E7D2
                                                          APIs
                                                          • GetConsoleCP.KERNEL32(00373CD6,?,?,?,?,?,?,?,?,00365BA3,?,?,00373CD6,?,?), ref: 00365470
                                                          • __fassign.LIBCMT ref: 003654EB
                                                          • __fassign.LIBCMT ref: 00365506
                                                          • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00373CD6,00000005,00000000,00000000), ref: 0036552C
                                                          • WriteFile.KERNEL32(?,00373CD6,00000000,00365BA3,00000000,?,?,?,?,?,?,?,?,?,00365BA3,?), ref: 0036554B
                                                          • WriteFile.KERNEL32(?,?,00000001,00365BA3,00000000,?,?,?,?,?,?,?,?,?,00365BA3,?), ref: 00365584
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                          • String ID:
                                                          • API String ID: 1324828854-0
                                                          • Opcode ID: 95531349c11d1163ed1ab2471164d71e6a9c6c6be0aea897c096a0b64d7d52d8
                                                          • Instruction ID: 57363828ab98470dbcc8f8342fbf873ca7d0acd6a340764332d6825521201b88
                                                          • Opcode Fuzzy Hash: 95531349c11d1163ed1ab2471164d71e6a9c6c6be0aea897c096a0b64d7d52d8
                                                          • Instruction Fuzzy Hash: CB51D7719006499FDB12CFA8D845AEEBBF9EF0A300F14816EF556E7295D730EA41CB60
                                                          APIs
                                                          • SetWindowLongW.USER32(00000002,000000F0,?), ref: 003C6C33
                                                          • SetWindowLongW.USER32(?,000000EC,?), ref: 003C6C4A
                                                          • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 003C6C73
                                                          • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,003AAB79,00000000,00000000), ref: 003C6C98
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 003C6CC7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$MessageSendShow
                                                          • String ID: @q
                                                          • API String ID: 3688381893-962691702
                                                          • Opcode ID: 8343328727032a7d39ccb5a91094fa81a56ac4b151bd09c48cc604c88e8e675d
                                                          • Instruction ID: c1cf39746cc460a2c5bbc83addf2407af8b1f4a11d8e3a3b00dca74bd7b253bc
                                                          • Opcode Fuzzy Hash: 8343328727032a7d39ccb5a91094fa81a56ac4b151bd09c48cc604c88e8e675d
                                                          • Instruction Fuzzy Hash: F441D535A04104AFD726CF28CD5AFA97BA9EB09350F16422CF899E72E1C771ED41CB40
                                                          APIs
                                                            • Part of subcall function 003B304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 003B307A
                                                            • Part of subcall function 003B304E: _wcslen.LIBCMT ref: 003B309B
                                                          • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 003B1112
                                                          • WSAGetLastError.WSOCK32 ref: 003B1121
                                                          • WSAGetLastError.WSOCK32 ref: 003B11C9
                                                          • closesocket.WSOCK32(00000000), ref: 003B11F9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 2675159561-0
                                                          • Opcode ID: aea6b0599a42708713a10732d2d0daf7f34a1263ff94914fef52d7a78cbab8a3
                                                          • Instruction ID: 421ce458cd622659ae4b9b62277c96a2bf55275bbdc419495e67f1d6d85b1e93
                                                          • Opcode Fuzzy Hash: aea6b0599a42708713a10732d2d0daf7f34a1263ff94914fef52d7a78cbab8a3
                                                          • Instruction Fuzzy Hash: AD41F431600204AFDB129F18C895BEAB7EDEF45328F148059FA09DF691C770AD41CBA0
                                                          APIs
                                                            • Part of subcall function 0039DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0039CF22,?), ref: 0039DDFD
                                                            • Part of subcall function 0039DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0039CF22,?), ref: 0039DE16
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 0039CF45
                                                          • MoveFileW.KERNEL32(?,?), ref: 0039CF7F
                                                          • _wcslen.LIBCMT ref: 0039D005
                                                          • _wcslen.LIBCMT ref: 0039D01B
                                                          • SHFileOperationW.SHELL32(?), ref: 0039D061
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                          • String ID: \*.*
                                                          • API String ID: 3164238972-1173974218
                                                          • Opcode ID: e1865751142f8e0f354077c019864b77f9142ca970fa399a6a9e4401bcd38fda
                                                          • Instruction ID: 3e5067dad58adde2d689b9ec07a30cd6c448f047a3372c0ee08ce4558b599913
                                                          • Opcode Fuzzy Hash: e1865751142f8e0f354077c019864b77f9142ca970fa399a6a9e4401bcd38fda
                                                          • Instruction Fuzzy Hash: 894146719452199FDF13EBA4D982EDDB7B9AF08780F1110E6E509EB141EB34AA88CB50
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 003C3E35
                                                          • IsMenu.USER32(?), ref: 003C3E4A
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 003C3E92
                                                          • DrawMenuBar.USER32 ref: 003C3EA5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$DrawInfoInsert
                                                          • String ID: 0$@q
                                                          • API String ID: 3076010158-1450264679
                                                          • Opcode ID: dc87b99bda6b14d585317b5f4c00cf04a4bff68118abae7996a8fe45140f8f11
                                                          • Instruction ID: 221db273428f4687e741cf7d32108f035e25e7782679cffbae74cd7903b1dc4f
                                                          • Opcode Fuzzy Hash: dc87b99bda6b14d585317b5f4c00cf04a4bff68118abae7996a8fe45140f8f11
                                                          • Instruction Fuzzy Hash: 74413876A11209AFDB11DF60D884EAABBB9FF49354F05812DF905EB250D730AE45CFA0
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00397769
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0039778F
                                                          • SysAllocString.OLEAUT32(00000000), ref: 00397792
                                                          • SysAllocString.OLEAUT32(?), ref: 003977B0
                                                          • SysFreeString.OLEAUT32(?), ref: 003977B9
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 003977DE
                                                          • SysAllocString.OLEAUT32(?), ref: 003977EC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: 1e98a382b8293667c3e16783c5bc59818f928b68e8e09b42d9ec6811fa9b1268
                                                          • Instruction ID: 992593386b1421598b647c3897ad48920e74133e19bc6e0d91f92a9f684c1fcf
                                                          • Opcode Fuzzy Hash: 1e98a382b8293667c3e16783c5bc59818f928b68e8e09b42d9ec6811fa9b1268
                                                          • Instruction Fuzzy Hash: CB21A476614219AFDF12DFE9CC88CBB77ECEB09764B058025F915DB190D670EC428760
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00397842
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00397868
                                                          • SysAllocString.OLEAUT32(00000000), ref: 0039786B
                                                          • SysAllocString.OLEAUT32 ref: 0039788C
                                                          • SysFreeString.OLEAUT32 ref: 00397895
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 003978AF
                                                          • SysAllocString.OLEAUT32(?), ref: 003978BD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: 99414e1da697d57c86d9453697c506152a1955b9a83606276c61d61af67a232f
                                                          • Instruction ID: 7a30dbf98e9f68e905b984f348a5961cc03b3133ade18a5df7b37267447cb795
                                                          • Opcode Fuzzy Hash: 99414e1da697d57c86d9453697c506152a1955b9a83606276c61d61af67a232f
                                                          • Instruction Fuzzy Hash: 8221A131618204AFDF12AFA9DC8DDAA77ECFB08360B158125F915CB2A1D670EC41CB64
                                                          APIs
                                                          • GetStdHandle.KERNEL32(0000000C), ref: 003A04F2
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 003A052E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateHandlePipe
                                                          • String ID: nul
                                                          • API String ID: 1424370930-2873401336
                                                          • Opcode ID: 6c09959c0b8c78984bf53122f0720b363d1e44d1eb9541171b9120f8843b28a1
                                                          • Instruction ID: 924e94311298f20f006d8290e0ceade1920ec93d5608ee88c284543db78a5cb5
                                                          • Opcode Fuzzy Hash: 6c09959c0b8c78984bf53122f0720b363d1e44d1eb9541171b9120f8843b28a1
                                                          • Instruction Fuzzy Hash: C121AD74904305AFCF268F69DC04A9A7BB8EF47760F204A18F8A1E62E0E7709940CF20
                                                          APIs
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 003A05C6
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 003A0601
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateHandlePipe
                                                          • String ID: nul
                                                          • API String ID: 1424370930-2873401336
                                                          • Opcode ID: 26055a12a23f8b9dcb396ba40b76c9a9d051e44a297b115a18e991a0009b607e
                                                          • Instruction ID: 2c23718b8417d156d0247d305760a9a2b9638a28369c1aef33448ac4ee5a5238
                                                          • Opcode Fuzzy Hash: 26055a12a23f8b9dcb396ba40b76c9a9d051e44a297b115a18e991a0009b607e
                                                          • Instruction Fuzzy Hash: 0E2151755003059BDF2A9F69DC04E9A77E8FF97724F200A19F9A1E72E0E7709960CB10
                                                          APIs
                                                            • Part of subcall function 0033600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0033604C
                                                            • Part of subcall function 0033600E: GetStockObject.GDI32(00000011), ref: 00336060
                                                            • Part of subcall function 0033600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0033606A
                                                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 003C4112
                                                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 003C411F
                                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 003C412A
                                                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 003C4139
                                                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 003C4145
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CreateObjectStockWindow
                                                          • String ID: Msctls_Progress32
                                                          • API String ID: 1025951953-3636473452
                                                          • Opcode ID: a2e7b312ffc019606bb6fd5fef9a524408aa79c669b6827d426a5ff594df6d8a
                                                          • Instruction ID: ef6462e361e760809eda076cc7dcc06c785776418d73c9f593e9131d5240f4fb
                                                          • Opcode Fuzzy Hash: a2e7b312ffc019606bb6fd5fef9a524408aa79c669b6827d426a5ff594df6d8a
                                                          • Instruction Fuzzy Hash: FC1190B2150219BEEF129F64CC86EE77F9DEF08798F014111FA18E6150C6729C219BA4
                                                          APIs
                                                            • Part of subcall function 0036D7A3: _free.LIBCMT ref: 0036D7CC
                                                          • _free.LIBCMT ref: 0036D82D
                                                            • Part of subcall function 003629C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0036D7D1,00000000,00000000,00000000,00000000,?,0036D7F8,00000000,00000007,00000000,?,0036DBF5,00000000), ref: 003629DE
                                                            • Part of subcall function 003629C8: GetLastError.KERNEL32(00000000,?,0036D7D1,00000000,00000000,00000000,00000000,?,0036D7F8,00000000,00000007,00000000,?,0036DBF5,00000000,00000000), ref: 003629F0
                                                          • _free.LIBCMT ref: 0036D838
                                                          • _free.LIBCMT ref: 0036D843
                                                          • _free.LIBCMT ref: 0036D897
                                                          • _free.LIBCMT ref: 0036D8A2
                                                          • _free.LIBCMT ref: 0036D8AD
                                                          • _free.LIBCMT ref: 0036D8B8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                          • Instruction ID: c2a11515930ef6afda84cb06ec0ff2b28c70ed41142b46cb0cecea6bffa084aa
                                                          • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                          • Instruction Fuzzy Hash: B5115171B40B04AAD523BFB0CC47FCB7BDC6F42700F448825B299AE096DBA6B5154651
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0039DA74
                                                          • LoadStringW.USER32(00000000), ref: 0039DA7B
                                                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0039DA91
                                                          • LoadStringW.USER32(00000000), ref: 0039DA98
                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0039DADC
                                                          Strings
                                                          • %s (%d) : ==> %s: %s %s, xrefs: 0039DAB9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message
                                                          • String ID: %s (%d) : ==> %s: %s %s
                                                          • API String ID: 4072794657-3128320259
                                                          • Opcode ID: 8bb8c7effafcaf27d6e4565b1cf2f0eab070c751c806fda005aa5d79a824726e
                                                          • Instruction ID: 2b33e3ac8ee7768aa8920214ffbc85c21ea35e44ec9dedc91bb856ca44b66701
                                                          • Opcode Fuzzy Hash: 8bb8c7effafcaf27d6e4565b1cf2f0eab070c751c806fda005aa5d79a824726e
                                                          • Instruction Fuzzy Hash: 770186F69102087FEB12ABA49D89EF7336CE708301F445496F74AE2041EA74AE854F74
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(00E1FD00,00E1FD00), ref: 003A097B
                                                          • EnterCriticalSection.KERNEL32(00E1FCE0,00000000), ref: 003A098D
                                                          • TerminateThread.KERNEL32(?,000001F6), ref: 003A099B
                                                          • WaitForSingleObject.KERNEL32(?,000003E8), ref: 003A09A9
                                                          • CloseHandle.KERNEL32(?), ref: 003A09B8
                                                          • InterlockedExchange.KERNEL32(00E1FD00,000001F6), ref: 003A09C8
                                                          • LeaveCriticalSection.KERNEL32(00E1FCE0), ref: 003A09CF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                          • String ID:
                                                          • API String ID: 3495660284-0
                                                          • Opcode ID: 6a7db9aaec4c1f98b14ec9bcf86b757a681260d55fb0a13174300eb4b2c360e4
                                                          • Instruction ID: 4610fb0a3245222a2599ec800cd1d3fa9c1207b3c6b5d5b04b4b2d44b9a5f2fa
                                                          • Opcode Fuzzy Hash: 6a7db9aaec4c1f98b14ec9bcf86b757a681260d55fb0a13174300eb4b2c360e4
                                                          • Instruction Fuzzy Hash: D8F01932452A02ABDB465BA4EE8CED6BA39FF02702F402525F206908A0C774A465CF90
                                                          APIs
                                                          • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 003B1DC0
                                                          • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 003B1DE1
                                                          • WSAGetLastError.WSOCK32 ref: 003B1DF2
                                                          • htons.WSOCK32(?,?,?,?,?), ref: 003B1EDB
                                                          • inet_ntoa.WSOCK32(?), ref: 003B1E8C
                                                            • Part of subcall function 003939E8: _strlen.LIBCMT ref: 003939F2
                                                            • Part of subcall function 003B3224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,003AEC0C), ref: 003B3240
                                                          • _strlen.LIBCMT ref: 003B1F35
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                          • String ID:
                                                          • API String ID: 3203458085-0
                                                          • Opcode ID: c40805b2010277c3fe7d2ce6c0f837b00b1b847702ab96670640fba36e18234c
                                                          • Instruction ID: 4bdc41b2c8877b3b9563afbd283588714896f409225820634a9224f33421af4c
                                                          • Opcode Fuzzy Hash: c40805b2010277c3fe7d2ce6c0f837b00b1b847702ab96670640fba36e18234c
                                                          • Instruction Fuzzy Hash: 2EB1D031204300AFC326DF24C895E7A7BE5AF85318F958A4CF6565F6A2CB71ED41CB91
                                                          APIs
                                                          • GetClientRect.USER32(?,?), ref: 00335D30
                                                          • GetWindowRect.USER32(?,?), ref: 00335D71
                                                          • ScreenToClient.USER32(?,?), ref: 00335D99
                                                          • GetClientRect.USER32(?,?), ref: 00335ED7
                                                          • GetWindowRect.USER32(?,?), ref: 00335EF8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Rect$Client$Window$Screen
                                                          • String ID:
                                                          • API String ID: 1296646539-0
                                                          • Opcode ID: c2eb12aa6472e5006e363832ddce1fbb8be0b6e082e3aa3d074fa5d7f5aa82cb
                                                          • Instruction ID: 70254636c03ae61ea80c2711e3445bf1afc056fe80dd5a39464663e35aa82525
                                                          • Opcode Fuzzy Hash: c2eb12aa6472e5006e363832ddce1fbb8be0b6e082e3aa3d074fa5d7f5aa82cb
                                                          • Instruction Fuzzy Hash: A7B18935A00B4ADBDB21CFA9C4807EEB7F5FF48310F14941AE8AAD7650DB34AA51DB50
                                                          APIs
                                                          • __allrem.LIBCMT ref: 003600BA
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 003600D6
                                                          • __allrem.LIBCMT ref: 003600ED
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0036010B
                                                          • __allrem.LIBCMT ref: 00360122
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00360140
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                          • String ID:
                                                          • API String ID: 1992179935-0
                                                          • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                          • Instruction ID: 65b1f48eb61d0aa5cd6c7c63b1f7658b71cfacf1c74ba5b0465c3ef8e8350ceb
                                                          • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                          • Instruction Fuzzy Hash: 7B8149766007069FE7269F38CC42B6BB3E8AF41720F25863AF851DB691E770D9048B50
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,003582D9,003582D9,?,?,?,0036644F,00000001,00000001,8BE85006), ref: 00366258
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0036644F,00000001,00000001,8BE85006,?,?,?), ref: 003662DE
                                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 003663D8
                                                          • __freea.LIBCMT ref: 003663E5
                                                            • Part of subcall function 00363820: RtlAllocateHeap.NTDLL(00000000,?,00401444,?,0034FDF5,?,?,0033A976,00000010,00401440,003313FC,?,003313C6,?,00331129), ref: 00363852
                                                          • __freea.LIBCMT ref: 003663EE
                                                          • __freea.LIBCMT ref: 00366413
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1414292761-0
                                                          • Opcode ID: 8214d981a21ae79543a3d2a7aafdd29badca6bacc941bde5e856a909270c780e
                                                          • Instruction ID: ef221e313deaedfb21550f715ef4422660298a2be68c2c68106f0310d9e558e6
                                                          • Opcode Fuzzy Hash: 8214d981a21ae79543a3d2a7aafdd29badca6bacc941bde5e856a909270c780e
                                                          • Instruction Fuzzy Hash: 0C51D672600216ABDB278F64CC82EBF77A9EF45790F268629FD05DB258DB34DC40C660
                                                          APIs
                                                            • Part of subcall function 00339CB3: _wcslen.LIBCMT ref: 00339CBD
                                                            • Part of subcall function 003BC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,003BB6AE,?,?), ref: 003BC9B5
                                                            • Part of subcall function 003BC998: _wcslen.LIBCMT ref: 003BC9F1
                                                            • Part of subcall function 003BC998: _wcslen.LIBCMT ref: 003BCA68
                                                            • Part of subcall function 003BC998: _wcslen.LIBCMT ref: 003BCA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003BBCCA
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 003BBD25
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 003BBD6A
                                                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 003BBD99
                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 003BBDF3
                                                          • RegCloseKey.ADVAPI32(?), ref: 003BBDFF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                          • String ID:
                                                          • API String ID: 1120388591-0
                                                          • Opcode ID: 88aa283ad58f511311db168f112625cd833013027ceb8860ba2d7c197a18d94c
                                                          • Instruction ID: fc6f79350383439aa489b4f4e19fb7d627ee3255add851424da7f128fdbba154
                                                          • Opcode Fuzzy Hash: 88aa283ad58f511311db168f112625cd833013027ceb8860ba2d7c197a18d94c
                                                          • Instruction Fuzzy Hash: 63818C30208241AFD716DF24C891E6ABBE9FF84308F14855CF5998B6A2DF71ED45CB92
                                                          APIs
                                                          • VariantInit.OLEAUT32(00000035), ref: 0038F7B9
                                                          • SysAllocString.OLEAUT32(00000001), ref: 0038F860
                                                          • VariantCopy.OLEAUT32(0038FA64,00000000), ref: 0038F889
                                                          • VariantClear.OLEAUT32(0038FA64), ref: 0038F8AD
                                                          • VariantCopy.OLEAUT32(0038FA64,00000000), ref: 0038F8B1
                                                          • VariantClear.OLEAUT32(?), ref: 0038F8BB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCopy$AllocInitString
                                                          • String ID:
                                                          • API String ID: 3859894641-0
                                                          • Opcode ID: f43910585786473551dc6adec5591c58ebc60f3f277d79801652f73af845b372
                                                          • Instruction ID: 73afe11c9b6a47092692a5bfac929a34a898c551e4e4215781a63787432aa4e5
                                                          • Opcode Fuzzy Hash: f43910585786473551dc6adec5591c58ebc60f3f277d79801652f73af845b372
                                                          • Instruction Fuzzy Hash: 6E51D331610310FFCF26BB65D895B29B3A8EF45310F2494A7E906DF296DB709C40CBA6
                                                          APIs
                                                            • Part of subcall function 00337620: _wcslen.LIBCMT ref: 00337625
                                                            • Part of subcall function 00336B57: _wcslen.LIBCMT ref: 00336B6A
                                                          • GetOpenFileNameW.COMDLG32(00000058), ref: 003A94E5
                                                          • _wcslen.LIBCMT ref: 003A9506
                                                          • _wcslen.LIBCMT ref: 003A952D
                                                          • GetSaveFileNameW.COMDLG32(00000058), ref: 003A9585
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$FileName$OpenSave
                                                          • String ID: X
                                                          • API String ID: 83654149-3081909835
                                                          • Opcode ID: 2f7610d4f0c325980e6de4543776934997fd1d56d41bc23131911e5d7c142847
                                                          • Instruction ID: a41c7d0552c40e9eeedcf4f0e8b70e1f8fc78be0f4fa18fdc296bae8c427ab73
                                                          • Opcode Fuzzy Hash: 2f7610d4f0c325980e6de4543776934997fd1d56d41bc23131911e5d7c142847
                                                          • Instruction Fuzzy Hash: 21E181355083409FD726DF24C485B6AB7E4FF86314F05896EF8899B2A2DB31DD05CB92
                                                          APIs
                                                            • Part of subcall function 00349BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00349BB2
                                                          • BeginPaint.USER32(?,?,?), ref: 00349241
                                                          • GetWindowRect.USER32(?,?), ref: 003492A5
                                                          • ScreenToClient.USER32(?,?), ref: 003492C2
                                                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 003492D3
                                                          • EndPaint.USER32(?,?,?,?,?), ref: 00349321
                                                          • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 003871EA
                                                            • Part of subcall function 00349339: BeginPath.GDI32(00000000), ref: 00349357
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                          • String ID:
                                                          • API String ID: 3050599898-0
                                                          • Opcode ID: aaa98197f0122611f0070b7ed177810fef0827fcbdef6a3cb401b48de2bd82c6
                                                          • Instruction ID: a1008a1da1d2973f626ae633d51c06c7b062c089c6a9d6b6993074defb043f85
                                                          • Opcode Fuzzy Hash: aaa98197f0122611f0070b7ed177810fef0827fcbdef6a3cb401b48de2bd82c6
                                                          • Instruction Fuzzy Hash: 30419F70104300AFD722DF25CC89FAB7BE9EB4A320F14066AF994DB2B1C771A845DB61
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 003A080C
                                                          • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 003A0847
                                                          • EnterCriticalSection.KERNEL32(?), ref: 003A0863
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 003A08DC
                                                          • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 003A08F3
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 003A0921
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                          • String ID:
                                                          • API String ID: 3368777196-0
                                                          • Opcode ID: befcde91fedf7b9e9c63d67629c4448ff2957cffab11d93a4b144b78e1914b00
                                                          • Instruction ID: f8a52fc011dcf4564d107c21c18b90b5350d92702f951b1c047642abb960b562
                                                          • Opcode Fuzzy Hash: befcde91fedf7b9e9c63d67629c4448ff2957cffab11d93a4b144b78e1914b00
                                                          • Instruction Fuzzy Hash: F2416A71900205EFDF1AAF54DC85AAAB7B8FF05300F1440A9ED04DE2A6D734EE65DBA4
                                                          APIs
                                                          • IsWindowVisible.USER32(?), ref: 00394C95
                                                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00394CB2
                                                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00394CEA
                                                          • _wcslen.LIBCMT ref: 00394D08
                                                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00394D10
                                                          • _wcsstr.LIBVCRUNTIME ref: 00394D1A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                          • String ID:
                                                          • API String ID: 72514467-0
                                                          • Opcode ID: 61418713c1695366e0f54221176776db91a26ff6789f3cc7603fd523fcd86c8c
                                                          • Instruction ID: 25956ae18263185f4a3cbf26e05e8572cd29faee1c1c2f11c25d25c56409d35b
                                                          • Opcode Fuzzy Hash: 61418713c1695366e0f54221176776db91a26ff6789f3cc7603fd523fcd86c8c
                                                          • Instruction Fuzzy Hash: 1B21F676604200BFEF175B39AD49E7BBBACDF45750F158029F809CE192EA61DC4297A0
                                                          APIs
                                                            • Part of subcall function 00333AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00333A97,?,?,00332E7F,?,?,?,00000000), ref: 00333AC2
                                                          • _wcslen.LIBCMT ref: 003A587B
                                                          • CoInitialize.OLE32(00000000), ref: 003A5995
                                                          • CoCreateInstance.OLE32(003CFCF8,00000000,00000001,003CFB68,?), ref: 003A59AE
                                                          • CoUninitialize.OLE32 ref: 003A59CC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                          • String ID: .lnk
                                                          • API String ID: 3172280962-24824748
                                                          • Opcode ID: 16761ed8ab8b31bf09243bd1ef06638f0d642bfc6690dc3a2a852c1ea42b6911
                                                          • Instruction ID: d3c0d65fb048b0ee25f710c8d47b7eea940051800bd8d6434b0169704944416c
                                                          • Opcode Fuzzy Hash: 16761ed8ab8b31bf09243bd1ef06638f0d642bfc6690dc3a2a852c1ea42b6911
                                                          • Instruction Fuzzy Hash: BDD152756087019FC716DF24C480A2ABBE5FF8A720F15895DF88A9B361DB31EC45CB92
                                                          APIs
                                                            • Part of subcall function 00390FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00390FCA
                                                            • Part of subcall function 00390FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00390FD6
                                                            • Part of subcall function 00390FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00390FE5
                                                            • Part of subcall function 00390FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00390FEC
                                                            • Part of subcall function 00390FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00391002
                                                          • GetLengthSid.ADVAPI32(?,00000000,00391335), ref: 003917AE
                                                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 003917BA
                                                          • HeapAlloc.KERNEL32(00000000), ref: 003917C1
                                                          • CopySid.ADVAPI32(00000000,00000000,?), ref: 003917DA
                                                          • GetProcessHeap.KERNEL32(00000000,00000000,00391335), ref: 003917EE
                                                          • HeapFree.KERNEL32(00000000), ref: 003917F5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                          • String ID:
                                                          • API String ID: 3008561057-0
                                                          • Opcode ID: 286da6f94cdc82ced2c6b8b0fd3a8b725a8a6173d396e4c535e8c5e9f1e4ff82
                                                          • Instruction ID: 444dcba57190ea6bcf381bbb112bd986a2362c892acf718935e5cf20a67283c6
                                                          • Opcode Fuzzy Hash: 286da6f94cdc82ced2c6b8b0fd3a8b725a8a6173d396e4c535e8c5e9f1e4ff82
                                                          • Instruction Fuzzy Hash: EC11A932A20206FFDF229FA5CC49FAE7BADEB41355F144018F486E7220C736A940CB60
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 003914FF
                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 00391506
                                                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00391515
                                                          • CloseHandle.KERNEL32(00000004), ref: 00391520
                                                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0039154F
                                                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 00391563
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                          • String ID:
                                                          • API String ID: 1413079979-0
                                                          • Opcode ID: 35feb44f80e7b52634de46ea23375a39a5290d811f14582e2264ac2bb4a3fe3f
                                                          • Instruction ID: dc2282a5aad6c3d26b2b6630ee3ab2207c12f474cb2805b03877d4f0cf9e2bbe
                                                          • Opcode Fuzzy Hash: 35feb44f80e7b52634de46ea23375a39a5290d811f14582e2264ac2bb4a3fe3f
                                                          • Instruction Fuzzy Hash: A111147250024AABDF128FA8ED49FDA7BADFB49744F064025FA09A2060C375DE61DB60
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,00353379,00352FE5), ref: 00353390
                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0035339E
                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 003533B7
                                                          • SetLastError.KERNEL32(00000000,?,00353379,00352FE5), ref: 00353409
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastValue___vcrt_
                                                          • String ID:
                                                          • API String ID: 3852720340-0
                                                          • Opcode ID: 8fc183a376a6a41c44298a7e984342a8ff819d16d354a4a263d84cb6f917c1c8
                                                          • Instruction ID: 58bc309685bb793319ab707287d7bba639b618725c3d9d159c6f7d406e056b3c
                                                          • Opcode Fuzzy Hash: 8fc183a376a6a41c44298a7e984342a8ff819d16d354a4a263d84cb6f917c1c8
                                                          • Instruction Fuzzy Hash: E2012436619316BEE62727757DC5DA72A98EB053FBB21022DFC10891F0EF218D0E9648
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,00365686,00373CD6,?,00000000,?,00365B6A,?,?,?,?,?,0035E6D1,?,003F8A48), ref: 00362D78
                                                          • _free.LIBCMT ref: 00362DAB
                                                          • _free.LIBCMT ref: 00362DD3
                                                          • SetLastError.KERNEL32(00000000,?,?,?,?,0035E6D1,?,003F8A48,00000010,00334F4A,?,?,00000000,00373CD6), ref: 00362DE0
                                                          • SetLastError.KERNEL32(00000000,?,?,?,?,0035E6D1,?,003F8A48,00000010,00334F4A,?,?,00000000,00373CD6), ref: 00362DEC
                                                          • _abort.LIBCMT ref: 00362DF2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_free$_abort
                                                          • String ID:
                                                          • API String ID: 3160817290-0
                                                          • Opcode ID: 5b97de697c8b924271ceb7415dfe7c41530f44d85bc381115350a52499566e01
                                                          • Instruction ID: d4b2789fe566684b7fb478adc3dbb381a3d299b34546a53839dc7897a8ef3223
                                                          • Opcode Fuzzy Hash: 5b97de697c8b924271ceb7415dfe7c41530f44d85bc381115350a52499566e01
                                                          • Instruction Fuzzy Hash: 9CF0C835A44E0167C2132738BD1AE6F255DAFC37A1F27C418F838DA1DEEF3498114260
                                                          APIs
                                                            • Part of subcall function 00349639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00349693
                                                            • Part of subcall function 00349639: SelectObject.GDI32(?,00000000), ref: 003496A2
                                                            • Part of subcall function 00349639: BeginPath.GDI32(?), ref: 003496B9
                                                            • Part of subcall function 00349639: SelectObject.GDI32(?,00000000), ref: 003496E2
                                                          • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 003C8A4E
                                                          • LineTo.GDI32(?,00000003,00000000), ref: 003C8A62
                                                          • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 003C8A70
                                                          • LineTo.GDI32(?,00000000,00000003), ref: 003C8A80
                                                          • EndPath.GDI32(?), ref: 003C8A90
                                                          • StrokePath.GDI32(?), ref: 003C8AA0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                          • String ID:
                                                          • API String ID: 43455801-0
                                                          • Opcode ID: 2a720f713fc64bc7fa54cbafd882cfda3dcc587829b0eedaa337a2aaf5344e61
                                                          • Instruction ID: a85a6b7708529a49cf51765b60a530242981fe495e23f79403b0cbeeabdfafc8
                                                          • Opcode Fuzzy Hash: 2a720f713fc64bc7fa54cbafd882cfda3dcc587829b0eedaa337a2aaf5344e61
                                                          • Instruction Fuzzy Hash: 3E110976400118FFDB129F90DC88FEA7F6CEB08350F048026FA599A1A1C771AE55DFA0
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 00395218
                                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 00395229
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00395230
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 00395238
                                                          • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0039524F
                                                          • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00395261
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CapsDevice$Release
                                                          • String ID:
                                                          • API String ID: 1035833867-0
                                                          • Opcode ID: d806107469f5aec186abb75e1256f14c3a2f2d278d135f14969df1e244741ba0
                                                          • Instruction ID: 7cea885f61d66a39d5c59e428a735347cd046af2417992d790f2ab0254710616
                                                          • Opcode Fuzzy Hash: d806107469f5aec186abb75e1256f14c3a2f2d278d135f14969df1e244741ba0
                                                          • Instruction Fuzzy Hash: B2014475A01714BBEF116BA59D49E5EBF78FB44751F084465FA08EB281D6709810CB60
                                                          APIs
                                                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00331BF4
                                                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 00331BFC
                                                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00331C07
                                                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00331C12
                                                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 00331C1A
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00331C22
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Virtual
                                                          • String ID:
                                                          • API String ID: 4278518827-0
                                                          • Opcode ID: 1dbf9536b93b398a80692d7e75a7a6eecf7ece35a36c7c4af1574c6ef35f3cc6
                                                          • Instruction ID: ee8bdd0a28db86e969ce8904682e86a5bc5c0dc111bfc0b855cc15b71d0c14ff
                                                          • Opcode Fuzzy Hash: 1dbf9536b93b398a80692d7e75a7a6eecf7ece35a36c7c4af1574c6ef35f3cc6
                                                          • Instruction Fuzzy Hash: F1016CB09027597DE3008F5A8C85B52FFA8FF19354F04411BD15C47A41C7F5A864CBE5
                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0039EB30
                                                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0039EB46
                                                          • GetWindowThreadProcessId.USER32(?,?), ref: 0039EB55
                                                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0039EB64
                                                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0039EB6E
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0039EB75
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 839392675-0
                                                          • Opcode ID: fa25b775629497eb7d4134999facb2fb21b837184c1e7ac2448730284f4eaf0d
                                                          • Instruction ID: f1f1b056a8e0babc836813d6356f38e12b87ef5635e010ae369e9deb46df2eda
                                                          • Opcode Fuzzy Hash: fa25b775629497eb7d4134999facb2fb21b837184c1e7ac2448730284f4eaf0d
                                                          • Instruction Fuzzy Hash: 45F0BE72610158BBE7225B639C0EEEF7E7CEFCAB15F041158F605D1090D7A02A01C7B4
                                                          APIs
                                                          • GetClientRect.USER32(?), ref: 00387452
                                                          • SendMessageW.USER32(?,00001328,00000000,?), ref: 00387469
                                                          • GetWindowDC.USER32(?), ref: 00387475
                                                          • GetPixel.GDI32(00000000,?,?), ref: 00387484
                                                          • ReleaseDC.USER32(?,00000000), ref: 00387496
                                                          • GetSysColor.USER32(00000005), ref: 003874B0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                          • String ID:
                                                          • API String ID: 272304278-0
                                                          • Opcode ID: 799e3b8fc598453bc473c9f9c9a9a83cac68006597b47f545a5cc33f3bb8d383
                                                          • Instruction ID: 7dea8eba5a749d9861e6462db8ca9d42b8288cd6998699b0e358afc542bc190a
                                                          • Opcode Fuzzy Hash: 799e3b8fc598453bc473c9f9c9a9a83cac68006597b47f545a5cc33f3bb8d383
                                                          • Instruction Fuzzy Hash: B6018F31410205EFDB129FA5DD08FEA7BBAFB04311F251060F919E30A1CB312D51EB10
                                                          APIs
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0039187F
                                                          • UnloadUserProfile.USERENV(?,?), ref: 0039188B
                                                          • CloseHandle.KERNEL32(?), ref: 00391894
                                                          • CloseHandle.KERNEL32(?), ref: 0039189C
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 003918A5
                                                          • HeapFree.KERNEL32(00000000), ref: 003918AC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                          • String ID:
                                                          • API String ID: 146765662-0
                                                          • Opcode ID: 0922549d908556d086e41ceee048fe877e8cce9c1cdda9796075a0cbd9730f2a
                                                          • Instruction ID: 17fb4ca6e805e2ac1d0cd051674226edfa2a07651f3670239db25e32117c85bf
                                                          • Opcode Fuzzy Hash: 0922549d908556d086e41ceee048fe877e8cce9c1cdda9796075a0cbd9730f2a
                                                          • Instruction Fuzzy Hash: D5E0C236414501BBDB025BA2ED0CD0ABB2DFB49B22B109220F229C1470CB32A420DB50
                                                          APIs
                                                          • __Init_thread_footer.LIBCMT ref: 0033BEB3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Init_thread_footer
                                                          • String ID: D%@$D%@$D%@$D%@D%@
                                                          • API String ID: 1385522511-1921936383
                                                          • Opcode ID: c7dc66ac17504900feead5880d997ebd216b111b2e652e32b198f9a5f7f8413f
                                                          • Instruction ID: bb118b0d89e2df1c9824a903c518a52dd3e23ea8869386db254085b30d89e7b3
                                                          • Opcode Fuzzy Hash: c7dc66ac17504900feead5880d997ebd216b111b2e652e32b198f9a5f7f8413f
                                                          • Instruction Fuzzy Hash: 11915975A0020ADFCB29CF58C4D06AAF7F5FF58314F25816ADA45AB350D771AA81CB90
                                                          APIs
                                                            • Part of subcall function 00350242: EnterCriticalSection.KERNEL32(0040070C,00401884,?,?,0034198B,00402518,?,?,?,003312F9,00000000), ref: 0035024D
                                                            • Part of subcall function 00350242: LeaveCriticalSection.KERNEL32(0040070C,?,0034198B,00402518,?,?,?,003312F9,00000000), ref: 0035028A
                                                            • Part of subcall function 00339CB3: _wcslen.LIBCMT ref: 00339CBD
                                                            • Part of subcall function 003500A3: __onexit.LIBCMT ref: 003500A9
                                                          • __Init_thread_footer.LIBCMT ref: 003B7BFB
                                                            • Part of subcall function 003501F8: EnterCriticalSection.KERNEL32(0040070C,?,?,00348747,00402514), ref: 00350202
                                                            • Part of subcall function 003501F8: LeaveCriticalSection.KERNEL32(0040070C,?,00348747,00402514), ref: 00350235
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                          • String ID: +T8$5$G$Variable must be of type 'Object'.
                                                          • API String ID: 535116098-1932661733
                                                          • Opcode ID: f46797366da1d49476f1ad5721292d59f67586234648b4a7097311362eca141a
                                                          • Instruction ID: 8e37fc7e0bd031957180e0d6a515cccca447c56945e448e6fbb56f30c2e63b85
                                                          • Opcode Fuzzy Hash: f46797366da1d49476f1ad5721292d59f67586234648b4a7097311362eca141a
                                                          • Instruction Fuzzy Hash: FE919B74A04208AFCB16EF54C891DEDBBB5EF85348F10805DF906AF692DB71AE41CB50
                                                          APIs
                                                          • ShellExecuteExW.SHELL32(0000003C), ref: 003BAEA3
                                                            • Part of subcall function 00337620: _wcslen.LIBCMT ref: 00337625
                                                          • GetProcessId.KERNEL32(00000000), ref: 003BAF38
                                                          • CloseHandle.KERNEL32(00000000), ref: 003BAF67
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseExecuteHandleProcessShell_wcslen
                                                          • String ID: <$@
                                                          • API String ID: 146682121-1426351568
                                                          • Opcode ID: 905d53f4357f3ddffecbed60f1b97be6d9c7ebf829273fbc1de1bf4fed0c7393
                                                          • Instruction ID: e3abea7474b37f7092d13c6a801548e2f7d3db620e35da19ac93007b685e908c
                                                          • Opcode Fuzzy Hash: 905d53f4357f3ddffecbed60f1b97be6d9c7ebf829273fbc1de1bf4fed0c7393
                                                          • Instruction Fuzzy Hash: 0D717775A00A18DFCB16DF54C484A9EBBF0BF08314F058499E856AF7A2CB74ED41CB91
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 003C62E2
                                                          • ScreenToClient.USER32(?,?), ref: 003C6315
                                                          • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 003C6382
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientMoveRectScreen
                                                          • String ID: @q
                                                          • API String ID: 3880355969-962691702
                                                          • Opcode ID: a6c4caa13c92188a6ac2ad0df4a0ee7f031a9f50a77a94f12447b201b0524d0a
                                                          • Instruction ID: 4f229f8bb5c3152e83d1f8d0a09c0df0e7c9880e91dd02abd3c4c9fe36d8b9bf
                                                          • Opcode Fuzzy Hash: a6c4caa13c92188a6ac2ad0df4a0ee7f031a9f50a77a94f12447b201b0524d0a
                                                          • Instruction Fuzzy Hash: EA512874A00249AFCB12DF68D981EAE7BB5EB85360F11816DF815DB2A1D730ED81CB50
                                                          APIs
                                                          • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00397206
                                                          • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0039723C
                                                          • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0039724D
                                                          • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 003972CF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$AddressCreateInstanceProc
                                                          • String ID: DllGetClassObject
                                                          • API String ID: 753597075-1075368562
                                                          • Opcode ID: 2c27b52494a5ed717e6b523666422b7824c136e56eda254bbad4d92d756a7fde
                                                          • Instruction ID: aef1fbe1eb146554f81be2a67f22ce51ac65557b8bff15777f6c4f31df5ed0a4
                                                          • Opcode Fuzzy Hash: 2c27b52494a5ed717e6b523666422b7824c136e56eda254bbad4d92d756a7fde
                                                          • Instruction Fuzzy Hash: 31418E72624204EFDF16CF54C884A9A7BA9EF44710F2584A9FD09DF28AD7B1DD40CBA0
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(00000004,?,00000000,?), ref: 0039C306
                                                          • DeleteMenu.USER32(?,00000007,00000000), ref: 0039C34C
                                                          • DeleteMenu.USER32(?,?,00000000,?,00000000,00000000,00401990,hq), ref: 0039C395
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Delete$InfoItem
                                                          • String ID: 0$hq
                                                          • API String ID: 135850232-2814389410
                                                          • Opcode ID: b7d854bce3bead105c4f2876946c0bf6eeff0ed16475dd4e220befff1665423e
                                                          • Instruction ID: b4012bb34a01f058eeb0d8979df098bbfc3d38313656e41eb7db57a7f4f4cdd0
                                                          • Opcode Fuzzy Hash: b7d854bce3bead105c4f2876946c0bf6eeff0ed16475dd4e220befff1665423e
                                                          • Instruction Fuzzy Hash: 8041B0752143019FDB22DF29D884F5ABBE8AF85320F019A1DF8A59B2D1D774E904CB52
                                                          APIs
                                                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 003C5352
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 003C5375
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 003C5382
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 003C53A8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$InvalidateMessageRectSend
                                                          • String ID: @q
                                                          • API String ID: 3340791633-962691702
                                                          • Opcode ID: 1380f4b4a5e77297b758dc1273bbfa58cf2a940b40f424be2b8ce9778ad232e3
                                                          • Instruction ID: 74c20a7524c8d86ffe04e95534d223d750b770a8b269ad625a114295bc856d78
                                                          • Opcode Fuzzy Hash: 1380f4b4a5e77297b758dc1273bbfa58cf2a940b40f424be2b8ce9778ad232e3
                                                          • Instruction Fuzzy Hash: 7931B038B55A88AFEB339E14CC45FE87769AB04390F59410AFA11D62E1C7B0BDC09B41
                                                          APIs
                                                          • ClientToScreen.USER32(?,?), ref: 003C769A
                                                          • GetWindowRect.USER32(?,?), ref: 003C7710
                                                          • PtInRect.USER32(?,?,003C8B89), ref: 003C7720
                                                          • MessageBeep.USER32(00000000), ref: 003C778C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Rect$BeepClientMessageScreenWindow
                                                          • String ID: @q
                                                          • API String ID: 1352109105-962691702
                                                          • Opcode ID: 1ebf09134b8824c71b61af82156d8b4c9a27177ecb459c872a80b97b1b0bf641
                                                          • Instruction ID: 8853ca371687360ea9dc42a61dea68c52461c0ef7ca459e99e6d3437f1286628
                                                          • Opcode Fuzzy Hash: 1ebf09134b8824c71b61af82156d8b4c9a27177ecb459c872a80b97b1b0bf641
                                                          • Instruction Fuzzy Hash: A2417875A092189FCB12DF68C994FA9B7F5BB49354F1A80ACE814EB261C730ED41CF90
                                                          APIs
                                                            • Part of subcall function 00339CB3: _wcslen.LIBCMT ref: 00339CBD
                                                            • Part of subcall function 00393CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00393CCA
                                                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00391E66
                                                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00391E79
                                                          • SendMessageW.USER32(?,00000189,?,00000000), ref: 00391EA9
                                                            • Part of subcall function 00336B57: _wcslen.LIBCMT ref: 00336B6A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$_wcslen$ClassName
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 2081771294-1403004172
                                                          • Opcode ID: 949e50aab62924eeb42ba779cefc20125609fa5402ae0679d160040b013141dc
                                                          • Instruction ID: 2cb346bf5262356da2cf58a9bafc8c6d97d83e8aedafa851a1539eec87f4b42a
                                                          • Opcode Fuzzy Hash: 949e50aab62924eeb42ba779cefc20125609fa5402ae0679d160040b013141dc
                                                          • Instruction Fuzzy Hash: 1121F176A00108BEDF16ABA4DC8ADFFB7B8DF45350F144119F925AB1E1DB74590A8A20
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 003C4705
                                                          • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 003C4713
                                                          • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 003C471A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$DestroyWindow
                                                          • String ID: @q$msctls_updown32
                                                          • API String ID: 4014797782-2326781945
                                                          • Opcode ID: 4950e1c918ff542e62966665ed615328c31da3d3713dd059de3cc1d48875d5fc
                                                          • Instruction ID: cfc68169a0acc532e8b678aa393162e86cd34f2a90ae0598d3fb2a8b6029c534
                                                          • Opcode Fuzzy Hash: 4950e1c918ff542e62966665ed615328c31da3d3713dd059de3cc1d48875d5fc
                                                          • Instruction Fuzzy Hash: E0213CB5600209AFDB12DF64DCD1EA737ADEB5A3A4B050059FA14DB361CB71EC61CB60
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 003C2F8D
                                                          • LoadLibraryW.KERNEL32(?), ref: 003C2F94
                                                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 003C2FA9
                                                          • DestroyWindow.USER32(?), ref: 003C2FB1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$DestroyLibraryLoadWindow
                                                          • String ID: SysAnimate32
                                                          • API String ID: 3529120543-1011021900
                                                          • Opcode ID: e74fb0f2eea6cd0bd91886870837b1d529cbe2079a6027dc37d0822608d5402e
                                                          • Instruction ID: 79338a4c1d4d0a03ca501d166e3cafc585f22e994e2b3670428ced915eb555c7
                                                          • Opcode Fuzzy Hash: e74fb0f2eea6cd0bd91886870837b1d529cbe2079a6027dc37d0822608d5402e
                                                          • Instruction Fuzzy Hash: 1E21AC72204209ABEB228F64DC80FBB77BDEB59364F12562CFA50D61A0DB71EC519760
                                                          APIs
                                                            • Part of subcall function 00349BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00349BB2
                                                          • GetCursorPos.USER32(?), ref: 003C9001
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00387711,?,?,?,?,?), ref: 003C9016
                                                          • GetCursorPos.USER32(?), ref: 003C905E
                                                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00387711,?,?,?), ref: 003C9094
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                          • String ID: @q
                                                          • API String ID: 2864067406-962691702
                                                          • Opcode ID: 7d0cd54aade6ab70e29e88b7663b265cc0d3c2dc00d5de8daee5f15982484d8a
                                                          • Instruction ID: e47351993fde7330da3ce92135e4dbd8e26b6a6fc3ae653566620ce078e35e70
                                                          • Opcode Fuzzy Hash: 7d0cd54aade6ab70e29e88b7663b265cc0d3c2dc00d5de8daee5f15982484d8a
                                                          • Instruction Fuzzy Hash: 1A218336600028EFDB168F95CC58FFA7BB9EF49350F1540AAF5059B261C731AD50DB60
                                                          APIs
                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00354D1E,003628E9,?,00354CBE,003628E9,003F88B8,0000000C,00354E15,003628E9,00000002), ref: 00354D8D
                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00354DA0
                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,00354D1E,003628E9,?,00354CBE,003628E9,003F88B8,0000000C,00354E15,003628E9,00000002,00000000), ref: 00354DC3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                          • String ID: CorExitProcess$mscoree.dll
                                                          • API String ID: 4061214504-1276376045
                                                          • Opcode ID: 18badcfbdbb59c4b08fb18e3ea1d0ed0597a0c58453d05eba831195b68eeda5a
                                                          • Instruction ID: a0c4dd18dcbdfefaca2e9603b6fbe6e90d87aa5378a33bdc364f7aeb5aa1416c
                                                          • Opcode Fuzzy Hash: 18badcfbdbb59c4b08fb18e3ea1d0ed0597a0c58453d05eba831195b68eeda5a
                                                          • Instruction Fuzzy Hash: 98F08C35A50208ABDB169B90DC49FEEBBF8EF04712F0400A4EC09A6260CB30A984CB90
                                                          APIs
                                                          • LoadLibraryA.KERNEL32 ref: 0038D3AD
                                                          • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0038D3BF
                                                          • FreeLibrary.KERNEL32(00000000), ref: 0038D3E5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$AddressFreeLoadProc
                                                          • String ID: GetSystemWow64DirectoryW$X64
                                                          • API String ID: 145871493-2590602151
                                                          • Opcode ID: d6acae019a3340cd75dd6769bd02aab0e1291a39984b301b319b2415d4d2f961
                                                          • Instruction ID: 1e14141e35c353131c87f7ee00333b0ffb3ef425a40f1e48751b672d4583e496
                                                          • Opcode Fuzzy Hash: d6acae019a3340cd75dd6769bd02aab0e1291a39984b301b319b2415d4d2f961
                                                          • Instruction Fuzzy Hash: 01F05538845B20ABD73337108C08E69B31CAF00701F5A95D9F80BE20C4CB70DD408782
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00334EDD,?,00401418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00334E9C
                                                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00334EAE
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00334EDD,?,00401418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00334EC0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$AddressFreeLoadProc
                                                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                          • API String ID: 145871493-3689287502
                                                          • Opcode ID: 9530a494dd06db302388d4db297f4f2c9dfa072993239416aefb4e1241afeb3b
                                                          • Instruction ID: f1e1ab08cea6cf18bc1318c59ea0a06f77c1559a543eb241ccc7b4da194c8678
                                                          • Opcode Fuzzy Hash: 9530a494dd06db302388d4db297f4f2c9dfa072993239416aefb4e1241afeb3b
                                                          • Instruction Fuzzy Hash: 8DE0CD35E125225BD23317266C18F6FA55CAFC1F62F0A0115FD09D2210DB60ED0242A0
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00373CDE,?,00401418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00334E62
                                                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00334E74
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00373CDE,?,00401418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00334E87
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$AddressFreeLoadProc
                                                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                          • API String ID: 145871493-1355242751
                                                          • Opcode ID: a80fbf3c80e5c8c445e28e10fd4edfd8fc83d4298ee56ce2030e8d42db0f48a6
                                                          • Instruction ID: bdcf479038da21fac66f2d4b2ac29d7d3b3e368edfec3395e219c6b12f0ad368
                                                          • Opcode Fuzzy Hash: a80fbf3c80e5c8c445e28e10fd4edfd8fc83d4298ee56ce2030e8d42db0f48a6
                                                          • Instruction Fuzzy Hash: 87D05B369126315756331B66BC1CEDF6A1CAF85F52B0A1515F90DE2114CF60ED02C7D0
                                                          APIs
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 003A2C05
                                                          • DeleteFileW.KERNEL32(?), ref: 003A2C87
                                                          • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 003A2C9D
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 003A2CAE
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 003A2CC0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: File$Delete$Copy
                                                          • String ID:
                                                          • API String ID: 3226157194-0
                                                          • Opcode ID: 7607deb1e80b9479e4c7bb338a1a20765bf1c97349a46599ad448f55c823fbe1
                                                          • Instruction ID: b1919587a9f808bc2fbe95d643fb35e7b4fba6b6a37b1427cd801eec91444d05
                                                          • Opcode Fuzzy Hash: 7607deb1e80b9479e4c7bb338a1a20765bf1c97349a46599ad448f55c823fbe1
                                                          • Instruction Fuzzy Hash: 09B15E72D00119ABDF26DBA8CC85EDFB7BDEF09350F1044A6F909EA151EB319A448F61
                                                          APIs
                                                          • GetCurrentProcessId.KERNEL32 ref: 003BA427
                                                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 003BA435
                                                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 003BA468
                                                          • CloseHandle.KERNEL32(?), ref: 003BA63D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseCountersCurrentHandleOpen
                                                          • String ID:
                                                          • API String ID: 3488606520-0
                                                          • Opcode ID: d3a51343d204be318c81b2149ce56ef4a877507468b6e32a8a1d0f33f2a97d00
                                                          • Instruction ID: 958960a49654da01ba0cf19cd4ffe243457c0b4a181f2a23d8ccf5cf024afa7a
                                                          • Opcode Fuzzy Hash: d3a51343d204be318c81b2149ce56ef4a877507468b6e32a8a1d0f33f2a97d00
                                                          • Instruction Fuzzy Hash: 53A1B175604700AFD721DF24C886F2AB7E5AF84714F14881DF69A9F792DB70EC418B92
                                                          APIs
                                                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,003D3700), ref: 0036BB91
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,0040121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0036BC09
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00401270,000000FF,?,0000003F,00000000,?), ref: 0036BC36
                                                          • _free.LIBCMT ref: 0036BB7F
                                                            • Part of subcall function 003629C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0036D7D1,00000000,00000000,00000000,00000000,?,0036D7F8,00000000,00000007,00000000,?,0036DBF5,00000000), ref: 003629DE
                                                            • Part of subcall function 003629C8: GetLastError.KERNEL32(00000000,?,0036D7D1,00000000,00000000,00000000,00000000,?,0036D7F8,00000000,00000007,00000000,?,0036DBF5,00000000,00000000), ref: 003629F0
                                                          • _free.LIBCMT ref: 0036BD4B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                          • String ID:
                                                          • API String ID: 1286116820-0
                                                          • Opcode ID: d63d2feb1da31bd470bae590e8b424b54cd276fa8d53352d583df0b25c74f9fd
                                                          • Instruction ID: 3c1fa9cb9c37e2ad0fc86afb405064e7a7cf991b02963623b79964e2eb46c018
                                                          • Opcode Fuzzy Hash: d63d2feb1da31bd470bae590e8b424b54cd276fa8d53352d583df0b25c74f9fd
                                                          • Instruction Fuzzy Hash: 15510A719002099FC712DF659D8196EF7BCEF41350F11826AE554EB2A9EB309E818F54
                                                          APIs
                                                            • Part of subcall function 0039DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0039CF22,?), ref: 0039DDFD
                                                            • Part of subcall function 0039DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0039CF22,?), ref: 0039DE16
                                                            • Part of subcall function 0039E199: GetFileAttributesW.KERNEL32(?,0039CF95), ref: 0039E19A
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 0039E473
                                                          • MoveFileW.KERNEL32(?,?), ref: 0039E4AC
                                                          • _wcslen.LIBCMT ref: 0039E5EB
                                                          • _wcslen.LIBCMT ref: 0039E603
                                                          • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 0039E650
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                          • String ID:
                                                          • API String ID: 3183298772-0
                                                          • Opcode ID: 9bd0c7a7012ceca85a29947a048989919245c98de6f62dea7f4562a40b2884bb
                                                          • Instruction ID: 9d367ade4dc69f27ab2a31053f0fda3f56ce9cde9a2addb7b77e17940341b2ce
                                                          • Opcode Fuzzy Hash: 9bd0c7a7012ceca85a29947a048989919245c98de6f62dea7f4562a40b2884bb
                                                          • Instruction Fuzzy Hash: 525141B24083459BCB26DB94D881EDFB3ECAF85340F00491EF589D7191EF74A688C766
                                                          APIs
                                                            • Part of subcall function 00339CB3: _wcslen.LIBCMT ref: 00339CBD
                                                            • Part of subcall function 003BC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,003BB6AE,?,?), ref: 003BC9B5
                                                            • Part of subcall function 003BC998: _wcslen.LIBCMT ref: 003BC9F1
                                                            • Part of subcall function 003BC998: _wcslen.LIBCMT ref: 003BCA68
                                                            • Part of subcall function 003BC998: _wcslen.LIBCMT ref: 003BCA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003BBAA5
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 003BBB00
                                                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 003BBB63
                                                          • RegCloseKey.ADVAPI32(?,?), ref: 003BBBA6
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 003BBBB3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                          • String ID:
                                                          • API String ID: 826366716-0
                                                          • Opcode ID: 02e1527146212cedc308f5c71103d0455dff48c72067d180d041f49c20bf889a
                                                          • Instruction ID: 639a6c44f798f4a7b9ba16b7f86c721847dc988a41d0f04f78a9cd09de1b61a7
                                                          • Opcode Fuzzy Hash: 02e1527146212cedc308f5c71103d0455dff48c72067d180d041f49c20bf889a
                                                          • Instruction Fuzzy Hash: 8F61AD31608201EFD316DF14C890E6ABBE9FF84308F14859DF5998B6A2CB71ED45CB92
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00398BCD
                                                          • VariantClear.OLEAUT32 ref: 00398C3E
                                                          • VariantClear.OLEAUT32 ref: 00398C9D
                                                          • VariantClear.OLEAUT32(?), ref: 00398D10
                                                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00398D3B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$Clear$ChangeInitType
                                                          • String ID:
                                                          • API String ID: 4136290138-0
                                                          • Opcode ID: e3f905b0edbd4ad283616ab84f4229394e750e9ba2b3628608b3598fbb298a4d
                                                          • Instruction ID: 3c793f7b76a88bbc1dcc37bfbf5bc16f507c36b18f0a364cd25c84b83973ea36
                                                          • Opcode Fuzzy Hash: e3f905b0edbd4ad283616ab84f4229394e750e9ba2b3628608b3598fbb298a4d
                                                          • Instruction Fuzzy Hash: 5D5145B5A00619EFCB15CF68C894AAAB7F8FF89314B158559E909DB350E730E911CF90
                                                          APIs
                                                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 003A8BAE
                                                          • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 003A8BDA
                                                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 003A8C32
                                                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 003A8C57
                                                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 003A8C5F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfile$SectionWrite$String
                                                          • String ID:
                                                          • API String ID: 2832842796-0
                                                          • Opcode ID: 38532ba678170ccace6ad9bb491981f6e32bcdd196133e2cb66eb800c117faf6
                                                          • Instruction ID: 06ddc51ca63aaa7d1a244079a263ef3db971b1cf23f2b551915469ba50e4e175
                                                          • Opcode Fuzzy Hash: 38532ba678170ccace6ad9bb491981f6e32bcdd196133e2cb66eb800c117faf6
                                                          • Instruction Fuzzy Hash: 46513975A00218AFDB16DF65C880A69BBF5FF49314F088458E849AF362CB31ED51CF90
                                                          APIs
                                                          • LoadLibraryW.KERNEL32(?,00000000,?), ref: 003B8F40
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 003B8FD0
                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 003B8FEC
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 003B9032
                                                          • FreeLibrary.KERNEL32(00000000), ref: 003B9052
                                                            • Part of subcall function 0034F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,003A1043,?,7556E610), ref: 0034F6E6
                                                            • Part of subcall function 0034F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,0038FA64,00000000,00000000,?,?,003A1043,?,7556E610,?,0038FA64), ref: 0034F70D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                          • String ID:
                                                          • API String ID: 666041331-0
                                                          • Opcode ID: b95c5d202aab83a0615b58e6c046f85666f09aca4b7d57fb984e86d8fe8cff8b
                                                          • Instruction ID: 8d24ec9d328099b3fb8ceb2b4a67339d96734158abd58912dd914a3146f0ae6f
                                                          • Opcode Fuzzy Hash: b95c5d202aab83a0615b58e6c046f85666f09aca4b7d57fb984e86d8fe8cff8b
                                                          • Instruction Fuzzy Hash: 17513935604205DFCB12EF54C4849ADBBB5FF49318F098099EA0A9F762DB31ED86CB90
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: 3271823b89ac790d633a7020833bba8ff7b2b24a4ef7a6a358bb73500c9ac106
                                                          • Instruction ID: 0208b904a2b4c30c98fd4c8f48059fc68711eeb4312fa82ef1f96fbfa1c50f18
                                                          • Opcode Fuzzy Hash: 3271823b89ac790d633a7020833bba8ff7b2b24a4ef7a6a358bb73500c9ac106
                                                          • Instruction Fuzzy Hash: 3A41D032A006049FCB26DF78C980A6EB3E5EF89314F168568E915EF359DA31AD01CB80
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 00349141
                                                          • ScreenToClient.USER32(00000000,?), ref: 0034915E
                                                          • GetAsyncKeyState.USER32(00000001), ref: 00349183
                                                          • GetAsyncKeyState.USER32(00000002), ref: 0034919D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: AsyncState$ClientCursorScreen
                                                          • String ID:
                                                          • API String ID: 4210589936-0
                                                          • Opcode ID: 3806eac0f60b2f4424d89071eacc6eb72ee1e1358a216937e5f6a4ae3a001ee4
                                                          • Instruction ID: 135b0d91a3e15726c470ee0bfa678a4195f69533ae4d09773cd8ebce469a58de
                                                          • Opcode Fuzzy Hash: 3806eac0f60b2f4424d89071eacc6eb72ee1e1358a216937e5f6a4ae3a001ee4
                                                          • Instruction Fuzzy Hash: F341527190861AFBDF16AF64C848BEEB7B5FF05320F25825AE429A72D0C730AD54CB51
                                                          APIs
                                                          • GetInputState.USER32 ref: 003A38CB
                                                          • TranslateAcceleratorW.USER32(?,00000000,?), ref: 003A3922
                                                          • TranslateMessage.USER32(?), ref: 003A394B
                                                          • DispatchMessageW.USER32(?), ref: 003A3955
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 003A3966
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                          • String ID:
                                                          • API String ID: 2256411358-0
                                                          • Opcode ID: 391786c9a6143e68382f5e94e4b6c3959ab7f765cc4dfcf1a3691d4a1d23e0a4
                                                          • Instruction ID: 666a6293832412970d8499ed08e0462e9a94d6a868f9a31a2c7e325f00925737
                                                          • Opcode Fuzzy Hash: 391786c9a6143e68382f5e94e4b6c3959ab7f765cc4dfcf1a3691d4a1d23e0a4
                                                          • Instruction Fuzzy Hash: D831A0719083429FEB27CB759948FB737ACEB07304F05456DF466D25A0E3B4AA89CB11
                                                          APIs
                                                          • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,003AC21E,00000000), ref: 003ACF38
                                                          • InternetReadFile.WININET(?,00000000,?,?), ref: 003ACF6F
                                                          • GetLastError.KERNEL32(?,00000000,?,?,?,003AC21E,00000000), ref: 003ACFB4
                                                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,003AC21E,00000000), ref: 003ACFC8
                                                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,003AC21E,00000000), ref: 003ACFF2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                          • String ID:
                                                          • API String ID: 3191363074-0
                                                          • Opcode ID: beb633f399a038210fd2edfa92f9b7b6ef2b5340b7edad8b4cffe74557c74701
                                                          • Instruction ID: 5e23b4366e42983db05bd598aa1af3bc4662662d590d63b62fa4df687bc0e87d
                                                          • Opcode Fuzzy Hash: beb633f399a038210fd2edfa92f9b7b6ef2b5340b7edad8b4cffe74557c74701
                                                          • Instruction Fuzzy Hash: DB318E71914205EFDB22DFA5C884EABBBFDEB16310F10542EF50AD6501DB30AE41DB60
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 00391915
                                                          • PostMessageW.USER32(00000001,00000201,00000001), ref: 003919C1
                                                          • Sleep.KERNEL32(00000000,?,?,?), ref: 003919C9
                                                          • PostMessageW.USER32(00000001,00000202,00000000), ref: 003919DA
                                                          • Sleep.KERNEL32(00000000,?,?,?,?), ref: 003919E2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleep$RectWindow
                                                          • String ID:
                                                          • API String ID: 3382505437-0
                                                          • Opcode ID: 0fe532a42445cca3cabe4278543c81d1830534ea5863eb2f52b3f38bb36059f7
                                                          • Instruction ID: 7e6f2beacb503c60fdb3e1b23c8f24ea926060246692ca022bec740be3998c4f
                                                          • Opcode Fuzzy Hash: 0fe532a42445cca3cabe4278543c81d1830534ea5863eb2f52b3f38bb36059f7
                                                          • Instruction Fuzzy Hash: B131AF71A0021AEFDF01CFA8C999ADE7BB5EB04315F114225F925E72D1C770A954CB90
                                                          APIs
                                                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 003C5745
                                                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 003C579D
                                                          • _wcslen.LIBCMT ref: 003C57AF
                                                          • _wcslen.LIBCMT ref: 003C57BA
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 003C5816
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$_wcslen
                                                          • String ID:
                                                          • API String ID: 763830540-0
                                                          • Opcode ID: 88c7723a35b43749bff5f3c593315dcd1ddd9541207202f2ab5b65692bfaa595
                                                          • Instruction ID: 59d6bf9400f5be7a87caa2ca9d4c68463209ff108cd01660f3178b66abdf4558
                                                          • Opcode Fuzzy Hash: 88c7723a35b43749bff5f3c593315dcd1ddd9541207202f2ab5b65692bfaa595
                                                          • Instruction Fuzzy Hash: A52185719046189ADB229F61CC85FEEB7BCFF04725F10825AE919EA190D770ADC5CF50
                                                          APIs
                                                          • IsWindow.USER32(00000000), ref: 003B0951
                                                          • GetForegroundWindow.USER32 ref: 003B0968
                                                          • GetDC.USER32(00000000), ref: 003B09A4
                                                          • GetPixel.GDI32(00000000,?,00000003), ref: 003B09B0
                                                          • ReleaseDC.USER32(00000000,00000003), ref: 003B09E8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ForegroundPixelRelease
                                                          • String ID:
                                                          • API String ID: 4156661090-0
                                                          • Opcode ID: e05685d7c41ffe0a919fe64d40fd38850fc9764f7f6a694ef5a8f3b86a094904
                                                          • Instruction ID: 8b611ba720cb8ce722ed48e2b1b1f06dcee4bb072c2a6a9111b4aa8a433dd408
                                                          • Opcode Fuzzy Hash: e05685d7c41ffe0a919fe64d40fd38850fc9764f7f6a694ef5a8f3b86a094904
                                                          • Instruction Fuzzy Hash: 99218E35600204AFD705EF65C988EAFBBE9EF49740F048068E94AEB762CB30AC04CB50
                                                          APIs
                                                          • GetEnvironmentStringsW.KERNEL32 ref: 0036CDC6
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0036CDE9
                                                            • Part of subcall function 00363820: RtlAllocateHeap.NTDLL(00000000,?,00401444,?,0034FDF5,?,?,0033A976,00000010,00401440,003313FC,?,003313C6,?,00331129), ref: 00363852
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0036CE0F
                                                          • _free.LIBCMT ref: 0036CE22
                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0036CE31
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                          • String ID:
                                                          • API String ID: 336800556-0
                                                          • Opcode ID: 71249b9dddd358495c433568f737b94ed666047f778feb4296c2c9b76168eb51
                                                          • Instruction ID: aadf0bf7788fe4f3815e882ca13eadcaa321cdba6d6de9d4b336b48f673c3b39
                                                          • Opcode Fuzzy Hash: 71249b9dddd358495c433568f737b94ed666047f778feb4296c2c9b76168eb51
                                                          • Instruction Fuzzy Hash: A501D872A212157F632316B66C48C7B7D7DDEC6BA23169129F905C7104DA668D0182B4
                                                          APIs
                                                          • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00349693
                                                          • SelectObject.GDI32(?,00000000), ref: 003496A2
                                                          • BeginPath.GDI32(?), ref: 003496B9
                                                          • SelectObject.GDI32(?,00000000), ref: 003496E2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ObjectSelect$BeginCreatePath
                                                          • String ID:
                                                          • API String ID: 3225163088-0
                                                          • Opcode ID: a76eaa0d52031b4b60d46572c68463c7aafad5ee23c6dbcda195be58e5da2472
                                                          • Instruction ID: b51bd0366801e82ba304ff2594021399c26f55aa4e32aff79375f3b29b0571f7
                                                          • Opcode Fuzzy Hash: a76eaa0d52031b4b60d46572c68463c7aafad5ee23c6dbcda195be58e5da2472
                                                          • Instruction Fuzzy Hash: 742187B0812305EFDB129F65ED18BAA3BF9BB50365F160227F414BA1B0D374A851CF98
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: 1f8e02f0894decf80c229260fbd550aa6776128fb13327c8bf217085b2f98a0c
                                                          • Instruction ID: 7eda63687a5af1463584d41d524440321438e40f1007895826f09450900bc4c2
                                                          • Opcode Fuzzy Hash: 1f8e02f0894decf80c229260fbd550aa6776128fb13327c8bf217085b2f98a0c
                                                          • Instruction Fuzzy Hash: 2A01F1A6341A09BFEA0B6A50AD92FFB736D9B303A5F004024FD049E641F730EF5483A0
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,?,0035F2DE,00363863,00401444,?,0034FDF5,?,?,0033A976,00000010,00401440,003313FC,?,003313C6), ref: 00362DFD
                                                          • _free.LIBCMT ref: 00362E32
                                                          • _free.LIBCMT ref: 00362E59
                                                          • SetLastError.KERNEL32(00000000,00331129), ref: 00362E66
                                                          • SetLastError.KERNEL32(00000000,00331129), ref: 00362E6F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_free
                                                          • String ID:
                                                          • API String ID: 3170660625-0
                                                          • Opcode ID: 64ba284c79399a1fb61112d9f48d714a04da7ab973cf73cac78882551c23f36b
                                                          • Instruction ID: 0959f250a0796f3d74ac0564189e1748b99fbdb479aa166c45a9ee2857da9924
                                                          • Opcode Fuzzy Hash: 64ba284c79399a1fb61112d9f48d714a04da7ab973cf73cac78882551c23f36b
                                                          • Instruction Fuzzy Hash: 1401F436645E0067C61327346D49D2B265DABD23A1F27D438F425E62DAEB368C118220
                                                          APIs
                                                          • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0038FF41,80070057,?,?,?,0039035E), ref: 0039002B
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0038FF41,80070057,?,?), ref: 00390046
                                                          • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0038FF41,80070057,?,?), ref: 00390054
                                                          • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0038FF41,80070057,?), ref: 00390064
                                                          • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0038FF41,80070057,?,?), ref: 00390070
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: From$Prog$FreeStringTasklstrcmpi
                                                          • String ID:
                                                          • API String ID: 3897988419-0
                                                          • Opcode ID: 922197dea8e4ec4164d39adc31493122c4c7017bd2b9b4a1351964d14a2e8bc9
                                                          • Instruction ID: d16f3209618d3e712bc5561f685a904693ce9b400f52a9d94cda65bfd5d2c2f0
                                                          • Opcode Fuzzy Hash: 922197dea8e4ec4164d39adc31493122c4c7017bd2b9b4a1351964d14a2e8bc9
                                                          • Instruction Fuzzy Hash: 53018B76610204BFDF169F68DC04FAE7AEDEB44792F145124F909D2210E775ED408BA0
                                                          APIs
                                                          • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00391114
                                                          • GetLastError.KERNEL32(?,00000000,00000000,?,?,00390B9B,?,?,?), ref: 00391120
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00390B9B,?,?,?), ref: 0039112F
                                                          • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00390B9B,?,?,?), ref: 00391136
                                                          • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0039114D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 842720411-0
                                                          • Opcode ID: 0b5000002571fb3ac735974c4e422bc7b8ceb60583ab2b2d9ea706238c0fd441
                                                          • Instruction ID: f4b8a583e418e8e6c59502374420b1b21ab5e941ab30a55de65b41717774a9d4
                                                          • Opcode Fuzzy Hash: 0b5000002571fb3ac735974c4e422bc7b8ceb60583ab2b2d9ea706238c0fd441
                                                          • Instruction Fuzzy Hash: 40011979210205BFDB124FA5DC4DE6A3B6EEF893A0F254419FA49D7360DB31EC019B60
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00390FCA
                                                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00390FD6
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00390FE5
                                                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00390FEC
                                                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00391002
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: 8c82d1089d589c5e1b7f3af3456c0f29adbd9d6387f07880c916af338edfe7d4
                                                          • Instruction ID: d15f2590ac83ac9ca55a116c9e073da48f73978d64144c7e32aa92c01500f869
                                                          • Opcode Fuzzy Hash: 8c82d1089d589c5e1b7f3af3456c0f29adbd9d6387f07880c916af338edfe7d4
                                                          • Instruction Fuzzy Hash: 6DF04939210312ABDB224FA5AC49F563BADFF89762F154414FA49D6251CA71EC40CB60
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0039102A
                                                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00391036
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00391045
                                                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0039104C
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00391062
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: 7e38ac65e4aaa94e32b4fa2620f5833328ab13785e8eaef0b0ae908c0312aeed
                                                          • Instruction ID: 5f4eb8d2b203193ee7c8d6312e85af05f6c3abc1ae045fb359b3f0e45eb9dc8b
                                                          • Opcode Fuzzy Hash: 7e38ac65e4aaa94e32b4fa2620f5833328ab13785e8eaef0b0ae908c0312aeed
                                                          • Instruction Fuzzy Hash: 30F06D39210312EBDB236FA5EC49F563BADFF897A1F150414FA49D7250CA71E8408B60
                                                          APIs
                                                          • CloseHandle.KERNEL32(?,?,?,?,003A017D,?,003A32FC,?,00000001,00372592,?), ref: 003A0324
                                                          • CloseHandle.KERNEL32(?,?,?,?,003A017D,?,003A32FC,?,00000001,00372592,?), ref: 003A0331
                                                          • CloseHandle.KERNEL32(?,?,?,?,003A017D,?,003A32FC,?,00000001,00372592,?), ref: 003A033E
                                                          • CloseHandle.KERNEL32(?,?,?,?,003A017D,?,003A32FC,?,00000001,00372592,?), ref: 003A034B
                                                          • CloseHandle.KERNEL32(?,?,?,?,003A017D,?,003A32FC,?,00000001,00372592,?), ref: 003A0358
                                                          • CloseHandle.KERNEL32(?,?,?,?,003A017D,?,003A32FC,?,00000001,00372592,?), ref: 003A0365
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle
                                                          • String ID:
                                                          • API String ID: 2962429428-0
                                                          • Opcode ID: b1c7b035b07d8f8bbaa776d36cfb266c41b7c55c9d21c97e0744dda150176431
                                                          • Instruction ID: ac43862df00c9d4a57ab0154d64256190a85d199bdbf366b6b0ca21c88759b85
                                                          • Opcode Fuzzy Hash: b1c7b035b07d8f8bbaa776d36cfb266c41b7c55c9d21c97e0744dda150176431
                                                          • Instruction Fuzzy Hash: 6F01EE7A800B018FCB36AF66D880802FBF9FF613053068A3FD19652970C3B1A948CF80
                                                          APIs
                                                          • _free.LIBCMT ref: 0036D752
                                                            • Part of subcall function 003629C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0036D7D1,00000000,00000000,00000000,00000000,?,0036D7F8,00000000,00000007,00000000,?,0036DBF5,00000000), ref: 003629DE
                                                            • Part of subcall function 003629C8: GetLastError.KERNEL32(00000000,?,0036D7D1,00000000,00000000,00000000,00000000,?,0036D7F8,00000000,00000007,00000000,?,0036DBF5,00000000,00000000), ref: 003629F0
                                                          • _free.LIBCMT ref: 0036D764
                                                          • _free.LIBCMT ref: 0036D776
                                                          • _free.LIBCMT ref: 0036D788
                                                          • _free.LIBCMT ref: 0036D79A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 02914dbda1f049de4e942836dbfd0ef79e9d63914e166abbaf347bc4457efa37
                                                          • Instruction ID: 25088ef0dd8a663047f7afbc113753d250dc0d5d45ecab6d462a12b974622e66
                                                          • Opcode Fuzzy Hash: 02914dbda1f049de4e942836dbfd0ef79e9d63914e166abbaf347bc4457efa37
                                                          • Instruction Fuzzy Hash: A1F01232B54608ABC627EF64FAC5C2777DDBB46750B969805F048DB509CB30FC90C665
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003E9), ref: 00395C58
                                                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 00395C6F
                                                          • MessageBeep.USER32(00000000), ref: 00395C87
                                                          • KillTimer.USER32(?,0000040A), ref: 00395CA3
                                                          • EndDialog.USER32(?,00000001), ref: 00395CBD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                          • String ID:
                                                          • API String ID: 3741023627-0
                                                          • Opcode ID: c4dde47f9b51479141d185cdc0f570bc63ee1e745658e2571c4715769442e21c
                                                          • Instruction ID: e529dc4da4e6ac98d382f05aa4487d3c9b649a93444ddc754f3d165d34a1f27f
                                                          • Opcode Fuzzy Hash: c4dde47f9b51479141d185cdc0f570bc63ee1e745658e2571c4715769442e21c
                                                          • Instruction Fuzzy Hash: AD016D30510B04ABEF235B10DE4EFA677BCBB00B05F041559E686A15E1DBF5A9948F90
                                                          APIs
                                                          • _free.LIBCMT ref: 003622BE
                                                            • Part of subcall function 003629C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0036D7D1,00000000,00000000,00000000,00000000,?,0036D7F8,00000000,00000007,00000000,?,0036DBF5,00000000), ref: 003629DE
                                                            • Part of subcall function 003629C8: GetLastError.KERNEL32(00000000,?,0036D7D1,00000000,00000000,00000000,00000000,?,0036D7F8,00000000,00000007,00000000,?,0036DBF5,00000000,00000000), ref: 003629F0
                                                          • _free.LIBCMT ref: 003622D0
                                                          • _free.LIBCMT ref: 003622E3
                                                          • _free.LIBCMT ref: 003622F4
                                                          • _free.LIBCMT ref: 00362305
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: e39be8d8c096aafcc24cab3b3a44b49a4f6556971ba00d3a94f8e13cf5b1d85a
                                                          • Instruction ID: c698bccd591acda3dcc594fb1fae344dfe7885d17adda8952b4225fd206e1edb
                                                          • Opcode Fuzzy Hash: e39be8d8c096aafcc24cab3b3a44b49a4f6556971ba00d3a94f8e13cf5b1d85a
                                                          • Instruction Fuzzy Hash: BEF0B4705509118BC717AF54BE0191A3BE4F71A790F02456EF000F6279C7750821FFE9
                                                          APIs
                                                          • EndPath.GDI32(?), ref: 003495D4
                                                          • StrokeAndFillPath.GDI32(?,?,003871F7,00000000,?,?,?), ref: 003495F0
                                                          • SelectObject.GDI32(?,00000000), ref: 00349603
                                                          • DeleteObject.GDI32 ref: 00349616
                                                          • StrokePath.GDI32(?), ref: 00349631
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectStroke$DeleteFillSelect
                                                          • String ID:
                                                          • API String ID: 2625713937-0
                                                          • Opcode ID: 5cdcc12b845f7277d1ffe16f25359259770ae86d52786bc99064f619a5adf66a
                                                          • Instruction ID: 85e92859b8d61c1a982ebb4056d3cc0f03d467180297ba19382af70a4e8a123a
                                                          • Opcode Fuzzy Hash: 5cdcc12b845f7277d1ffe16f25359259770ae86d52786bc99064f619a5adf66a
                                                          • Instruction Fuzzy Hash: 83F04F71005204EFDB135F65EE1CB653FA9BB01332F148225F469A90F0C734A991DF28
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: __freea$_free
                                                          • String ID: a/p$am/pm
                                                          • API String ID: 3432400110-3206640213
                                                          • Opcode ID: aff7bbb9f3c84de0c01fbc417cefb8f160a1ee63aae78cfa09716651790a1d71
                                                          • Instruction ID: ac3fc6f415ba77bcb67fda250c3576871ab36d4fc048c988165f79a1dedc038a
                                                          • Opcode Fuzzy Hash: aff7bbb9f3c84de0c01fbc417cefb8f160a1ee63aae78cfa09716651790a1d71
                                                          • Instruction Fuzzy Hash: 45D10339900206CACB2B9F68C855BFAB7B4FF06300F2DC159E9069BB58D3759D80CB91
                                                          APIs
                                                            • Part of subcall function 00350242: EnterCriticalSection.KERNEL32(0040070C,00401884,?,?,0034198B,00402518,?,?,?,003312F9,00000000), ref: 0035024D
                                                            • Part of subcall function 00350242: LeaveCriticalSection.KERNEL32(0040070C,?,0034198B,00402518,?,?,?,003312F9,00000000), ref: 0035028A
                                                            • Part of subcall function 003500A3: __onexit.LIBCMT ref: 003500A9
                                                          • __Init_thread_footer.LIBCMT ref: 003B6238
                                                            • Part of subcall function 003501F8: EnterCriticalSection.KERNEL32(0040070C,?,?,00348747,00402514), ref: 00350202
                                                            • Part of subcall function 003501F8: LeaveCriticalSection.KERNEL32(0040070C,?,00348747,00402514), ref: 00350235
                                                            • Part of subcall function 003A359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 003A35E4
                                                            • Part of subcall function 003A359C: LoadStringW.USER32(00402390,?,00000FFF,?), ref: 003A360A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                                                          • String ID: x#@$x#@$x#@
                                                          • API String ID: 1072379062-2468959183
                                                          • Opcode ID: f3b1cab461d69abafe8ce6983510c7ad9c8eb1106d11b8de7735c46bd6663194
                                                          • Instruction ID: df6b68be03d2e3ac3a4eee46a37992ed5722ace6b75ef8d3fab6bd6f5d8952ed
                                                          • Opcode Fuzzy Hash: f3b1cab461d69abafe8ce6983510c7ad9c8eb1106d11b8de7735c46bd6663194
                                                          • Instruction Fuzzy Hash: 90C19071A00105AFDB26DF58C891EFEB7B9EF49304F11802AFA05AB692D774ED44CB90
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: JO3
                                                          • API String ID: 0-1249764312
                                                          • Opcode ID: cc9c00e0e069c1c60bb2f46ce627244756a19732b255588aa89a3eda4b5a8649
                                                          • Instruction ID: f8b41dd9f43bdb2f1638203aa30f6a3a69c52a4e0b4efb2be4dea4c2ac513531
                                                          • Opcode Fuzzy Hash: cc9c00e0e069c1c60bb2f46ce627244756a19732b255588aa89a3eda4b5a8649
                                                          • Instruction Fuzzy Hash: EB51B075D0060AAFCF239FA8C945FAEBFB8EF05310F158069F805AB2A5D7719901DB61
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 00368B6E
                                                          • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 00368B7A
                                                          • __dosmaperr.LIBCMT ref: 00368B81
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharErrorLastMultiWide__dosmaperr
                                                          • String ID: .5
                                                          • API String ID: 2434981716-4279605997
                                                          • Opcode ID: 402a0d0688d3c158dc701cd06dad14a6e7f003127cde269439354ef8be1761f5
                                                          • Instruction ID: 5e70548a9316937d7a28264921870ad77b51c1bfeda0cebb3368f074f60b3547
                                                          • Opcode Fuzzy Hash: 402a0d0688d3c158dc701cd06dad14a6e7f003127cde269439354ef8be1761f5
                                                          • Instruction Fuzzy Hash: 7F41ACB0604045AFDB239F68C880AB93FAADF4D304F29C7A9F8849B546DE318C029794
                                                          APIs
                                                            • Part of subcall function 0039B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,003921D0,?,?,00000034,00000800,?,00000034), ref: 0039B42D
                                                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00392760
                                                            • Part of subcall function 0039B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,003921FF,?,?,00000800,?,00001073,00000000,?,?), ref: 0039B3F8
                                                            • Part of subcall function 0039B32A: GetWindowThreadProcessId.USER32(?,?), ref: 0039B355
                                                            • Part of subcall function 0039B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00392194,00000034,?,?,00001004,00000000,00000000), ref: 0039B365
                                                            • Part of subcall function 0039B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00392194,00000034,?,?,00001004,00000000,00000000), ref: 0039B37B
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 003927CD
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0039281A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                          • String ID: @
                                                          • API String ID: 4150878124-2766056989
                                                          • Opcode ID: a0442feec99f3f3b1edf5e39ea79fb409f6be6ac1a0ce769fd78c2a38367db28
                                                          • Instruction ID: 7aff7f628fe8d37d735bfad4391065f33ac8b6b1b30bc84e8cc53f73a63405f5
                                                          • Opcode Fuzzy Hash: a0442feec99f3f3b1edf5e39ea79fb409f6be6ac1a0ce769fd78c2a38367db28
                                                          • Instruction Fuzzy Hash: 1A411976900218BFDF11DBA4DD85EEEBBB8AF09700F104099FA55BB181DB706E45CBA1
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 00361769
                                                          • _free.LIBCMT ref: 00361834
                                                          • _free.LIBCMT ref: 0036183E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$FileModuleName
                                                          • String ID: C:\Users\user\Desktop\file.exe
                                                          • API String ID: 2506810119-1505163051
                                                          • Opcode ID: 159f272cd527022671e5e495871a60463cfd350944dad346f3c5ea2c8e839bdc
                                                          • Instruction ID: c317a8b2fc711ad3273c61253e9826ea5b29ea32b00640d5d325b23abcc850fd
                                                          • Opcode Fuzzy Hash: 159f272cd527022671e5e495871a60463cfd350944dad346f3c5ea2c8e839bdc
                                                          • Instruction Fuzzy Hash: 57316275A00218AFDB22DF99D885D9EBBFCEB85310F1981AAF804EB215D7705E40DB94
                                                          APIs
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,003CCC08,00000000,?,?,?,?), ref: 003C44AA
                                                          • GetWindowLongW.USER32 ref: 003C44C7
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 003C44D7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long
                                                          • String ID: SysTreeView32
                                                          • API String ID: 847901565-1698111956
                                                          • Opcode ID: 12c1191efdf9e1eee3a55adff5cc993c91925e73c5cfdcea5afa82250c9191e3
                                                          • Instruction ID: f6367b859199bf80929edfaf55b922dadda588c3dae33a05f67c332d0c13406f
                                                          • Opcode Fuzzy Hash: 12c1191efdf9e1eee3a55adff5cc993c91925e73c5cfdcea5afa82250c9191e3
                                                          • Instruction Fuzzy Hash: 4B319C31210605AFDB269E38DC45FEA7BA9EB09334F214319F979D21E0DB70EC509750
                                                          APIs
                                                          • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 003C461F
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 003C4634
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: '$@q
                                                          • API String ID: 3850602802-4094224935
                                                          • Opcode ID: b3fdd9dbdf9bd3fcc9df18c858fb1b2cae54f3371888b0c0e841733c03f015f1
                                                          • Instruction ID: dddf9b455e1026c7b5cf68a53eea927bd23222a3fff046d2d862bad0a600bf5f
                                                          • Opcode Fuzzy Hash: b3fdd9dbdf9bd3fcc9df18c858fb1b2cae54f3371888b0c0e841733c03f015f1
                                                          • Instruction Fuzzy Hash: 62311774A002099FDB15CF69C990FDABBB5FB49300F14406AE904EB351D770AD51CF90
                                                          APIs
                                                          • SysReAllocString.OLEAUT32(?,?), ref: 00396EED
                                                          • VariantCopyInd.OLEAUT32(?,?), ref: 00396F08
                                                          • VariantClear.OLEAUT32(?), ref: 00396F12
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$AllocClearCopyString
                                                          • String ID: *j9
                                                          • API String ID: 2173805711-176951553
                                                          • Opcode ID: 315bd389031dfa11f3dec907a98e481934f60fd4baac8bf3d61a33e8bd8c563f
                                                          • Instruction ID: b705bf688e54ef7a59d5206405f44eb6e8233ac1f4022b5bf0502d312d95d3a5
                                                          • Opcode Fuzzy Hash: 315bd389031dfa11f3dec907a98e481934f60fd4baac8bf3d61a33e8bd8c563f
                                                          • Instruction Fuzzy Hash: 7C319172605245DFCF0BAFA4E8929BE77B9EF85300F101499F9038F2A1C7349926DB90
                                                          APIs
                                                            • Part of subcall function 003B335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,003B3077,?,?), ref: 003B3378
                                                          • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 003B307A
                                                          • _wcslen.LIBCMT ref: 003B309B
                                                          • htons.WSOCK32(00000000,?,?,00000000), ref: 003B3106
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                          • String ID: 255.255.255.255
                                                          • API String ID: 946324512-2422070025
                                                          • Opcode ID: 6c2f71c9510aae49f6c3d38aaa2a82d38e2e133de297ee3aee945aadb3528b4c
                                                          • Instruction ID: b63b7ab4c1a28d079f260f7bd3f77169783fbd3594a0f15045c1865112225825
                                                          • Opcode Fuzzy Hash: 6c2f71c9510aae49f6c3d38aaa2a82d38e2e133de297ee3aee945aadb3528b4c
                                                          • Instruction Fuzzy Hash: F43104396042159FC712EF28C881EAA77E4EF1431CF258059EA168FB92CB32EE41C760
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                          • API String ID: 176396367-2734436370
                                                          • Opcode ID: 4e0a08d6cbe90e27ce986c94ba7a5a67199c0b5bc79717a4b5e8290ad50716cb
                                                          • Instruction ID: 852d1bb2330312b9ce79dd4fe663ebd2cdac7eede3c81f5f8a4493415198c018
                                                          • Opcode Fuzzy Hash: 4e0a08d6cbe90e27ce986c94ba7a5a67199c0b5bc79717a4b5e8290ad50716cb
                                                          • Instruction Fuzzy Hash: 3521F67210451166DB33AB2C9802FB7B3AC9F52320F15402FF9499B151EB51AD85C3D5
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 003C3840
                                                          • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 003C3850
                                                          • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 003C3876
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MoveWindow
                                                          • String ID: Listbox
                                                          • API String ID: 3315199576-2633736733
                                                          • Opcode ID: 47636599bfc923a6812072b30dcd3a8048a68eebf535438b6c4eea88ff466787
                                                          • Instruction ID: 8a3823e25108a6dbbafb5654e828ce25abd8c37d4597314c1dcd2c4729c8d8ee
                                                          • Opcode Fuzzy Hash: 47636599bfc923a6812072b30dcd3a8048a68eebf535438b6c4eea88ff466787
                                                          • Instruction Fuzzy Hash: 4C218E72610218BFEB229F54DC85FBB376EEF89750F118128F9049B190C671ED528BA0
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 003A4A08
                                                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 003A4A5C
                                                          • SetErrorMode.KERNEL32(00000000,?,?,003CCC08), ref: 003A4AD0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$InformationVolume
                                                          • String ID: %lu
                                                          • API String ID: 2507767853-685833217
                                                          • Opcode ID: 442bf6131a261830d78864a5cc21ae1deda71ffeae45cd81c68b8e6860ef647d
                                                          • Instruction ID: db089c2daffb25a214d453c92d172efc047f42ec9a907c047d542da516fe3a89
                                                          • Opcode Fuzzy Hash: 442bf6131a261830d78864a5cc21ae1deda71ffeae45cd81c68b8e6860ef647d
                                                          • Instruction Fuzzy Hash: 33317171A00108AFDB12DF54C885EAA7BF8EF49308F1480A9F909DF252D771ED45CB61
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 003C424F
                                                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 003C4264
                                                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 003C4271
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: msctls_trackbar32
                                                          • API String ID: 3850602802-1010561917
                                                          • Opcode ID: 8fd18ca818e6ac25a93e15cd30182bcf49390dadbded13a5bcf79cb878ce14f2
                                                          • Instruction ID: c213343a34dd9f69a11cfb9ef99fd57bf5c7732f0140e35560399df522dae9a6
                                                          • Opcode Fuzzy Hash: 8fd18ca818e6ac25a93e15cd30182bcf49390dadbded13a5bcf79cb878ce14f2
                                                          • Instruction Fuzzy Hash: 87110632240208BEEF225F28CC46FAB7BACEF95B54F020528FA55E60A0D271DC619B10
                                                          APIs
                                                            • Part of subcall function 00336B57: _wcslen.LIBCMT ref: 00336B6A
                                                            • Part of subcall function 00392DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00392DC5
                                                            • Part of subcall function 00392DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00392DD6
                                                            • Part of subcall function 00392DA7: GetCurrentThreadId.KERNEL32 ref: 00392DDD
                                                            • Part of subcall function 00392DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00392DE4
                                                          • GetFocus.USER32 ref: 00392F78
                                                            • Part of subcall function 00392DEE: GetParent.USER32(00000000), ref: 00392DF9
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00392FC3
                                                          • EnumChildWindows.USER32(?,0039303B), ref: 00392FEB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                          • String ID: %s%d
                                                          • API String ID: 1272988791-1110647743
                                                          • Opcode ID: 0f1749d1a5c5d3131b9833cd770872354c3de9b9966bf75907c0d63dbff41b99
                                                          • Instruction ID: 96b47279452b40b812e9ec48536101cbe77568ce69f1a9b7a005ebf95e6073ec
                                                          • Opcode Fuzzy Hash: 0f1749d1a5c5d3131b9833cd770872354c3de9b9966bf75907c0d63dbff41b99
                                                          • Instruction Fuzzy Hash: 9E11B4B16002056BDF167F748CDAEEE776AAF84304F048075FA19DF252DE3099458B60
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 003C58C1
                                                          • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 003C58EE
                                                          • DrawMenuBar.USER32(?), ref: 003C58FD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$InfoItem$Draw
                                                          • String ID: 0
                                                          • API String ID: 3227129158-4108050209
                                                          • Opcode ID: dfdd98ccd0c80dc540e08c1f35edf58296ccfa72cc12b5e2d508238f89265549
                                                          • Instruction ID: b9b48dc4dfb0c8c3492e903804067e42f98782618e34e2fe48aa2753977b34c0
                                                          • Opcode Fuzzy Hash: dfdd98ccd0c80dc540e08c1f35edf58296ccfa72cc12b5e2d508238f89265549
                                                          • Instruction Fuzzy Hash: 39011B32510218EFDB229F12DC44FAEBBB8FB45361F148099E849DA151DB30AAD4DF21
                                                          APIs
                                                          • GetForegroundWindow.USER32(?,004018B0,003CA364,000000FC,?,00000000,00000000,?,?,?,003876CF,?,?,?,?,?), ref: 003C7805
                                                          • GetFocus.USER32 ref: 003C780D
                                                            • Part of subcall function 00349BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00349BB2
                                                            • Part of subcall function 00349944: GetWindowLongW.USER32(?,000000EB), ref: 00349952
                                                          • SendMessageW.USER32(?,000000B0,000001BC,000001C0), ref: 003C787A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$FocusForegroundMessageSend
                                                          • String ID: @q
                                                          • API String ID: 3601265619-962691702
                                                          • Opcode ID: 7c933dd32914981348f2ee5f92928f24e1c8878d3b3d81ba1ab5bcaf1882c1f4
                                                          • Instruction ID: 66d311468909b611a432dfeecde02adf718e277575a29993cdc7cde0e6872262
                                                          • Opcode Fuzzy Hash: 7c933dd32914981348f2ee5f92928f24e1c8878d3b3d81ba1ab5bcaf1882c1f4
                                                          • Instruction Fuzzy Hash: EB017C326052008FC326DB28D959FA637EAEF8A320F19026DE515CB2B0CB316C02CF40
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6ae21e96537805ad2d5cdff8e1f1d013085addd93cbb6fa200dde110e8059658
                                                          • Instruction ID: 7952a59a34b0024eb6c6425408a3a8e67312819ddd5da768460febf375a634dc
                                                          • Opcode Fuzzy Hash: 6ae21e96537805ad2d5cdff8e1f1d013085addd93cbb6fa200dde110e8059658
                                                          • Instruction Fuzzy Hash: D2C17D75A00216EFDB19CFA8C894EAEB7B5FF48704F218598E905EB251D731ED41CB90
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInitInitializeUninitialize
                                                          • String ID:
                                                          • API String ID: 1998397398-0
                                                          • Opcode ID: b3aa8a021dab413752a1192a4729f63c72c2fbe13c0ac80dc81a12fc26249258
                                                          • Instruction ID: 39a6339a694947cbd09cc88ae2cd981bb1cb12736947a94883cdea2589b973c1
                                                          • Opcode Fuzzy Hash: b3aa8a021dab413752a1192a4729f63c72c2fbe13c0ac80dc81a12fc26249258
                                                          • Instruction Fuzzy Hash: EEA169756042109FDB16DF28C485A6AB7E4FF89714F048859FA8A9F762DB30EE01CB91
                                                          APIs
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,003CFC08,?), ref: 003905F0
                                                          • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,003CFC08,?), ref: 00390608
                                                          • CLSIDFromProgID.OLE32(?,?,00000000,003CCC40,000000FF,?,00000000,00000800,00000000,?,003CFC08,?), ref: 0039062D
                                                          • _memcmp.LIBVCRUNTIME ref: 0039064E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: FromProg$FreeTask_memcmp
                                                          • String ID:
                                                          • API String ID: 314563124-0
                                                          • Opcode ID: a30ef32ad6bd7fb85104252263d7dc0ac8a43f6c8eb903290f48e436199a26b6
                                                          • Instruction ID: 0287adb3b0a8273f18655b74248f4e2e641db73bac277d11af275b843eaba305
                                                          • Opcode Fuzzy Hash: a30ef32ad6bd7fb85104252263d7dc0ac8a43f6c8eb903290f48e436199a26b6
                                                          • Instruction Fuzzy Hash: 7E81F675A00209EFCF05DF94C984EEEB7B9FF89315F214598E506AB250DB71AE06CB60
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 003BA6AC
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 003BA6BA
                                                            • Part of subcall function 00339CB3: _wcslen.LIBCMT ref: 00339CBD
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 003BA79C
                                                          • CloseHandle.KERNEL32(00000000), ref: 003BA7AB
                                                            • Part of subcall function 0034CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00373303,?), ref: 0034CE8A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                          • String ID:
                                                          • API String ID: 1991900642-0
                                                          • Opcode ID: 4a19bb895497c8c94efa02eedbc659cf9f0b48d813d8942999259e5d4366fe6c
                                                          • Instruction ID: 7048ec05c7541bc8f3ef34f6fd1d815a2bcdab33873b74f8d3527209a8f8e499
                                                          • Opcode Fuzzy Hash: 4a19bb895497c8c94efa02eedbc659cf9f0b48d813d8942999259e5d4366fe6c
                                                          • Instruction Fuzzy Hash: 4B514C75508700AFD711EF25C886A6BBBE8FF89754F00891DF589DB261EB70E904CB92
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: b84fdce10d1dcad321e00ab847630717fe4d71d23673e7a102a4a0aad89472c3
                                                          • Instruction ID: 6041e57726239dbaba713a191d0e20426d6defc1c0e24752aac5c2629aff34e0
                                                          • Opcode Fuzzy Hash: b84fdce10d1dcad321e00ab847630717fe4d71d23673e7a102a4a0aad89472c3
                                                          • Instruction Fuzzy Hash: B6415C77A00100ABDB376BBE8C46AAE3AB9EF42370F15C625F81DDB191E67848419361
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 003B1AFD
                                                          • WSAGetLastError.WSOCK32 ref: 003B1B0B
                                                          • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 003B1B8A
                                                          • WSAGetLastError.WSOCK32 ref: 003B1B94
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$socket
                                                          • String ID:
                                                          • API String ID: 1881357543-0
                                                          • Opcode ID: a72fa48615186b59f189936bf2c316f89373f2c531d6e7cfb210b72e89ccf3dc
                                                          • Instruction ID: 07ac6be2a5e29c12fe5d4e7674b787a493be236ba31983b77a861808f7381009
                                                          • Opcode Fuzzy Hash: a72fa48615186b59f189936bf2c316f89373f2c531d6e7cfb210b72e89ccf3dc
                                                          • Instruction Fuzzy Hash: 4441D074600200AFE722EF24C896F6A77E5AB44718F54C44CFA1A9F7D2D772ED418B90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9a638526fe37b4432196e789eb32d7c35dc50707121ee435eec43fd61e11d368
                                                          • Instruction ID: 5d371bf01c63108c4d131a37dc13f0b10445012ff5e954affca1449b54e20483
                                                          • Opcode Fuzzy Hash: 9a638526fe37b4432196e789eb32d7c35dc50707121ee435eec43fd61e11d368
                                                          • Instruction Fuzzy Hash: 28413876A00314AFD727AF38CC41BAABBA9EF84710F10C52AF546DF692D77199418B80
                                                          APIs
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 003A5783
                                                          • GetLastError.KERNEL32(?,00000000), ref: 003A57A9
                                                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 003A57CE
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 003A57FA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateHardLink$DeleteErrorFileLast
                                                          • String ID:
                                                          • API String ID: 3321077145-0
                                                          • Opcode ID: 19a8504edf2f6c50d4cc1ac35020d059488f5fd39784ec14cb735979ac2962ec
                                                          • Instruction ID: 327de44f164d823fab64d5e995d4a68a861ff5bf2da3962d56f0585643aeb1d4
                                                          • Opcode Fuzzy Hash: 19a8504edf2f6c50d4cc1ac35020d059488f5fd39784ec14cb735979ac2962ec
                                                          • Instruction Fuzzy Hash: 3D411C3A600610DFDB26DF15C484A19BBE5EF4A720F198488E84AAF362CB35FD00CB91
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(?,00000000,?,00356D71,00000000,00000000,003582D9,?,003582D9,?,00000001,00356D71,?,00000001,003582D9,003582D9), ref: 0036D910
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0036D999
                                                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 0036D9AB
                                                          • __freea.LIBCMT ref: 0036D9B4
                                                            • Part of subcall function 00363820: RtlAllocateHeap.NTDLL(00000000,?,00401444,?,0034FDF5,?,?,0033A976,00000010,00401440,003313FC,?,003313C6,?,00331129), ref: 00363852
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                          • String ID:
                                                          • API String ID: 2652629310-0
                                                          • Opcode ID: c24c39175d5dffa5880bdb20348a379384826065f72090ec39f2548dc30fbdda
                                                          • Instruction ID: 8d628887c00fc4b98165a23cb6f0c892c5b4c72468bf6b198b5339dbb5599a8c
                                                          • Opcode Fuzzy Hash: c24c39175d5dffa5880bdb20348a379384826065f72090ec39f2548dc30fbdda
                                                          • Instruction Fuzzy Hash: 6431B072A0020AABDF269F65DC45EAF7BA9EB41310F068168FC04DB154EB35DD54CB90
                                                          APIs
                                                          • GetKeyboardState.USER32(?,7608C0D0,?,00008000), ref: 0039ABF1
                                                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 0039AC0D
                                                          • PostMessageW.USER32(00000000,00000101,00000000), ref: 0039AC74
                                                          • SendInput.USER32(00000001,?,0000001C,7608C0D0,?,00008000), ref: 0039ACC6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: e1c6819ac7d299b80c0e73a400b88580ae774e7473eb7648a0d936d82729d169
                                                          • Instruction ID: 21afedfea06e8f520edcd6008992c66a827fa43bb577a5806e30657b10680d71
                                                          • Opcode Fuzzy Hash: e1c6819ac7d299b80c0e73a400b88580ae774e7473eb7648a0d936d82729d169
                                                          • Instruction Fuzzy Hash: B1313970A04B186FFF37CB698C04BFA7BA9AB85311F04471AE485DA1D0C37499818BD2
                                                          APIs
                                                          • GetForegroundWindow.USER32 ref: 003C16EB
                                                            • Part of subcall function 00393A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00393A57
                                                            • Part of subcall function 00393A3D: GetCurrentThreadId.KERNEL32 ref: 00393A5E
                                                            • Part of subcall function 00393A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,003925B3), ref: 00393A65
                                                          • GetCaretPos.USER32(?), ref: 003C16FF
                                                          • ClientToScreen.USER32(00000000,?), ref: 003C174C
                                                          • GetForegroundWindow.USER32 ref: 003C1752
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                          • String ID:
                                                          • API String ID: 2759813231-0
                                                          • Opcode ID: 9f848b59ad7cc6362cd0cc167655cebade54c9d136c934e9b351ffae2ac5fe88
                                                          • Instruction ID: d05d3caa42a03390d0c504ba2700c006c6276f29784361a6ee7883597e723079
                                                          • Opcode Fuzzy Hash: 9f848b59ad7cc6362cd0cc167655cebade54c9d136c934e9b351ffae2ac5fe88
                                                          • Instruction Fuzzy Hash: 06313075D00149AFCB05EFA9C8C5DAEB7FDEF49304B5080A9E415EB212D631AE45CFA0
                                                          APIs
                                                          • GetFileAttributesW.KERNEL32(?,003CCB68), ref: 0039D2FB
                                                          • GetLastError.KERNEL32 ref: 0039D30A
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 0039D319
                                                          • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,003CCB68), ref: 0039D376
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectory$AttributesErrorFileLast
                                                          • String ID:
                                                          • API String ID: 2267087916-0
                                                          • Opcode ID: d4ffe0d13b15ea6bafa087f31f56e7d90e32d7183337bb29447e168bdc038c8d
                                                          • Instruction ID: 5c0115bedb4d847c52ad2689509a157380ad01b8d9e9e94939d167c4be403e82
                                                          • Opcode Fuzzy Hash: d4ffe0d13b15ea6bafa087f31f56e7d90e32d7183337bb29447e168bdc038c8d
                                                          • Instruction Fuzzy Hash: CB219F74508201DF8B02DF28C8C28AAB7E8AF56365F104A1DF499C72A1D731DD46CB93
                                                          APIs
                                                            • Part of subcall function 00391014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0039102A
                                                            • Part of subcall function 00391014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00391036
                                                            • Part of subcall function 00391014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00391045
                                                            • Part of subcall function 00391014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0039104C
                                                            • Part of subcall function 00391014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00391062
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 003915BE
                                                          • _memcmp.LIBVCRUNTIME ref: 003915E1
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00391617
                                                          • HeapFree.KERNEL32(00000000), ref: 0039161E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                          • String ID:
                                                          • API String ID: 1592001646-0
                                                          • Opcode ID: becb190ee9281ff5faffd19cb170258b09d38dda5cc31dcc3feaf1257041c65c
                                                          • Instruction ID: 95ddcf0473b55c4ba3f7889cc4eecd279eda924eade2f774c3161efb01ef2b4f
                                                          • Opcode Fuzzy Hash: becb190ee9281ff5faffd19cb170258b09d38dda5cc31dcc3feaf1257041c65c
                                                          • Instruction Fuzzy Hash: 02217832E4010AAFDF12DFA4C945BEEB7B8EF45344F0A4459E845BB241E730AA05CBA0
                                                          APIs
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 003C280A
                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 003C2824
                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 003C2832
                                                          • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 003C2840
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$AttributesLayered
                                                          • String ID:
                                                          • API String ID: 2169480361-0
                                                          • Opcode ID: a364cd1a123d5732a517d2fdb41bacdd8ff7806051eec1c23060d00e387af714
                                                          • Instruction ID: 0796af52e4974af942ec8f2df06a6833478c89560e4e4d0448032d4a9a411893
                                                          • Opcode Fuzzy Hash: a364cd1a123d5732a517d2fdb41bacdd8ff7806051eec1c23060d00e387af714
                                                          • Instruction Fuzzy Hash: F121A135204611AFD7169B24C895FAB7B99AF46324F15815CF42ACB6E2CB71FC42CB90
                                                          APIs
                                                            • Part of subcall function 00398D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,0039790A,?,000000FF,?,00398754,00000000,?,0000001C,?,?), ref: 00398D8C
                                                            • Part of subcall function 00398D7D: lstrcpyW.KERNEL32(00000000,?,?,0039790A,?,000000FF,?,00398754,00000000,?,0000001C,?,?,00000000), ref: 00398DB2
                                                            • Part of subcall function 00398D7D: lstrcmpiW.KERNEL32(00000000,?,0039790A,?,000000FF,?,00398754,00000000,?,0000001C,?,?), ref: 00398DE3
                                                          • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00398754,00000000,?,0000001C,?,?,00000000), ref: 00397923
                                                          • lstrcpyW.KERNEL32(00000000,?,?,00398754,00000000,?,0000001C,?,?,00000000), ref: 00397949
                                                          • lstrcmpiW.KERNEL32(00000002,cdecl,?,00398754,00000000,?,0000001C,?,?,00000000), ref: 00397984
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: lstrcmpilstrcpylstrlen
                                                          • String ID: cdecl
                                                          • API String ID: 4031866154-3896280584
                                                          • Opcode ID: daabd61bb4d99bcbe45ada4ffbfd1f08726f18f53effd6b6bb07c3e902c42ecc
                                                          • Instruction ID: 16b698e8333b539ea5ab66d2ec50087ade0f5d4b5570780393464c2f931032da
                                                          • Opcode Fuzzy Hash: daabd61bb4d99bcbe45ada4ffbfd1f08726f18f53effd6b6bb07c3e902c42ecc
                                                          • Instruction Fuzzy Hash: 3611D67A210242AFDF165F39D845E7A77A9FF85350B50402AF946CB2A4EF319811C751
                                                          APIs
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 003C7D0B
                                                          • SetWindowLongW.USER32(00000000,000000F0,?), ref: 003C7D2A
                                                          • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 003C7D42
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,003AB7AD,00000000), ref: 003C7D6B
                                                            • Part of subcall function 00349BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00349BB2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long
                                                          • String ID:
                                                          • API String ID: 847901565-0
                                                          • Opcode ID: 8b70404518c3d00a06e5258fb13c38e6cf081e847ebc56d57033b95b79cd4e0e
                                                          • Instruction ID: e8a62d088452d63de6ef32efa18bedc9b27ef7733e17016f7cfb587f13716fa2
                                                          • Opcode Fuzzy Hash: 8b70404518c3d00a06e5258fb13c38e6cf081e847ebc56d57033b95b79cd4e0e
                                                          • Instruction Fuzzy Hash: 1E114D72515615AFCB129F28DC08EA63BA9AF45360F168728FC3ADB2F0D7309D51DB50
                                                          APIs
                                                          • SendMessageW.USER32(?,00001060,?,00000004), ref: 003C56BB
                                                          • _wcslen.LIBCMT ref: 003C56CD
                                                          • _wcslen.LIBCMT ref: 003C56D8
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 003C5816
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend_wcslen
                                                          • String ID:
                                                          • API String ID: 455545452-0
                                                          • Opcode ID: d115021dba045e2c7619f5966edcd41ae941ec03a878864337fcb684d053ecde
                                                          • Instruction ID: 22287c36b5ac00fff2bdcd830440f22e9b75c4402d7990ab78637c68218876bb
                                                          • Opcode Fuzzy Hash: d115021dba045e2c7619f5966edcd41ae941ec03a878864337fcb684d053ecde
                                                          • Instruction Fuzzy Hash: FF11E13160060896DB229F61CC85FEE77ACAF10364F10406EF905D6081E770EEC4CB60
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 35c7ba1f75499b150647ebf55ec83d2f3ba0f6d3956bfff7d6836971ae5fce22
                                                          • Instruction ID: 0832d9b1a0c8e1f5547aef75b30a644924e0975d567ec16cf7805b2644075b2f
                                                          • Opcode Fuzzy Hash: 35c7ba1f75499b150647ebf55ec83d2f3ba0f6d3956bfff7d6836971ae5fce22
                                                          • Instruction Fuzzy Hash: 7F01D1B3609A163EF62326786CC5F37665CDF827B8F3A8325F521A52DADB709C005270
                                                          APIs
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00391A47
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00391A59
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00391A6F
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00391A8A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: 252c451c9a1c749a267d02c3cc2d3ca4cc85359389774f021ac9b91759922082
                                                          • Instruction ID: b90c88207dc31e11f5da24d8cb07e489e1f301bd39096a200b6d630b10bad62f
                                                          • Opcode Fuzzy Hash: 252c451c9a1c749a267d02c3cc2d3ca4cc85359389774f021ac9b91759922082
                                                          • Instruction Fuzzy Hash: 9511F73AD01219FFEF119BA5C985FADFB78EB08750F210091EA04B7290D671AE50DB94
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 0039E1FD
                                                          • MessageBoxW.USER32(?,?,?,?), ref: 0039E230
                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0039E246
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0039E24D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                          • String ID:
                                                          • API String ID: 2880819207-0
                                                          • Opcode ID: 6dff2890a04f465b7c24921b8df5e396269c7fb73e0cea2b2a69b8c0efc0d7ee
                                                          • Instruction ID: e305e04b62d5c1863d0e14dc17cfa75b1e98893502a2397268daf138d22a0d7b
                                                          • Opcode Fuzzy Hash: 6dff2890a04f465b7c24921b8df5e396269c7fb73e0cea2b2a69b8c0efc0d7ee
                                                          • Instruction Fuzzy Hash: C3112B76D04258BFDB02EFA8DC05E9E7FACEB45310F144625F824E3691D670DD0487A0
                                                          APIs
                                                          • CreateThread.KERNEL32(00000000,?,0035CFF9,00000000,00000004,00000000), ref: 0035D218
                                                          • GetLastError.KERNEL32 ref: 0035D224
                                                          • __dosmaperr.LIBCMT ref: 0035D22B
                                                          • ResumeThread.KERNEL32(00000000), ref: 0035D249
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                          • String ID:
                                                          • API String ID: 173952441-0
                                                          • Opcode ID: 96242d295d49999ea6a66df7ba22a920d0d036a22ce4ffcc0f71628d2cef30d7
                                                          • Instruction ID: 3d98d1210983d9bbedcfbfe07f175b4b80c5c73e094e9e9eef0fc06e003adedb
                                                          • Opcode Fuzzy Hash: 96242d295d49999ea6a66df7ba22a920d0d036a22ce4ffcc0f71628d2cef30d7
                                                          • Instruction Fuzzy Hash: 0701D276815208BBCB235BA6DC09FAE7A6DDF81332F114619FD259A1F0DB708909C7A0
                                                          APIs
                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0033604C
                                                          • GetStockObject.GDI32(00000011), ref: 00336060
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 0033606A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateMessageObjectSendStockWindow
                                                          • String ID:
                                                          • API String ID: 3970641297-0
                                                          • Opcode ID: c071925fb33fc8890f599033fb8b1517f20c497f8971d13321953eafe36b2f3a
                                                          • Instruction ID: 5fe8a6a40ba88ca14cd9fbb9980663d0ce1b1f74985f7765a2e189c446f76f55
                                                          • Opcode Fuzzy Hash: c071925fb33fc8890f599033fb8b1517f20c497f8971d13321953eafe36b2f3a
                                                          • Instruction Fuzzy Hash: FD116D72505508BFEF174FA49C86EEABB6DEF093A4F055215FA1992120D732EC60DBA0
                                                          APIs
                                                          • ___BuildCatchObject.LIBVCRUNTIME ref: 00353B56
                                                            • Part of subcall function 00353AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00353AD2
                                                            • Part of subcall function 00353AA3: ___AdjustPointer.LIBCMT ref: 00353AED
                                                          • _UnwindNestedFrames.LIBCMT ref: 00353B6B
                                                          • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00353B7C
                                                          • CallCatchBlock.LIBVCRUNTIME ref: 00353BA4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                          • String ID:
                                                          • API String ID: 737400349-0
                                                          • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                          • Instruction ID: 328b1b9ceca077ebae6c275da7bf5cf183d039f03c87f4b4e1d023ef9d03f0be
                                                          • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                          • Instruction Fuzzy Hash: 43012932100148BBDF125E95CC42EEB3B69EF48799F054014FE489A121D732E965DBA0
                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,003313C6,00000000,00000000,?,0036301A,003313C6,00000000,00000000,00000000,?,0036328B,00000006,FlsSetValue), ref: 003630A5
                                                          • GetLastError.KERNEL32(?,0036301A,003313C6,00000000,00000000,00000000,?,0036328B,00000006,FlsSetValue,003D2290,FlsSetValue,00000000,00000364,?,00362E46), ref: 003630B1
                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0036301A,003313C6,00000000,00000000,00000000,?,0036328B,00000006,FlsSetValue,003D2290,FlsSetValue,00000000), ref: 003630BF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: LibraryLoad$ErrorLast
                                                          • String ID:
                                                          • API String ID: 3177248105-0
                                                          • Opcode ID: dcfeb7587554f5c3cc3cb6b381f953760c2eeafe6b7f07672caedc2aaa285798
                                                          • Instruction ID: 14b6001cfe5ccbd64f426a1cad2271099d006b326be3a7b1b6db24be0579c591
                                                          • Opcode Fuzzy Hash: dcfeb7587554f5c3cc3cb6b381f953760c2eeafe6b7f07672caedc2aaa285798
                                                          • Instruction Fuzzy Hash: 2601D432312222ABCB334A79AC44E677B9CEF05BA1F158620F90BE3144C721D909C7E0
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 0039747F
                                                          • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00397497
                                                          • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 003974AC
                                                          • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 003974CA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Type$Register$FileLoadModuleNameUser
                                                          • String ID:
                                                          • API String ID: 1352324309-0
                                                          • Opcode ID: d2a79ecbbbde147024c78c28035aaddb79c657b4de3b3830c309ca35eb5038b5
                                                          • Instruction ID: 31dcb48a65d0d69c7d69db084c395a858fb500c3c8272f4919f707f022109f0e
                                                          • Opcode Fuzzy Hash: d2a79ecbbbde147024c78c28035aaddb79c657b4de3b3830c309ca35eb5038b5
                                                          • Instruction Fuzzy Hash: 9011A1B12253119BEB228F16DC08FA27BFCEF00B00F108569E61AD6592D770F904DB90
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0039ACD3,?,00008000), ref: 0039B0C4
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0039ACD3,?,00008000), ref: 0039B0E9
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0039ACD3,?,00008000), ref: 0039B0F3
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0039ACD3,?,00008000), ref: 0039B126
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CounterPerformanceQuerySleep
                                                          • String ID:
                                                          • API String ID: 2875609808-0
                                                          • Opcode ID: 8cc352cc95c4bdd5cd90a2eaedf631f473f4fe06673d4f36ff2e97c4632d3168
                                                          • Instruction ID: 5aa50fccbcf7564c65267e614600d0050d59634a18402beb44df3b7498229d0a
                                                          • Opcode Fuzzy Hash: 8cc352cc95c4bdd5cd90a2eaedf631f473f4fe06673d4f36ff2e97c4632d3168
                                                          • Instruction Fuzzy Hash: 8E115B31C0162DE7CF02AFE5EA69AEEFB78FF49711F114095D981B2281CB3056508B91
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 003C7E33
                                                          • ScreenToClient.USER32(?,?), ref: 003C7E4B
                                                          • ScreenToClient.USER32(?,?), ref: 003C7E6F
                                                          • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 003C7E8A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ClientRectScreen$InvalidateWindow
                                                          • String ID:
                                                          • API String ID: 357397906-0
                                                          • Opcode ID: a675aaf8d84a1d0e822a64a6d08b7279bca9b76a1c11c6cb82d51640646a2dd8
                                                          • Instruction ID: fc82d3800b55bcf1a21918ee6fb316cc26fa379db1f80434eb84dabbcfed876f
                                                          • Opcode Fuzzy Hash: a675aaf8d84a1d0e822a64a6d08b7279bca9b76a1c11c6cb82d51640646a2dd8
                                                          • Instruction Fuzzy Hash: D81126B9D0024AAFDB41DFA8C984AEEBBF9FF08310F505056E955E3210D735AA55CF50
                                                          APIs
                                                          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00392DC5
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00392DD6
                                                          • GetCurrentThreadId.KERNEL32 ref: 00392DDD
                                                          • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00392DE4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 2710830443-0
                                                          • Opcode ID: 1e131850ba63beed908f9e0f919ec2a0ea450831763c013580ccfcb22db6d554
                                                          • Instruction ID: 6e8126733ea5ce9b9ad53f958f15ac74ecd2fa22d482779ac12e2a905dc37453
                                                          • Opcode Fuzzy Hash: 1e131850ba63beed908f9e0f919ec2a0ea450831763c013580ccfcb22db6d554
                                                          • Instruction Fuzzy Hash: E5E09272511624BBDB221B739C0DFEB3E6CFF42BA1F051015F10AD10809AA4D841C7B0
                                                          APIs
                                                            • Part of subcall function 00349639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00349693
                                                            • Part of subcall function 00349639: SelectObject.GDI32(?,00000000), ref: 003496A2
                                                            • Part of subcall function 00349639: BeginPath.GDI32(?), ref: 003496B9
                                                            • Part of subcall function 00349639: SelectObject.GDI32(?,00000000), ref: 003496E2
                                                          • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 003C8887
                                                          • LineTo.GDI32(?,?,?), ref: 003C8894
                                                          • EndPath.GDI32(?), ref: 003C88A4
                                                          • StrokePath.GDI32(?), ref: 003C88B2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                          • String ID:
                                                          • API String ID: 1539411459-0
                                                          • Opcode ID: 4a7e274542595e6cc300e918bfbc01b8c5e7437813a8b9f5ffb9f72a5a71363b
                                                          • Instruction ID: c4635529b6e2cdfe5eab2eb93f124e35ee15b94bbdbf3a06372a1541eb54aacc
                                                          • Opcode Fuzzy Hash: 4a7e274542595e6cc300e918bfbc01b8c5e7437813a8b9f5ffb9f72a5a71363b
                                                          • Instruction Fuzzy Hash: CDF05E36041268FADB135F94AC09FDE3F59AF06310F048004FA55A50E1CB756A11CFE9
                                                          APIs
                                                          • GetSysColor.USER32(00000008), ref: 003498CC
                                                          • SetTextColor.GDI32(?,?), ref: 003498D6
                                                          • SetBkMode.GDI32(?,00000001), ref: 003498E9
                                                          • GetStockObject.GDI32(00000005), ref: 003498F1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$ModeObjectStockText
                                                          • String ID:
                                                          • API String ID: 4037423528-0
                                                          • Opcode ID: 7a4ceab6c93740830a59c4330dd302ba02eba5efd39777b72af06f0c10142fb0
                                                          • Instruction ID: 1602d3f96f555994c33ed479ab6d63a595f11100d71a4992173ab72c8c19eded
                                                          • Opcode Fuzzy Hash: 7a4ceab6c93740830a59c4330dd302ba02eba5efd39777b72af06f0c10142fb0
                                                          • Instruction Fuzzy Hash: 46E06531654240AEDB225B75BC09FE93F55AB12335F188219F6FDD80E1C372A6419B10
                                                          APIs
                                                          • GetCurrentThread.KERNEL32 ref: 00391634
                                                          • OpenThreadToken.ADVAPI32(00000000,?,?,?,003911D9), ref: 0039163B
                                                          • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,003911D9), ref: 00391648
                                                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,003911D9), ref: 0039164F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentOpenProcessThreadToken
                                                          • String ID:
                                                          • API String ID: 3974789173-0
                                                          • Opcode ID: 69d46a8ea7b9445362c2006999601dff4cd2a7fdabfc8de4ef4d241e5b69fa2e
                                                          • Instruction ID: e31dfa392617f8b737990959dd59213d9db59ad25e25368c7372dde19b3fabf5
                                                          • Opcode Fuzzy Hash: 69d46a8ea7b9445362c2006999601dff4cd2a7fdabfc8de4ef4d241e5b69fa2e
                                                          • Instruction Fuzzy Hash: C0E08671A11221DBDB211FA0AD0DF463B7CBF44791F194808F649D9080D6389441C750
                                                          APIs
                                                          • GetDesktopWindow.USER32 ref: 0038D858
                                                          • GetDC.USER32(00000000), ref: 0038D862
                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0038D882
                                                          • ReleaseDC.USER32(?), ref: 0038D8A3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: 924f930554e65b59c789f680c44526dd9978d01b3f40e4db6d68c325a12020e5
                                                          • Instruction ID: b512835d961f1024dd04219318f288311399d7c6afda3a234cb1257bdaa75af2
                                                          • Opcode Fuzzy Hash: 924f930554e65b59c789f680c44526dd9978d01b3f40e4db6d68c325a12020e5
                                                          • Instruction Fuzzy Hash: BBE01AB4810204DFCB42AFA0D90CA6DBBB9FB08310F18A049E84AE7250C738A912EF40
                                                          APIs
                                                          • GetDesktopWindow.USER32 ref: 0038D86C
                                                          • GetDC.USER32(00000000), ref: 0038D876
                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0038D882
                                                          • ReleaseDC.USER32(?), ref: 0038D8A3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: 224b12c99a0f14cbf6e46fd2c74af0a19bfdc492c6d781d599bb14e6b13b5d8c
                                                          • Instruction ID: 4baefee4fa827a2eca2d26550109121cea67b1446aed8ba2e54bbfadbabc3e16
                                                          • Opcode Fuzzy Hash: 224b12c99a0f14cbf6e46fd2c74af0a19bfdc492c6d781d599bb14e6b13b5d8c
                                                          • Instruction Fuzzy Hash: 6CE09A75810204DFCB52AFA0D94CA6DBBB9BB08311F18A449E94AE7250C739A912DF50
                                                          APIs
                                                            • Part of subcall function 00337620: _wcslen.LIBCMT ref: 00337625
                                                          • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 003A4ED4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Connection_wcslen
                                                          • String ID: *$LPT
                                                          • API String ID: 1725874428-3443410124
                                                          • Opcode ID: 8b82923cb03e5e3555c83932a35e521232ebf134f004c8c7ef87e1b0dc08534a
                                                          • Instruction ID: 426641172b707f2575c2e3259d35a0100973cc054898e384091aa8643bb4e4fd
                                                          • Opcode Fuzzy Hash: 8b82923cb03e5e3555c83932a35e521232ebf134f004c8c7ef87e1b0dc08534a
                                                          • Instruction Fuzzy Hash: 8B917D75A002049FDB16DF58C484EAABBF5FF86304F198099E80A9F362C775ED85CB90
                                                          APIs
                                                          • __startOneArgErrorHandling.LIBCMT ref: 0035E30D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorHandling__start
                                                          • String ID: pow
                                                          • API String ID: 3213639722-2276729525
                                                          • Opcode ID: ec5336b8bb972e6e02f0ca75f492fa8dc05955ae123bbd4ab28891827e4189c8
                                                          • Instruction ID: 8a561822a34d30d42f8df239435172c5c57654bfd2ec9d4dd22372b146e54251
                                                          • Opcode Fuzzy Hash: ec5336b8bb972e6e02f0ca75f492fa8dc05955ae123bbd4ab28891827e4189c8
                                                          • Instruction Fuzzy Hash: CA51CE61A0C20196CB1B7714CD01B7A3BACEB10746F70CDA9E8D2462FCEB318DDD9A46
                                                          APIs
                                                          • CharUpperBuffW.USER32(0038569E,00000000,?,003CCC08,?,00000000,00000000), ref: 003B78DD
                                                            • Part of subcall function 00336B57: _wcslen.LIBCMT ref: 00336B6A
                                                          • CharUpperBuffW.USER32(0038569E,00000000,?,003CCC08,00000000,?,00000000,00000000), ref: 003B783B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper$_wcslen
                                                          • String ID: <s?
                                                          • API String ID: 3544283678-1615119086
                                                          • Opcode ID: 64f0a5c6fd7e673ce7055bb734cbd368d402d304f7d6bfcb509e311051526baf
                                                          • Instruction ID: 7e7d055f2aa427503f5f8219f8423a7f55be55b80a1b5193f5c8619542702fb6
                                                          • Opcode Fuzzy Hash: 64f0a5c6fd7e673ce7055bb734cbd368d402d304f7d6bfcb509e311051526baf
                                                          • Instruction Fuzzy Hash: 8A613C76914119AACF07EBA4CC92DFDB378FF54704F44412AE642BB491EF306A09DBA0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: #
                                                          • API String ID: 0-1885708031
                                                          • Opcode ID: 9a616a40c68ed6e09e191de43ccd010bdd8997989e4410bd2a84b1fb2cd87089
                                                          • Instruction ID: 9381c54f57cc7bbdb4fe4b9204985b05ee44665c1b5e88cd87a023159f2804dd
                                                          • Opcode Fuzzy Hash: 9a616a40c68ed6e09e191de43ccd010bdd8997989e4410bd2a84b1fb2cd87089
                                                          • Instruction Fuzzy Hash: C6510D35A04346DFDB17EF28C481ABA7BA8FF55310F248599F8919F2D0D674AD42CBA0
                                                          APIs
                                                          • Sleep.KERNEL32(00000000), ref: 0034F2A2
                                                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 0034F2BB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: GlobalMemorySleepStatus
                                                          • String ID: @
                                                          • API String ID: 2783356886-2766056989
                                                          • Opcode ID: 622a5b5041c37e36ffc7662c546b77dedcd5f81597604f64d9a4ab232acc4c1c
                                                          • Instruction ID: ddfc89ae0779a43aafa48bce5756ef524f63a4b5f91c4a71e7486ebd78214013
                                                          • Opcode Fuzzy Hash: 622a5b5041c37e36ffc7662c546b77dedcd5f81597604f64d9a4ab232acc4c1c
                                                          • Instruction Fuzzy Hash: C55155724187489BD321AF10DC86BAFBBFCFB84304F81884CF1D9551A5EB309929CB66
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 003B57E0
                                                          • _wcslen.LIBCMT ref: 003B57EC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper_wcslen
                                                          • String ID: CALLARGARRAY
                                                          • API String ID: 157775604-1150593374
                                                          • Opcode ID: 71086c4700be5a3ad8a8316650abf89d1be64b95d3e15bb167455e9dc603ebde
                                                          • Instruction ID: 36e997e9a80ea81184a62703b7189bac12b83c348dbfa312b99e870cd847370e
                                                          • Opcode Fuzzy Hash: 71086c4700be5a3ad8a8316650abf89d1be64b95d3e15bb167455e9dc603ebde
                                                          • Instruction Fuzzy Hash: B5419F31A002099FCB16DFA9C882AFEBBF5FF59324F154069E605EB251E7309D81CB90
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 003AD130
                                                          • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 003AD13A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CrackInternet_wcslen
                                                          • String ID: |
                                                          • API String ID: 596671847-2343686810
                                                          • Opcode ID: d20a387d55f88d3daa71a3fb3a2b2d26dce74a59609bef02674afc0d9bf0a5f8
                                                          • Instruction ID: bc4f7290c3284479d90da3acf9d19b93762fde2ce5fff4923e66ca5027055a47
                                                          • Opcode Fuzzy Hash: d20a387d55f88d3daa71a3fb3a2b2d26dce74a59609bef02674afc0d9bf0a5f8
                                                          • Instruction Fuzzy Hash: 79311A71D00209AFCF16EFA4CD85AEEBFB9FF09300F004019F815AA162D735AA46CB90
                                                          APIs
                                                          • DestroyWindow.USER32(?,?,?,?), ref: 003C3621
                                                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 003C365C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$DestroyMove
                                                          • String ID: static
                                                          • API String ID: 2139405536-2160076837
                                                          • Opcode ID: 08aacfb58fda397b29959792b533b44ab5e82711ac3bfb6caa30d1e3ec1fc537
                                                          • Instruction ID: 5aa879ff08f4e3a94ed824963f3a46f977d6773227ac1083a05962ab0df11307
                                                          • Opcode Fuzzy Hash: 08aacfb58fda397b29959792b533b44ab5e82711ac3bfb6caa30d1e3ec1fc537
                                                          • Instruction Fuzzy Hash: AC31AA71110204AEDB129F68CC81FFB73A9FF88720F01961DF8A9D7280DA35AD91CB60
                                                          APIs
                                                            • Part of subcall function 00349BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00349BB2
                                                            • Part of subcall function 00349944: GetWindowLongW.USER32(?,000000EB), ref: 00349952
                                                          • GetParent.USER32(?), ref: 003873A3
                                                          • DefDlgProcW.USER32(?,00000133,?,?,?,?), ref: 0038742D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$ParentProc
                                                          • String ID: @q
                                                          • API String ID: 2181805148-962691702
                                                          • Opcode ID: f68fd33b51c18fd742b62404672efee8170488294c302e1707535025af8bbfcc
                                                          • Instruction ID: d20aa0172cef02742114df3d22983ff8d88cf448391e7a68de7e26644fa1c4f7
                                                          • Opcode Fuzzy Hash: f68fd33b51c18fd742b62404672efee8170488294c302e1707535025af8bbfcc
                                                          • Instruction Fuzzy Hash: 6521B134604204AFCB27AF2DCC49EAA3BD6EF4A360F254296F9255F2B1C371AD51E741
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 003C327C
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 003C3287
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: Combobox
                                                          • API String ID: 3850602802-2096851135
                                                          • Opcode ID: fcc98305ec75322e6aa82acf8f717d4556e491fdbc85bb52afb42090d5f64089
                                                          • Instruction ID: eb1cc43a44d0f9ecd4d586f8da7da1e875717be558ce1f6e9b264a5766427801
                                                          • Opcode Fuzzy Hash: fcc98305ec75322e6aa82acf8f717d4556e491fdbc85bb52afb42090d5f64089
                                                          • Instruction Fuzzy Hash: F711B2713002087FEF269F54DC81FBB776EEB94364F118529F918DB290D671AD518760
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateMenuPopup
                                                          • String ID: @q
                                                          • API String ID: 3826294624-962691702
                                                          • Opcode ID: c9d9ad09bb1d75997874a4265de691ce24ecfb59ba9befb4e0ff8de0bb445959
                                                          • Instruction ID: b75576ff84d63228cc6eac258751d405d30530fb5fe21e31fe23c7a6f0a86814
                                                          • Opcode Fuzzy Hash: c9d9ad09bb1d75997874a4265de691ce24ecfb59ba9befb4e0ff8de0bb445959
                                                          • Instruction Fuzzy Hash: 462139786056049FCB22CF28C445F96B7E5FB0E365F09846AE899DB361D331AE02CF55
                                                          APIs
                                                            • Part of subcall function 0033600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0033604C
                                                            • Part of subcall function 0033600E: GetStockObject.GDI32(00000011), ref: 00336060
                                                            • Part of subcall function 0033600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0033606A
                                                          • GetWindowRect.USER32(00000000,?), ref: 003C377A
                                                          • GetSysColor.USER32(00000012), ref: 003C3794
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                          • String ID: static
                                                          • API String ID: 1983116058-2160076837
                                                          • Opcode ID: d32068b7eb71e5e9682f38639bbfbd7675cca40a5df86f5e2c1ee6e8aa3ea416
                                                          • Instruction ID: fd3f893cb346b5edf44789615b399d28565b99f52191c968c39f8e5ab992ec97
                                                          • Opcode Fuzzy Hash: d32068b7eb71e5e9682f38639bbfbd7675cca40a5df86f5e2c1ee6e8aa3ea416
                                                          • Instruction Fuzzy Hash: E7113AB2610209AFDF02DFA8CC46EEA7BF8FB09314F015518F955E2250D735ED519B50
                                                          APIs
                                                          • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 003C61FC
                                                          • SendMessageW.USER32(?,00000194,00000000,00000000), ref: 003C6225
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: @q
                                                          • API String ID: 3850602802-962691702
                                                          • Opcode ID: 63c561d6ee4a47d80c40049d0411c5bc503b49c558fcf229faeff5c40f03f5e3
                                                          • Instruction ID: 2ff91eb132724eb17d84c16d6c43b7abcd74563050b6ac7480f1a307053b0d03
                                                          • Opcode Fuzzy Hash: 63c561d6ee4a47d80c40049d0411c5bc503b49c558fcf229faeff5c40f03f5e3
                                                          • Instruction Fuzzy Hash: B311C171144218BEEB128F68CD1BFBA3BA8EB09311F054519FA16EA1E1D2B1EE10DB50
                                                          APIs
                                                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 003ACD7D
                                                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 003ACDA6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Internet$OpenOption
                                                          • String ID: <local>
                                                          • API String ID: 942729171-4266983199
                                                          • Opcode ID: 6ad34f51750db7a8759919cdb8d0fd5082002a6e68a503ec0687e799d7c8cf08
                                                          • Instruction ID: cc53262a50907b1ce237b1873a03db62a2566ae9d5006443c45bd8a831f216ef
                                                          • Opcode Fuzzy Hash: 6ad34f51750db7a8759919cdb8d0fd5082002a6e68a503ec0687e799d7c8cf08
                                                          • Instruction Fuzzy Hash: B511C271225635BAD73A4B668C49EF7BEACEF137A4F00522AF11983580D7709840D6F0
                                                          APIs
                                                          • GetWindowTextLengthW.USER32(00000000), ref: 003C34AB
                                                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 003C34BA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: LengthMessageSendTextWindow
                                                          • String ID: edit
                                                          • API String ID: 2978978980-2167791130
                                                          • Opcode ID: 0ed42766979bd3b4ef556b64e2a387b54fdf9e983ba4b93e84c44aec53b53161
                                                          • Instruction ID: d740fc2069bc19ed050203526647bee8a79637d8cfbb0f2e3a9af368e266de48
                                                          • Opcode Fuzzy Hash: 0ed42766979bd3b4ef556b64e2a387b54fdf9e983ba4b93e84c44aec53b53161
                                                          • Instruction Fuzzy Hash: D6118871100208AAEB178E65DC80FAA36AAEB05374F518328F964D71E0C731ED519B60
                                                          APIs
                                                          • SendMessageW.USER32(?,?,?,?), ref: 003C4FCC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: @q
                                                          • API String ID: 3850602802-962691702
                                                          • Opcode ID: 2c4207c02b14d03800a1f0d3e9125c3c36cdbe0f37d5f25c3262aeb6c3980f67
                                                          • Instruction ID: a1589c5edaada29c2e5f4355a65f2c4a0e7697c5aa85278656864307d53b0efb
                                                          • Opcode Fuzzy Hash: 2c4207c02b14d03800a1f0d3e9125c3c36cdbe0f37d5f25c3262aeb6c3980f67
                                                          • Instruction Fuzzy Hash: 5121D37661011AEFCB16CFA8C950DEABBB9FB4D340B014158F905E7320D631ED61EB90
                                                          APIs
                                                            • Part of subcall function 00339CB3: _wcslen.LIBCMT ref: 00339CBD
                                                          • CharUpperBuffW.USER32(?,?,?), ref: 00396CB6
                                                          • _wcslen.LIBCMT ref: 00396CC2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharUpper
                                                          • String ID: STOP
                                                          • API String ID: 1256254125-2411985666
                                                          • Opcode ID: 4d8f2e3a3c7b28649c0b9b00790c3daf083edf38da97d538c3f3d646593c3bf8
                                                          • Instruction ID: 2a5fab5ca46b2eebd9bf4bb33ce96071ff2b4ddca5e5d59f8add7efffe7d9d29
                                                          • Opcode Fuzzy Hash: 4d8f2e3a3c7b28649c0b9b00790c3daf083edf38da97d538c3f3d646593c3bf8
                                                          • Instruction Fuzzy Hash: D40104326119268ACF239FBDDC829BF37A8EA60710B020534F86296194EB31E800CA50
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: @q
                                                          • API String ID: 0-962691702
                                                          • Opcode ID: f2472cb94954077576ecd425a3d58eb1ffff3b9cbb78dcde032f93187900bfb0
                                                          • Instruction ID: 0e17a6c512b811d1f35fe7e584e2b839ce23c97cd2a4d813180e3b6642327253
                                                          • Opcode Fuzzy Hash: f2472cb94954077576ecd425a3d58eb1ffff3b9cbb78dcde032f93187900bfb0
                                                          • Instruction Fuzzy Hash: 22113D75604704AFCB21DF18D850EA5B7E6FB89320F258259F9259B2A0C771F941CF90
                                                          APIs
                                                            • Part of subcall function 00339CB3: _wcslen.LIBCMT ref: 00339CBD
                                                            • Part of subcall function 00393CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00393CCA
                                                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00391D4C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: 5cdb1c18eebf846200f70e9da7e3024c3f8bd303be8acd6c519bdc16bedd9533
                                                          • Instruction ID: cca44a25c546fabcdbbb3a1140cd2f1300129d2f08e50a45b51b47c5839dc644
                                                          • Opcode Fuzzy Hash: 5cdb1c18eebf846200f70e9da7e3024c3f8bd303be8acd6c519bdc16bedd9533
                                                          • Instruction Fuzzy Hash: C301D871651219ABCF0AFBA4CD55DFE7768EF46350F04051AF8226B2D1EA705908C760
                                                          APIs
                                                            • Part of subcall function 00339CB3: _wcslen.LIBCMT ref: 00339CBD
                                                            • Part of subcall function 00393CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00393CCA
                                                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 00391C46
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: 084e512d1cb449e771f2fa0d45c9a18b3d2ef7db145f1361b8ed2ff391a42947
                                                          • Instruction ID: 09ee02cf6a8c71d5b6c87e37047de10a89b8335ee6e52722fdecf847240d3207
                                                          • Opcode Fuzzy Hash: 084e512d1cb449e771f2fa0d45c9a18b3d2ef7db145f1361b8ed2ff391a42947
                                                          • Instruction Fuzzy Hash: 1D01A775685109A6DF07EB90CA91EFF77AC9F51340F14001AF5167B281EA609E08CAB1
                                                          APIs
                                                            • Part of subcall function 00339CB3: _wcslen.LIBCMT ref: 00339CBD
                                                            • Part of subcall function 00393CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00393CCA
                                                          • SendMessageW.USER32(?,00000182,?,00000000), ref: 00391CC8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: d94f733863031bd06061a7e8930f52d6b2ebf2766d4d660f267b942df69ddf3d
                                                          • Instruction ID: 1d5ee1b10a49ab56900a229231c2451beda1a408f769b768846639653796a3b2
                                                          • Opcode Fuzzy Hash: d94f733863031bd06061a7e8930f52d6b2ebf2766d4d660f267b942df69ddf3d
                                                          • Instruction Fuzzy Hash: 7A01D6B6680119A7DF07EBA0CA41EFE77AC9B11340F540016B902BB281EAA09F08CA71
                                                          APIs
                                                          • __Init_thread_footer.LIBCMT ref: 0034A529
                                                            • Part of subcall function 00339CB3: _wcslen.LIBCMT ref: 00339CBD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Init_thread_footer_wcslen
                                                          • String ID: ,%@$3y8
                                                          • API String ID: 2551934079-1164007899
                                                          • Opcode ID: ec8bab402d0757081e394135bbaaf566d43519f2a0a56730275b7d77f3e40e37
                                                          • Instruction ID: 53d87b3b6a72626cd2b77488f65d326774462e4c210e1e0b0dbcf4850e75cc4f
                                                          • Opcode Fuzzy Hash: ec8bab402d0757081e394135bbaaf566d43519f2a0a56730275b7d77f3e40e37
                                                          • Instruction Fuzzy Hash: D6012B31780A1097C517F768EE5BFAD33949B06711F4040AAF9056F2D3DEA0BD45869B
                                                          APIs
                                                            • Part of subcall function 00339CB3: _wcslen.LIBCMT ref: 00339CBD
                                                            • Part of subcall function 00393CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00393CCA
                                                          • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00391DD3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: 9779d596afd0867d910247f1a6916ef7a98904d1bd6969232759f94087d6851e
                                                          • Instruction ID: 32d6b8e5f8adfe779ce0803d0773b5ceb88e8850ae69a1c3eeaac7f7d2894a61
                                                          • Opcode Fuzzy Hash: 9779d596afd0867d910247f1a6916ef7a98904d1bd6969232759f94087d6851e
                                                          • Instruction Fuzzy Hash: F1F0C875B41219A6DF07F7A4CD92FFF777CAF01350F040916F922BB6C1DAA0590886A0
                                                          APIs
                                                            • Part of subcall function 00349BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00349BB2
                                                          • DefDlgProcW.USER32(?,0000002B,?,?,?,?,?,?,?,0038769C,?,?,?), ref: 003C9111
                                                            • Part of subcall function 00349944: GetWindowLongW.USER32(?,000000EB), ref: 00349952
                                                          • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 003C90F7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$MessageProcSend
                                                          • String ID: @q
                                                          • API String ID: 982171247-962691702
                                                          • Opcode ID: 27302c3421f4e03a2e093d13bd8d1ab710c84d7f8195f4e30156c56f5c079ad9
                                                          • Instruction ID: 12a1ec29c643e9f0368e69a87fa6bb697f044b6f3c399f7fb583ab29479a6a50
                                                          • Opcode Fuzzy Hash: 27302c3421f4e03a2e093d13bd8d1ab710c84d7f8195f4e30156c56f5c079ad9
                                                          • Instruction Fuzzy Hash: BF01DF31100214ABDB229F14DC4EFA67BAAFF86765F15006EF9559B2E1CB336C51CB50
                                                          APIs
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00403018,0040305C), ref: 003C81BF
                                                          • CloseHandle.KERNEL32 ref: 003C81D1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateHandleProcess
                                                          • String ID: \0@
                                                          • API String ID: 3712363035-863861157
                                                          • Opcode ID: 1ae6b5179de2cedf9dba8f5847400b2fc0d601d98ff4f1d45836bd2edaad1326
                                                          • Instruction ID: 685b577d86eb8b36efed367b18521faffc18f8adfa3467cb522af22990d96b7a
                                                          • Opcode Fuzzy Hash: 1ae6b5179de2cedf9dba8f5847400b2fc0d601d98ff4f1d45836bd2edaad1326
                                                          • Instruction Fuzzy Hash: 2FF03AB5641300BAE2216F61AC49FB73E5CEB06752F008471BA08E91A2D67A9E0483E8
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: 3, 3, 16, 1
                                                          • API String ID: 176396367-3042988571
                                                          • Opcode ID: d6f77451893602de22780862506e603e51c5b8af3f41718c4d14c6d4e9abb57d
                                                          • Instruction ID: 6707a5156badb25daf1692c6346c170a9b8aeb9f7a312435638e17aa4c72f315
                                                          • Opcode Fuzzy Hash: d6f77451893602de22780862506e603e51c5b8af3f41718c4d14c6d4e9abb57d
                                                          • Instruction Fuzzy Hash: FAE02B06608220209237127B9CC6DFF5689CFC5756710182BFE81C6276EB948DD193E0
                                                          APIs
                                                          • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00390B23
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Message
                                                          • String ID: AutoIt$Error allocating memory.
                                                          • API String ID: 2030045667-4017498283
                                                          • Opcode ID: a979ce0aa060a085c3c305534499deefa962c1400be9981ab145a9b6f508fe7b
                                                          • Instruction ID: 0762136c92a177fafb23beeb5db5d13c48f0bd6b25d1ca3d8c18721c21b22528
                                                          • Opcode Fuzzy Hash: a979ce0aa060a085c3c305534499deefa962c1400be9981ab145a9b6f508fe7b
                                                          • Instruction Fuzzy Hash: A0E0D8312443083ED21B36947C43FC97AC48F05B11F14442AFB8C9D4D38BE1789047A9
                                                          APIs
                                                            • Part of subcall function 0034F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00350D71,?,?,?,0033100A), ref: 0034F7CE
                                                          • IsDebuggerPresent.KERNEL32(?,?,?,0033100A), ref: 00350D75
                                                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0033100A), ref: 00350D84
                                                          Strings
                                                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00350D7F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                          • API String ID: 55579361-631824599
                                                          • Opcode ID: 20ea3b815226ca240a4891a37145b8d4c2babe2c26b4ce4c06b11a30787ca306
                                                          • Instruction ID: a7769486690d2e9fdc078ed1d81599a9e5c73caeabcc7fd4c48a33a9349c9e9f
                                                          • Opcode Fuzzy Hash: 20ea3b815226ca240a4891a37145b8d4c2babe2c26b4ce4c06b11a30787ca306
                                                          • Instruction Fuzzy Hash: B8E092742003418FD7369FB8D544B827BF4AF00741F044D2DE886CA661DBB6F8488B91
                                                          APIs
                                                          • __Init_thread_footer.LIBCMT ref: 0034E3D5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Init_thread_footer
                                                          • String ID: 0%@$8%@
                                                          • API String ID: 1385522511-2711268310
                                                          • Opcode ID: 79d36dcca685fd563fce98412caf7460a083411f35536b6dd03d47a7ec1e992c
                                                          • Instruction ID: 7c91f3662d1fbad59474b8ca6ccb2ccac7df5af1a5fba31d525e1fb5f02760f1
                                                          • Opcode Fuzzy Hash: 79d36dcca685fd563fce98412caf7460a083411f35536b6dd03d47a7ec1e992c
                                                          • Instruction Fuzzy Hash: 03E08639414910EBC60B9B18BF5DE8A3395FB05320F9151B5F512AF1E29BB53841865D
                                                          APIs
                                                          • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 003A302F
                                                          • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 003A3044
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: Temp$FileNamePath
                                                          • String ID: aut
                                                          • API String ID: 3285503233-3010740371
                                                          • Opcode ID: 2d5c6dc921da0cfd9422cd4d97d6b26b208fcae89dfffaa63e2694df721bee0a
                                                          • Instruction ID: f6bccd1d95f936c5f9f6f02d9b4f4feda6244ad1ef2dc20e8516f25227b581cd
                                                          • Opcode Fuzzy Hash: 2d5c6dc921da0cfd9422cd4d97d6b26b208fcae89dfffaa63e2694df721bee0a
                                                          • Instruction Fuzzy Hash: F8D05EB250032867DE20E7A4AC0EFDB3A6CDB04750F0006A1F659E2091DBB0A984CBD0
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: LocalTime
                                                          • String ID: %.3d$X64
                                                          • API String ID: 481472006-1077770165
                                                          • Opcode ID: 894534f987653bc3fd3e8896a851242a329b4f6071cb4465946ee8e782d5df67
                                                          • Instruction ID: 54f341bef324f242a3c5cf808e0d992840424539952f5f5773c7cac024ab7e69
                                                          • Opcode Fuzzy Hash: 894534f987653bc3fd3e8896a851242a329b4f6071cb4465946ee8e782d5df67
                                                          • Instruction Fuzzy Hash: 4BD01271808208F9CB52B6D0DC49CB9B3BCFB08301F608892F906D2880D624D5086761
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 003C232C
                                                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 003C233F
                                                            • Part of subcall function 0039E97B: Sleep.KERNELBASE ref: 0039E9F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: 8e322c287c03ec6dacf943eae1671ac39db060dff51db8b1b51c155d3a204f35
                                                          • Instruction ID: dab4a4ee6de4e8d93c9ff4417ac48dabb561287415caba183f92ebfe205aa43b
                                                          • Opcode Fuzzy Hash: 8e322c287c03ec6dacf943eae1671ac39db060dff51db8b1b51c155d3a204f35
                                                          • Instruction Fuzzy Hash: C6D012367A4310B7E665B771DC0FFD6BA189B40B14F005916F74AEA1D0C9F4B805CB54
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 003C236C
                                                          • PostMessageW.USER32(00000000), ref: 003C2373
                                                            • Part of subcall function 0039E97B: Sleep.KERNELBASE ref: 0039E9F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: 3c64ee207f3f6903fc712dfd84294eceae2d74f59696efccf96a3fdbeded19a3
                                                          • Instruction ID: 97d73e884ce49b4719df8c014e665cdf139924e4f3d311793e8b9aded24cf457
                                                          • Opcode Fuzzy Hash: 3c64ee207f3f6903fc712dfd84294eceae2d74f59696efccf96a3fdbeded19a3
                                                          • Instruction Fuzzy Hash: 39D0C9327913107AE666B7719C0FFC6A6189B45B14F005916B74AEA1D0C9A4B8058B58
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 0036BE93
                                                          • GetLastError.KERNEL32 ref: 0036BEA1
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0036BEFC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1369402003.0000000000331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00330000, based on PE: true
                                                          • Associated: 00000000.00000002.1369382509.0000000000330000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369461996.00000000003F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369504201.00000000003FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1369523349.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_330000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$ErrorLast
                                                          • String ID:
                                                          • API String ID: 1717984340-0
                                                          • Opcode ID: 9aaf90b42980c19f2afe522350ec9c2200024cb2af461127b05bd8d5748a0030
                                                          • Instruction ID: 03a897fb64913049b2df05c90c2d9b5f25dc75ec4c90259cd4805716cb251b08
                                                          • Opcode Fuzzy Hash: 9aaf90b42980c19f2afe522350ec9c2200024cb2af461127b05bd8d5748a0030
                                                          • Instruction Fuzzy Hash: 0F41E535600206AFCF238F65DC44AAAFBA9AF41310F168169F959DF1B9DB318C81CF60