Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1524249
MD5:a4da09a845d42f57982ff9177c819a39
SHA1:3c78a95a27531287f51251b13cc27cc0ad429413
SHA256:52d7013d0601f0308fa745c77172fee02146b6bd6cc12a56dd56653a49fd9641
Tags:exeuser-Bitsight
Infos:

Detection

Credential Flusher
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Credential Flusher
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 7624 cmdline: "C:\Users\user\Desktop\file.exe" MD5: A4DA09A845D42F57982FF9177C819A39)
    • chrome.exe (PID: 7680 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
      • chrome.exe (PID: 7892 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=2112,i,10021536574544599090,10325126768946313152,262144 /prefetch:8 MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
      • chrome.exe (PID: 3088 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5236 --field-trial-handle=2112,i,10021536574544599090,10325126768946313152,262144 /prefetch:8 MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
      • chrome.exe (PID: 5372 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 --field-trial-handle=2112,i,10021536574544599090,10325126768946313152,262144 /prefetch:8 MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: file.exe PID: 7624JoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: file.exeReversingLabs: Detection: 15%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
    Source: file.exeJoe Sandbox ML: detected
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.7:49710 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.7:49712 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 4.175.87.197:443 -> 192.168.2.7:49729 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 4.175.87.197:443 -> 192.168.2.7:49754 version: TLS 1.2
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DCDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,1_2_00DCDBBE
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D9C2A2 FindFirstFileExW,1_2_00D9C2A2
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DD68EE FindFirstFileW,FindClose,1_2_00DD68EE
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DD698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,1_2_00DD698F
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DCD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_00DCD076
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DCD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_00DCD3A9
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DD9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00DD9642
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DD979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00DD979D
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DD9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,1_2_00DD9B2B
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DD5C97 FindFirstFileW,FindNextFileW,FindClose,1_2_00DD5C97
    Source: global trafficTCP traffic: 192.168.2.7:50148 -> 1.1.1.1:53
    Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
    Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
    Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
    Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
    Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
    Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
    Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
    Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
    Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
    Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
    Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
    Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
    Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DDCE44 InternetReadFile,SetEvent,GetLastError,SetEvent,1_2_00DDCE44
    Source: global trafficHTTP traffic detected: GET /account?=https://accounts.google.com/v3/signin/challenge/pwd HTTP/1.1Host: youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CI62yQEIpLbJAQipncoBCNrwygEIkqHLAQiFoM0BCNy9zQEIucrNAQii0c0BCIrTzQEIpNbNAQj01s0BCKfYzQEI+cDUFRj1yc0BGOuNpRc=Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1Host: www.youtube.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CI62yQEIpLbJAQipncoBCNrwygEIkqHLAQiFoM0BCNy9zQEIucrNAQii0c0BCIrTzQEIpNbNAQj01s0BCKfYzQEI+cDUFRj1yc0BGOuNpRc=Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentsec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
    Source: global trafficHTTP traffic detected: GET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=-1188319909&timestamp=1727882727176 HTTP/1.1Host: accounts.youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-full-version: "117.0.5938.134"sec-ch-ua-arch: "x86"sec-ch-ua-platform: "Windows"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-model: ""sec-ch-ua-bitness: "64"sec-ch-ua-wow64: ?0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CI62yQEIpLbJAQipncoBCNrwygEIkqHLAQiFoM0BCNy9zQEIucrNAQii0c0BCIrTzQEIpNbNAQj01s0BCKfYzQEI+cDUFRj1yc0BGOuNpRc=Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: iframeReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=NX1ndAXlaDB8kh2&MD=FnRvyOlh HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
    Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: www.google.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"sec-ch-ua-full-version: "117.0.5938.134"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8X-Client-Data: CI62yQEIpLbJAQipncoBCNrwygEIkqHLAQiFoM0BCNy9zQEIucrNAQii0c0BCIrTzQEIpNbNAQj01s0BCKfYzQEI+cDUFRj1yc0BGOuNpRc=Sec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: NID=518=p8_JYpoq80MBa_4Y8n9TJNWeL8cn0YfQk4Ug1cSwXUGiLxZEnXZMTzxGyXVOJwavlaT25k5CNysNaS8JCybbWApI9aenuAZkAue2oT9S1bAogLtQ0X8qWnlNOKMDl3dmmEz9o74HwLiAKcRIpdKmns_xmf-pC-c_mR4N9WU2EJVejzCdaiI
    Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=NX1ndAXlaDB8kh2&MD=FnRvyOlh HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
    Source: chromecache_89.5.drString found in binary or memory: _.fq(p)+"/familylink/privacy/notice/embedded?langCountry="+_.fq(p);break;case "PuZJUb":a+="https://www.youtube.com/t/terms?chromeless=1&hl="+_.fq(m);break;case "fxTQxb":a+="https://youtube.com/t/terms?gl="+_.fq(_.oq(c))+"&hl="+_.fq(d)+"&override_hl=1"+(f?"&linkless=1":"");break;case "prAmvd":a+="https://www.google.com/intl/"+_.fq(m)+"/chromebook/termsofservice.html?languageCode="+_.fq(d)+"&regionCode="+_.fq(c);break;case "NfnTze":a+="https://policies.google.com/privacy/google-partners"+(f?"/embedded": equals www.youtube.com (Youtube)
    Source: global trafficDNS traffic detected: DNS query: youtube.com
    Source: global trafficDNS traffic detected: DNS query: www.youtube.com
    Source: global trafficDNS traffic detected: DNS query: www.google.com
    Source: global trafficDNS traffic detected: DNS query: accounts.youtube.com
    Source: global trafficDNS traffic detected: DNS query: play.google.com
    Source: unknownHTTP traffic detected: POST /log?format=json&hasfast=true&authuser=0 HTTP/1.1Host: play.google.comConnection: keep-aliveContent-Length: 519sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"Content-Type: application/x-www-form-urlencoded;charset=UTF-8sec-ch-ua-full-version: "117.0.5938.134"sec-ch-ua-platform-version: "10.0.0"X-Goog-AuthUser: 0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: */*Origin: https://accounts.google.comX-Client-Data: CI62yQEIpLbJAQipncoBCNrwygEIkqHLAQiFoM0BCNy9zQEIucrNAQii0c0BCIrTzQEIpNbNAQj01s0BCKfYzQEI+cDUFRj1yc0BGOuNpRc=Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: chromecache_84.5.drString found in binary or memory: https://accounts.google.com
    Source: chromecache_84.5.drString found in binary or memory: https://accounts.google.com/TOS?loc=
    Source: file.exe, 00000001.00000002.1344143560.0000000000F38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/challenge/pwd
    Source: chromecache_82.5.drString found in binary or memory: https://apis.google.com/js/api.js
    Source: chromecache_84.5.drString found in binary or memory: https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage
    Source: chromecache_89.5.drString found in binary or memory: https://families.google.com/intl/
    Source: chromecache_82.5.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/drive_2020q4/v10/192px.svg
    Source: chromecache_82.5.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/gmail_2020q4/v10/web-48dp/logo_gmail_2020q4_color_2x_web_
    Source: chromecache_82.5.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/maps/v7/192px.svg
    Source: chromecache_84.5.drString found in binary or memory: https://g.co/recover
    Source: chromecache_89.5.drString found in binary or memory: https://play.google.com/log?format=json&hasfast=true
    Source: chromecache_84.5.drString found in binary or memory: https://play.google.com/work/enroll?identifier=
    Source: chromecache_89.5.drString found in binary or memory: https://play.google/intl/
    Source: chromecache_89.5.drString found in binary or memory: https://policies.google.com/privacy
    Source: chromecache_89.5.drString found in binary or memory: https://policies.google.com/privacy/additional
    Source: chromecache_89.5.drString found in binary or memory: https://policies.google.com/privacy/google-partners
    Source: chromecache_89.5.drString found in binary or memory: https://policies.google.com/technologies/cookies
    Source: chromecache_89.5.drString found in binary or memory: https://policies.google.com/technologies/location-data
    Source: chromecache_89.5.drString found in binary or memory: https://policies.google.com/terms
    Source: chromecache_89.5.drString found in binary or memory: https://policies.google.com/terms/location
    Source: chromecache_89.5.drString found in binary or memory: https://policies.google.com/terms/service-specific
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-email-pin.gif
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-password.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-or-voice-pin.gif
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-pin.gif
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-stop-go-landing-page_1x.png
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/animation/
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_device.png
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_pin.png
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync.png
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_1x.png
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_2x.png
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_darkmode_1x.png
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/continue_on_your_phone.png
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_phone_number_verification.png
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_silent_tap_yes_darkmode.gif
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes.gif
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes_darkmode.gif
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_dark_v2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_v2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_not_ready.png
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_1.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_dark_1.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_1.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_darkmode_1.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_1.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_darkmode_1.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_created.png
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_full_house.png
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_1.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_darkmode_1.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_1.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_darkmode_1.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_1.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_darkmode_1.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_stop.png
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/personalization_reminders.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/phone_number_sign_in_2x.png
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key.gif
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_ios_center.png
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_laptop.gif
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered.gif
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered_darkmode.gif
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_phone.gif
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_ios.gif
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_pulldown.gif
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_tapyes.gif
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/smart_lock_2x.png
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/usb_key.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/web_and_app_activity.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/who_will_be_using_this_device.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/you_tube_history.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/gmail_ios_authzen.gif
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/paaskey.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_light.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/screenlock.png
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_ipad.gif
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone.gif
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_nfc.gif
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_usb.gif
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_phone.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_keys.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/loading_spinner_gm.gif
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/progress_spinner_color_20dp_4x.gif
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/success-gm-default_2x.png
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/apps/signup/resources/custom-email-address.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/images/hpp/shield_security_checkup_green_2x_web_96dp.png
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_dark_1.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_v1.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_dark_v1.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_v1.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_dark_v1.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_v1.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_confirmation.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_0.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_dark_0.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_dark_2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_dark_2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_dark_2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_dark_2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_dark_3.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_1.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_dark_1.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_1.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_dark_1.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_dark_2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_1.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_dark_1.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_dark_2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_dark_v2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_v2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set_darkmode.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_v2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_dark_v2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_v2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space.png
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space_dark.png
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2_dark.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess.svg
    Source: chromecache_82.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess_dark.svg
    Source: chromecache_84.5.drString found in binary or memory: https://support.google.com/accounts?hl=
    Source: chromecache_89.5.drString found in binary or memory: https://support.google.com/accounts?p=new-si-ui
    Source: chromecache_84.5.drString found in binary or memory: https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072
    Source: chromecache_82.5.drString found in binary or memory: https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=
    Source: chromecache_84.5.drString found in binary or memory: https://www.google.com
    Source: chromecache_89.5.drString found in binary or memory: https://www.google.com/intl/
    Source: chromecache_82.5.drString found in binary or memory: https://www.gstatic.com/accounts/speedbump/authzen_optin_illustration.gif
    Source: chromecache_82.5.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/chrome_48dp.png
    Source: chromecache_82.5.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/googleg_48dp.png
    Source: chromecache_82.5.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/gsa_48dp.png
    Source: chromecache_82.5.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/play_prism_48dp.png
    Source: chromecache_82.5.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/youtube_48dp.png
    Source: chromecache_89.5.drString found in binary or memory: https://www.gstatic.com/images/branding/productlogos/googleg/v6/36px.svg
    Source: chromecache_89.5.drString found in binary or memory: https://www.youtube.com/t/terms?chromeless=1&hl=
    Source: file.exe, 00000001.00000003.1342478563.0000000000F67000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1343006979.0000000000F6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/acc.
    Source: file.exe, 00000001.00000003.1318718822.0000000000D24000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1342478563.0000000000F67000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1343006979.0000000000F6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
    Source: chromecache_89.5.drString found in binary or memory: https://youtube.com/t/terms?gl=
    Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
    Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
    Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
    Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
    Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
    Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
    Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
    Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
    Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
    Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.7:49710 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.7:49712 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 4.175.87.197:443 -> 192.168.2.7:49729 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 4.175.87.197:443 -> 192.168.2.7:49754 version: TLS 1.2
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DDEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,1_2_00DDEAFF
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DDED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,1_2_00DDED6A
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DDEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,1_2_00DDEAFF
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DCAA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,1_2_00DCAA57
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DF9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,1_2_00DF9576

    System Summary

    barindex
    Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
    Source: file.exe, 00000001.00000000.1316435270.0000000000E22000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_daf72802-d
    Source: file.exe, 00000001.00000000.1316435270.0000000000E22000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_170f8a2d-b
    Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_c7031a45-0
    Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_78e4e3da-2
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DCD5EB: CreateFileW,DeviceIoControl,CloseHandle,1_2_00DCD5EB
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DC1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,1_2_00DC1201
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DCE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,1_2_00DCE8F6
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D6BF401_2_00D6BF40
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DD20461_2_00DD2046
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D680601_2_00D68060
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DC82981_2_00DC8298
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D9E4FF1_2_00D9E4FF
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D9676B1_2_00D9676B
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DF48731_2_00DF4873
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D6CAF01_2_00D6CAF0
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D8CAA01_2_00D8CAA0
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D7CC391_2_00D7CC39
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D96DD91_2_00D96DD9
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D691C01_2_00D691C0
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D7B1191_2_00D7B119
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D813941_2_00D81394
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D817061_2_00D81706
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D8781B1_2_00D8781B
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D819B01_2_00D819B0
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D7997D1_2_00D7997D
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D679201_2_00D67920
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D87A4A1_2_00D87A4A
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D87CA71_2_00D87CA7
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D81C771_2_00D81C77
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D99EEE1_2_00D99EEE
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DEBE441_2_00DEBE44
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D81F321_2_00D81F32
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 00D7F9F2 appears 40 times
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 00D80A30 appears 46 times
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 00D69CB3 appears 31 times
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: classification engineClassification label: mal72.troj.evad.winEXE@33/32@12/6
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DD37B5 GetLastError,FormatMessageW,1_2_00DD37B5
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DC10BF AdjustTokenPrivileges,CloseHandle,1_2_00DC10BF
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DC16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,1_2_00DC16C3
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DD51CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,1_2_00DD51CD
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DCD4DC CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,1_2_00DCD4DC
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DD648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,1_2_00DD648E
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D642A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,1_2_00D642A2
    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: file.exeReversingLabs: Detection: 15%
    Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=2112,i,10021536574544599090,10325126768946313152,262144 /prefetch:8
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5236 --field-trial-handle=2112,i,10021536574544599090,10325126768946313152,262144 /prefetch:8
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 --field-trial-handle=2112,i,10021536574544599090,10325126768946313152,262144 /prefetch:8
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobarsJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=2112,i,10021536574544599090,10325126768946313152,262144 /prefetch:8Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5236 --field-trial-handle=2112,i,10021536574544599090,10325126768946313152,262144 /prefetch:8Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 --field-trial-handle=2112,i,10021536574544599090,10325126768946313152,262144 /prefetch:8Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D642DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_00D642DE
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D80A76 push ecx; ret 1_2_00D80A89
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D7F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,1_2_00D7F98E
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DF1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,1_2_00DF1C41
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_1-97389
    Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.4 %
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DCDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,1_2_00DCDBBE
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D9C2A2 FindFirstFileExW,1_2_00D9C2A2
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DD68EE FindFirstFileW,FindClose,1_2_00DD68EE
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DD698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,1_2_00DD698F
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DCD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_00DCD076
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DCD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_00DCD3A9
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DD9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00DD9642
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DD979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00DD979D
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DD9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,1_2_00DD9B2B
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DD5C97 FindFirstFileW,FindNextFileW,FindClose,1_2_00DD5C97
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D642DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_00D642DE
    Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DDEAA2 BlockInput,1_2_00DDEAA2
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D92622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00D92622
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D642DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_00D642DE
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D84CE8 mov eax, dword ptr fs:[00000030h]1_2_00D84CE8
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DC0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,1_2_00DC0B62
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D92622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00D92622
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D8083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00D8083F
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D809D5 SetUnhandledExceptionFilter,1_2_00D809D5
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D80C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00D80C21
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DC1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,1_2_00DC1201
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DA2BA5 KiUserCallbackDispatcher,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,1_2_00DA2BA5
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DCB226 SendInput,keybd_event,1_2_00DCB226
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DE22DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,1_2_00DE22DA
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DC0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,1_2_00DC0B62
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DC1663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,1_2_00DC1663
    Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
    Source: file.exeBinary or memory string: Shell_TrayWnd
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D80698 cpuid 1_2_00D80698
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DD8195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,1_2_00DD8195
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DBD27A GetUserNameW,1_2_00DBD27A
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D9B952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,1_2_00D9B952
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00D642DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_00D642DE

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 7624, type: MEMORYSTR
    Source: file.exeBinary or memory string: WIN_81
    Source: file.exeBinary or memory string: WIN_XP
    Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
    Source: file.exeBinary or memory string: WIN_XPe
    Source: file.exeBinary or memory string: WIN_VISTA
    Source: file.exeBinary or memory string: WIN_7
    Source: file.exeBinary or memory string: WIN_8

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 7624, type: MEMORYSTR
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DE1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,1_2_00DE1204
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00DE1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,1_2_00DE1806
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire Infrastructure2
    Valid Accounts
    1
    Native API
    1
    DLL Side-Loading
    1
    Exploitation for Privilege Escalation
    1
    Disable or Modify Tools
    21
    Input Capture
    2
    System Time Discovery
    Remote Services1
    Archive Collected Data
    2
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault AccountsScheduled Task/Job2
    Valid Accounts
    1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    LSASS Memory1
    Account Discovery
    Remote Desktop Protocol21
    Input Capture
    11
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
    Valid Accounts
    2
    Obfuscated Files or Information
    Security Account Manager1
    File and Directory Discovery
    SMB/Windows Admin Shares3
    Clipboard Data
    3
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
    Access Token Manipulation
    1
    DLL Side-Loading
    NTDS15
    System Information Discovery
    Distributed Component Object ModelInput Capture4
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
    Process Injection
    2
    Valid Accounts
    LSA Secrets12
    Security Software Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    Virtualization/Sandbox Evasion
    Cached Domain Credentials1
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
    Access Token Manipulation
    DCSync3
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
    Process Injection
    Proc Filesystem1
    Application Window Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
    System Owner/User Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    file.exe16%ReversingLabs
    file.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://play.google/intl/0%URL Reputationsafe
    https://families.google.com/intl/0%URL Reputationsafe
    https://policies.google.com/technologies/location-data0%URL Reputationsafe
    https://apis.google.com/js/api.js0%URL Reputationsafe
    https://policies.google.com/privacy/google-partners0%URL Reputationsafe
    https://policies.google.com/terms/service-specific0%URL Reputationsafe
    https://g.co/recover0%URL Reputationsafe
    https://policies.google.com/privacy/additional0%URL Reputationsafe
    https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=32850720%URL Reputationsafe
    https://policies.google.com/technologies/cookies0%URL Reputationsafe
    https://policies.google.com/terms0%URL Reputationsafe
    https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=0%URL Reputationsafe
    https://support.google.com/accounts?hl=0%URL Reputationsafe
    https://policies.google.com/terms/location0%URL Reputationsafe
    https://policies.google.com/privacy0%URL Reputationsafe
    https://support.google.com/accounts?p=new-si-ui0%URL Reputationsafe
    https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage0%URL Reputationsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    youtube-ui.l.google.com
    142.250.184.238
    truefalse
      unknown
      www3.l.google.com
      216.58.206.46
      truefalse
        unknown
        play.google.com
        216.58.206.46
        truefalse
          unknown
          www.google.com
          142.250.184.196
          truefalse
            unknown
            youtube.com
            142.250.185.142
            truefalse
              unknown
              accounts.youtube.com
              unknown
              unknownfalse
                unknown
                www.youtube.com
                unknown
                unknownfalse
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://play.google.com/log?format=json&hasfast=true&authuser=0false
                    unknown
                    https://www.google.com/favicon.icofalse
                      unknown
                      https://play.google.com/log?hasfast=true&authuser=0&format=jsonfalse
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://play.google/intl/chromecache_89.5.drfalse
                        • URL Reputation: safe
                        unknown
                        https://families.google.com/intl/chromecache_89.5.drfalse
                        • URL Reputation: safe
                        unknown
                        https://youtube.com/t/terms?gl=chromecache_89.5.drfalse
                          unknown
                          https://policies.google.com/technologies/location-datachromecache_89.5.drfalse
                          • URL Reputation: safe
                          unknown
                          https://www.google.com/intl/chromecache_89.5.drfalse
                            unknown
                            https://apis.google.com/js/api.jschromecache_82.5.drfalse
                            • URL Reputation: safe
                            unknown
                            https://policies.google.com/privacy/google-partnerschromecache_89.5.drfalse
                            • URL Reputation: safe
                            unknown
                            https://play.google.com/work/enroll?identifier=chromecache_84.5.drfalse
                              unknown
                              https://policies.google.com/terms/service-specificchromecache_89.5.drfalse
                              • URL Reputation: safe
                              unknown
                              https://g.co/recoverchromecache_84.5.drfalse
                              • URL Reputation: safe
                              unknown
                              https://policies.google.com/privacy/additionalchromecache_89.5.drfalse
                              • URL Reputation: safe
                              unknown
                              https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072chromecache_84.5.drfalse
                              • URL Reputation: safe
                              unknown
                              https://policies.google.com/technologies/cookieschromecache_89.5.drfalse
                              • URL Reputation: safe
                              unknown
                              https://policies.google.com/termschromecache_89.5.drfalse
                              • URL Reputation: safe
                              unknown
                              https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=chromecache_82.5.drfalse
                              • URL Reputation: safe
                              unknown
                              https://www.google.comchromecache_84.5.drfalse
                                unknown
                                https://play.google.com/log?format=json&hasfast=truechromecache_89.5.drfalse
                                  unknown
                                  https://www.youtube.com/t/terms?chromeless=1&hl=chromecache_89.5.drfalse
                                    unknown
                                    https://support.google.com/accounts?hl=chromecache_84.5.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://policies.google.com/terms/locationchromecache_89.5.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://youtube.com/acc.file.exe, 00000001.00000003.1342478563.0000000000F67000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1343006979.0000000000F6A000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      https://policies.google.com/privacychromecache_89.5.drfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://support.google.com/accounts?p=new-si-uichromecache_89.5.drfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessagechromecache_84.5.drfalse
                                      • URL Reputation: safe
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      142.250.184.196
                                      www.google.comUnited States
                                      15169GOOGLEUSfalse
                                      216.58.206.46
                                      www3.l.google.comUnited States
                                      15169GOOGLEUSfalse
                                      239.255.255.250
                                      unknownReserved
                                      unknownunknownfalse
                                      142.250.185.142
                                      youtube.comUnited States
                                      15169GOOGLEUSfalse
                                      142.250.184.238
                                      youtube-ui.l.google.comUnited States
                                      15169GOOGLEUSfalse
                                      IP
                                      192.168.2.7
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1524249
                                      Start date and time:2024-10-02 17:24:11 +02:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 5m 1s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:13
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:file.exe
                                      Detection:MAL
                                      Classification:mal72.troj.evad.winEXE@33/32@12/6
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:
                                      • Successful, ratio: 96%
                                      • Number of executed functions: 39
                                      • Number of non-executed functions: 312
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                      • Excluded IPs from analysis (whitelisted): 216.58.206.35, 142.250.181.238, 66.102.1.84, 34.104.35.123, 142.250.186.99, 142.250.185.67, 142.250.184.234, 142.250.186.106, 142.250.186.42, 172.217.16.202, 142.250.185.202, 142.250.185.170, 142.250.185.234, 142.250.185.138, 216.58.206.42, 172.217.18.10, 142.250.181.234, 142.250.184.202, 142.250.185.106, 142.250.186.170, 216.58.212.170, 142.250.185.74, 172.217.16.138, 142.250.74.202, 93.184.221.240, 142.250.186.35, 74.125.206.84, 142.250.186.174
                                      • Excluded domains from analysis (whitelisted): clients1.google.com, fs.microsoft.com, accounts.google.com, content-autofill.googleapis.com, slscr.update.microsoft.com, fonts.gstatic.com, ctldl.windowsupdate.com, clientservices.googleapis.com, time.windows.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, update.googleapis.com, clients.l.google.com, www.gstatic.com, optimizationguide-pa.googleapis.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                      • VT rate limit hit for: file.exe
                                      No simulations
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      239.255.255.250file.exeGet hashmaliciousCredential FlusherBrowse
                                        https://tqaun.us12.list-manage.com/track/click?u=fb0a5f04fa3c936488ff652c3&id=d22699c399&e=ce0a629e2eGet hashmaliciousHTMLPhisherBrowse
                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                              http://view.flodesk.com/emails/66fd2053af85c99dd55d1461Get hashmaliciousUnknownBrowse
                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                  https://546546546.pages.dev/qweqr?msharing=service@jpplus.comGet hashmaliciousHTMLPhisherBrowse
                                                    file.exeGet hashmaliciousUnknownBrowse
                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                        https://svsjie.us9.list-manage.com/track/click?u=65baddd8dc4a29452f1a28eb2&id=dde4f4d149&e=6d04ecfe32Get hashmaliciousUnknownBrowse
                                                          No context
                                                          No context
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          28a2c9bd18a11de089ef85a160da29e4New_Statement-8723107.jsGet hashmaliciousUnknownBrowse
                                                          • 4.175.87.197
                                                          • 184.28.90.27
                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                          • 4.175.87.197
                                                          • 184.28.90.27
                                                          https://tqaun.us12.list-manage.com/track/click?u=fb0a5f04fa3c936488ff652c3&id=d22699c399&e=ce0a629e2eGet hashmaliciousHTMLPhisherBrowse
                                                          • 4.175.87.197
                                                          • 184.28.90.27
                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                          • 4.175.87.197
                                                          • 184.28.90.27
                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                          • 4.175.87.197
                                                          • 184.28.90.27
                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                          • 4.175.87.197
                                                          • 184.28.90.27
                                                          file.exeGet hashmaliciousUnknownBrowse
                                                          • 4.175.87.197
                                                          • 184.28.90.27
                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                          • 4.175.87.197
                                                          • 184.28.90.27
                                                          https://svsjie.us9.list-manage.com/track/click?u=65baddd8dc4a29452f1a28eb2&id=dde4f4d149&e=6d04ecfe32Get hashmaliciousUnknownBrowse
                                                          • 4.175.87.197
                                                          • 184.28.90.27
                                                          test.exeGet hashmaliciousBabadedaBrowse
                                                          • 4.175.87.197
                                                          • 184.28.90.27
                                                          No context
                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          File Type:ASCII text, with very long lines (755)
                                                          Category:downloaded
                                                          Size (bytes):1416
                                                          Entropy (8bit):5.275155058463166
                                                          Encrypted:false
                                                          SSDEEP:24:kMYD7hqCsNRxoYTY9/qoVk7hz1l2p6vDMW94uEQOeGbCx4VGbgCSFBV87O/BprGJ:o7hv6oy12kvwKEeGbC6GbHSh/Hrw
                                                          MD5:4DB6842CDFAC9E03D7C1CF87E398B357
                                                          SHA1:08158AB8F5947E048C88A1289E9E8CE9641B7CE9
                                                          SHA-256:8991D23B586608AE114E150355FF192B30A379EAB1DC3F1444109DDC52B13AC1
                                                          SHA-512:FB7C461DFB96B10E099C3BA41C45AA904BB7D473EF0D44BD6A2E841BC44336DD5F1C9B73919B79A6BF4AA13B806E742F2003A16528E995374E210BB4C3E96EFA
                                                          Malicious:false
                                                          Reputation:low
                                                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=5IFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZfAoz,ZwDk9d,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlEr6KOaFsGvhdDsnkaRQWWkVkg2lQ/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=P6sQOc"
                                                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("P6sQOc");.var $Za=!!(_.Kh[1]&16);var b_a=function(a,b,c,d,e){this.ea=a;this.wa=b;this.ka=c;this.Ca=d;this.Ga=e;this.aa=0;this.da=a_a(this)},c_a=function(a){var b={};_.La(a.yS(),function(e){b[e]=!0});var c=a.pS(),d=a.tS();return new b_a(a.qP(),c.aa()*1E3,a.WR(),d.aa()*1E3,b)},a_a=function(a){return Math.random()*Math.min(a.wa*Math.pow(a.ka,a.aa),a.Ca)},OG=function(a,b){return a.aa>=a.ea?!1:b!=null?!!a.Ga[b]:!0};var PG=function(a){_.W.call(this,a.Fa);this.da=a.Ea.EV;this.ea=a.Ea.metadata;a=a.Ea.Xga;this.fetch=a.fetch.bind(a)};_.J(PG,_.W);PG.Ba=function(){return{Ea:{EV:_.YZa,metadata:_.VZa,Xga:_.OZa}}};PG.prototype.aa=function(a,b){if(this.ea.getType(a.Od())!==1)return _.Sm(a);var c=this.da.eV;return(c=c?c_a(c):null)&&OG(c)?_.wya(a,d_a(this,a,b,c)):_.Sm(a)};.var d_a=function(a,b,c,d){return c.then(function(e){return e},function(e){if($Za)if(e instanceof _.lf){if(!e.status||
                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          File Type:ASCII text, with very long lines (395)
                                                          Category:downloaded
                                                          Size (bytes):1652
                                                          Entropy (8bit):5.269909938363071
                                                          Encrypted:false
                                                          SSDEEP:48:o72ZrNZDuZW4yNAbU+15fMxIdf5WENoBCbw7DbG2bEJrw:oyRuZMNAY+1i4HoBNG2Ilw
                                                          MD5:63E5B24335CCDC457DD0B69AD1891CF9
                                                          SHA1:8DD3AED0737BEDBEE133BA564D3CA43579A138F7
                                                          SHA-256:FB72BE79F85659D5AF831FD644C4702EA5BFC6E6A90CDB156DE0816B179278C0
                                                          SHA-512:EC3A143FED571A7FC490433F11DDBD66752E42F0BAC476F79F9B8310DB0419CAE2B8CD65F1283D590F5979F4CC1FB8B2610F106BF38E0B93F384201B8BF5E5DA
                                                          Malicious:false
                                                          Reputation:low
                                                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=5IFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlEr6KOaFsGvhdDsnkaRQWWkVkg2lQ/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=xUdipf,OTA3Ae,A1yn5d,fKUV3e,aurFic,Ug7Xab,NwH0H,OmgaI,gychg,w9hDv,EEDORb,Mlhmy,ZfAoz,kWgXee,ovKuLd,yDVVkb,ebZ3mb,ZDZcre,A7fCU"
                                                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("w9hDv");._.vg(_.Hla);_.eA=function(a){_.W.call(this,a.Fa);this.aa=a.Xa.cache};_.J(_.eA,_.W);_.eA.Ba=function(){return{Xa:{cache:_.dt}}};_.eA.prototype.execute=function(a){_.Bb(a,function(b){var c;_.$e(b)&&(c=b.eb.kc(b.kb));c&&this.aa.xG(c)},this);return{}};_.nu(_.Nla,_.eA);._.l();._.k("lOO0Vd");._.VZa=new _.pf(_.Am);._.l();._.k("ZDZcre");.var fH=function(a){_.W.call(this,a.Fa);this.Wl=a.Ea.Wl;this.d4=a.Ea.metadata;this.aa=a.Ea.ot};_.J(fH,_.W);fH.Ba=function(){return{Ea:{Wl:_.KG,metadata:_.VZa,ot:_.HG}}};fH.prototype.execute=function(a){var b=this;a=this.aa.create(a);return _.Bb(a,function(c){var d=b.d4.getType(c.Od())===2?b.Wl.Rb(c):b.Wl.fetch(c);return _.yl(c,_.LG)?d.then(function(e){return _.Dd(e)}):d},this)};_.nu(_.Sla,fH);._.l();._.k("K5nYTd");._.UZa=new _.pf(_.Ola);._.l();._.k("sP4Vbe");.._.l();._.k("kMFpHd");.._.l();._.k("A7fCU");.var NG=function(a){_.W.call(this,a
                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          File Type:MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                                                          Category:downloaded
                                                          Size (bytes):5430
                                                          Entropy (8bit):3.6534652184263736
                                                          Encrypted:false
                                                          SSDEEP:48:wIJct3xIAxG/7nvWDtZcdYLtX7B6QXL3aqG8Q:wIJct+A47v+rcqlBPG9B
                                                          MD5:F3418A443E7D841097C714D69EC4BCB8
                                                          SHA1:49263695F6B0CDD72F45CF1B775E660FDC36C606
                                                          SHA-256:6DA5620880159634213E197FAFCA1DDE0272153BE3E4590818533FAB8D040770
                                                          SHA-512:82D017C4B7EC8E0C46E8B75DA0CA6A52FD8BCE7FCF4E556CBDF16B49FC81BE9953FE7E25A05F63ECD41C7272E8BB0A9FD9AEDF0AC06CB6032330B096B3702563
                                                          Malicious:false
                                                          Reputation:high, very likely benign file
                                                          URL:https://www.google.com/favicon.ico
                                                          Preview:............ .h...&... .... .........(....... ..... ............................................0...................................................................................................................................v.].X.:.X.:.r.Y........................................q.X.S.4.S.4.S.4.S.4.S.4.S.4...X....................0........q.W.S.4.X.:.................J...A...g.........................K.H.V.8..........................F..B.....................,.......................................B..............................................B..B..B..B..B...u..........................................B..B..B..B..B...{.................5.......k...........................................................7R..8F.................................................2........Vb..5C..;I..................R^.....................0................Xc..5C..5C..5C..5C..5C..5C..lv..........................................]i..<J..:G..Zf....................................................
                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          File Type:ASCII text, with very long lines (570)
                                                          Category:downloaded
                                                          Size (bytes):3467
                                                          Entropy (8bit):5.514745431912774
                                                          Encrypted:false
                                                          SSDEEP:96:ozbld2fNUmeqJNizhNtt1W8t//loyIpXmdVE2w:onSKE8PWe/Cy4X3j
                                                          MD5:8DEF399E8355ABC23E64505281005099
                                                          SHA1:24FF74C3AEFD7696D84FF148465DF4B1B60B1696
                                                          SHA-256:F128D7218E1286B05DF11310AD3C8F4CF781402698E45448850D2A3A22F5F185
                                                          SHA-512:33721DD47658D8E12ADF6BD9E9316EB89F5B6297927F7FD60F954E04B829DCBF0E1AE6DDD9A3401F45E0011AE4B1397B960C218238A3D0F633A2173D8E604082
                                                          Malicious:false
                                                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=5IFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZfAoz,ZwDk9d,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,iAskyc,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,wg1P6b,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlEr6KOaFsGvhdDsnkaRQWWkVkg2lQ/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=Wt6vjf,hhhU8,FCpbqb,WhJNk"
                                                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("Wt6vjf");.var cya=function(){var a=_.He();return _.Lj(a,1)},Yt=function(a){this.Da=_.t(a,0,Yt.messageId)};_.J(Yt,_.w);Yt.prototype.Ha=function(){return _.Dj(this,1)};Yt.prototype.Va=function(a){return _.Vj(this,1,a)};Yt.messageId="f.bo";var Zt=function(){_.hm.call(this)};_.J(Zt,_.hm);Zt.prototype.xd=function(){this.CT=!1;dya(this);_.hm.prototype.xd.call(this)};Zt.prototype.aa=function(){eya(this);if(this.wC)return fya(this),!1;if(!this.KV)return $t(this),!0;this.dispatchEvent("p");if(!this.zP)return $t(this),!0;this.wM?(this.dispatchEvent("r"),$t(this)):fya(this);return!1};.var gya=function(a){var b=new _.ap(a.W4);a.qQ!=null&&_.Jn(b,"authuser",a.qQ);return b},fya=function(a){a.wC=!0;var b=gya(a),c="rt=r&f_uid="+_.pk(a.zP);_.cn(b,(0,_.bg)(a.ea,a),"POST",c)};.Zt.prototype.ea=function(a){a=a.target;eya(this);if(_.fn(a)){this.cK=0;if(this.wM)this.wC=!1,this.dispatchEvent("r"
                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          File Type:Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
                                                          Category:downloaded
                                                          Size (bytes):52280
                                                          Entropy (8bit):7.995413196679271
                                                          Encrypted:true
                                                          SSDEEP:1536:1rvqtK8DZilXxwJ8mMwAZy7phqsFLdG3B4d:xytBZits8bw4wzbFxG3B4d
                                                          MD5:F61F0D4D0F968D5BBA39A84C76277E1A
                                                          SHA1:AA3693EA140ECA418B4B2A30F6A68F6F43B4BEB2
                                                          SHA-256:57147F08949ABABE7DEEF611435AE418475A693E3823769A25C2A39B6EAD9CCC
                                                          SHA-512:6C3BD90F709BCF9151C9ED9FFEA55C4F6883E7FDA2A4E26BF018C83FE1CFBE4F4AA0DB080D6D024070D53B2257472C399C8AC44EEFD38B9445640EFA85D5C487
                                                          Malicious:false
                                                          URL:https://fonts.gstatic.com/s/googlesans/v58/4UaRrENHsxJlGDuGo1OIlJfC6l_24rlCK1Yo_Iq2vgCI.woff2
                                                          Preview:wOF2.......8.....................................^...$..4?HVAR..?MVAR9.`?STAT.*',..J/.......`..(..Z.0..R.6.$.... .....K..[..q..c..T.....>.P.j.`.w..#...%......N.".....$..3.0.6......... .L.rX/r[j.y.|*(.4.%#.....2.v.m..-..%.....;-.Y.{..&..O=#l@...k..7g..ZI...#.Z./+T..r7...M..3).Z%.x....s..sL..[A!.5*1w'/.8V..2Z..%.X.h.o.).]..9..Q`.$.....7..kZ.~O........d..g.n.d.Rw+&....Cz..uy#..fz,(.J....v.%..`..9.....h...?O..:...c%.....6s....xl..#...5..._......1.>.)"U.4 W....?%......6//!$...!.n9C@n...........!""^.....W..Z<.7.x.."UT.T....E.."R>.R..t.....H d..e_.K../.+8.Q.P.ZQ....;...U....]......._.e*......71.?.7.ORv.?...l...G|.P...|:...I.X..2.,.L........d.g.]}W#uW]QnuP-s.;.-Y.....].......C..j_.M0...y.......J..........NY..@A...,....-.F......'..w./j5g.vUS...U..0.&...y7.LP.....%.....Y......Y..D. e.A..G.?.$.......6...eaK.n5.m...N...,...+BCl..L> .E9~.b[.w.x....6<...}.e...%V....O.......*.?...a..#[eE.4..p..$...].....%......o._......N.._~..El....b..A.0.r8.....|..D.d..
                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          File Type:ASCII text, with very long lines (683)
                                                          Category:downloaded
                                                          Size (bytes):3131
                                                          Entropy (8bit):5.355381206612617
                                                          Encrypted:false
                                                          SSDEEP:48:o7FEEM3MtH15jNQ8jsK3rnw0dkckTrKEp/OqLE9xz0W5Bzv3M6hIHYA+JITbwrF8:oq675jOArwoAmI/DLaxNPL5m+m6w
                                                          MD5:E2A7251AD83A0D0634FEA2703D10ED07
                                                          SHA1:90D72011F31FC40D3DA3748F2817F90A29EB5C01
                                                          SHA-256:1079B49C4AAF5C10E4F2E6A086623F40D200A71FF2A1F64E88AA6C91E4BE7A6F
                                                          SHA-512:CD6D75580EA8BD97CF7C7C0E0BD9D9A54FB6EA7DF1DDB5A95E94D38B260F9EE1425C640839ECD229B8D01E145CF2786CA374D31EC537EB8FE17FF415D5B985F5
                                                          Malicious:false
                                                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=5IFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,PHUIyb,PrPYRd,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZfAoz,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlEr6KOaFsGvhdDsnkaRQWWkVkg2lQ/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ZwDk9d,RMhBfe"
                                                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("ZwDk9d");.var gA=function(a){_.W.call(this,a.Fa)};_.J(gA,_.W);gA.Ba=_.W.Ba;gA.prototype.eS=function(a){return _.Xe(this,{Xa:{gT:_.ll}}).then(function(b){var c=window._wjdd,d=window._wjdc;return!c&&d?new _.li(function(e){window._wjdc=function(f){d(f);e(ZJa(f,b,a))}}):ZJa(c,b,a)})};var ZJa=function(a,b,c){return(a=a&&a[c])?a:b.Xa.gT.eS(c)};.gA.prototype.aa=function(a,b){var c=_.Zra(b).Rj;if(c.startsWith("$")){var d=_.gm.get(a);_.uq[b]&&(d||(d={},_.gm.set(a,d)),d[c]=_.uq[b],delete _.uq[b],_.vq--);if(d)if(a=d[c])b=_.af(a);else throw Error("Jb`"+b);else b=null}else b=null;return b};_.nu(_.Lfa,gA);._.l();._.k("SNUn3");._.YJa=new _.pf(_.wg);._.l();._.k("RMhBfe");.var $Ja=function(a){var b=_.tq(a);return b?new _.li(function(c,d){var e=function(){b=_.tq(a);var f=_.Sfa(a,b);f?c(f.getAttribute("jsdata")):window.document.readyState=="complete"?(f=["Unable to find deferred jsdata wit
                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          File Type:ASCII text, with very long lines (468)
                                                          Category:downloaded
                                                          Size (bytes):1858
                                                          Entropy (8bit):5.298162049824456
                                                          Encrypted:false
                                                          SSDEEP:48:o7vGoolL3ALFKphnpiu7xOKAcfO/3d/rYh4vZorw:o/QLUFUL4KA+2y0Mw
                                                          MD5:CE055F881BDAB4EF6C1C8AA4B3890348
                                                          SHA1:2671741A70E9F5B608F690AAEEA4972003747654
                                                          SHA-256:9B91C23691D6032CDFE28863E369624B2EDB033E1487A1D1BB0977E3590E5462
                                                          SHA-512:8A22250628985C2E570E6FBADFC0D5CB6753F0735130F9E74962A409476C2859C5C81F8A0F5C427A9F13ED399C8E251FA43FF67AD5F16860640D45E7A538E857
                                                          Malicious:false
                                                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=5IFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZfAoz,ZwDk9d,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlEr6KOaFsGvhdDsnkaRQWWkVkg2lQ/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=iAskyc,ziXSP"
                                                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("iAskyc");._.QZ=function(a){_.W.call(this,a.Fa);this.window=a.Ea.window.get();this.Nc=a.Ea.Nc};_.J(_.QZ,_.W);_.QZ.Ba=function(){return{Ea:{window:_.qu,Nc:_.DE}}};_.QZ.prototype.Po=function(){};_.QZ.prototype.addEncryptionRecoveryMethod=function(){};_.RZ=function(a){return(a==null?void 0:a.Jo)||function(){}};_.SZ=function(a){return(a==null?void 0:a.m3)||function(){}};_.GPb=function(a){return(a==null?void 0:a.Op)||function(){}};._.HPb=function(a){return new Map(Array.from(a,function(b){var c=_.n(b);b=c.next().value;c=c.next().value;return[b,c.map(function(d){return{epoch:d.epoch,key:new Uint8Array(d.key)}})]}))};_.IPb=function(a){setTimeout(function(){throw a;},0)};_.QZ.prototype.kO=function(){return!0};_.nu(_.An,_.QZ);._.l();._.k("ziXSP");.var j_=function(a){_.QZ.call(this,a.Fa)};_.J(j_,_.QZ);j_.Ba=_.QZ.Ba;j_.prototype.Po=function(a,b,c){var d;if((d=this.window.chrome)==nu
                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          File Type:ASCII text, with very long lines (553)
                                                          Category:downloaded
                                                          Size (bytes):743936
                                                          Entropy (8bit):5.791085889652278
                                                          Encrypted:false
                                                          SSDEEP:6144:aVXWBQkPdzg5pTX1ROv/duPzd8C3s891/N:7fd8j91/N
                                                          MD5:D20AA383CD31013B68BB10390CBE0230
                                                          SHA1:2DF35559BBA0B93FE305C4B828324E9F9EFA234D
                                                          SHA-256:9F91BD315E202B9EC035C25EFFCE646CEC9AB1E8599496198AA8BEC437CDD228
                                                          SHA-512:EA023EEB24C48A2F463E0CFC9107C6FCD76BBA9292ED49839AAF0AC7845DBD48AB4876376A6A7D4EE902B0649BFE5E0AC2960D954079A94BF2F64A5BC2CBCD9C
                                                          Malicious:false
                                                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/am=5IFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/excm=_b,_tp,identifierview/ed=1/dg=0/wt=2/ujg=1/rs=AOaEmlHJL2nU2EL_uUPBIEb5OQMKdqHGhg/m=_b,_tp"
                                                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._._F_toggles_initialize=function(a){(typeof globalThis!=="undefined"?globalThis:typeof self!=="undefined"?self:this)._F_toggles=a||[]};(0,_._F_toggles_initialize)([0x286081e4, 0x2046d860, 0x39e13c40, 0x14501e80, 0xe420, 0x0, 0x1a000000, 0x1d000003, 0xc, ]);./*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright Google LLC. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright 2024 Google, Inc. SPDX-License-Identifier: MIT.*/./*. SPDX-License-Identifier: Apache-2.0.*/./*. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/.var baa,daa,Ma,Sa,gaa,iaa,jb,qaa,waa,Caa,Haa,Kaa,Jb,Laa,Ob,Qb,Rb,Maa,Naa,Sb,Oaa,Paa,Qaa,Yb,Vaa,Xaa,ec,fc,gc,bba,cba,gba,jba,lba,mba,qba,tba,nba,sba,rba,pba,oba,uba,yba,Cba,Dba,Aba,Hc,Ic,Gba,Iba,Mba,Nba,Oba,Pba,Lba,Qba,Sba,dd,Uba,Vba,Xba,Zba,Yba,aca,bca,cca,dca,fca,eca,hca,ica,jca,kca,nca,
                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          File Type:ASCII text, with very long lines (1694)
                                                          Category:downloaded
                                                          Size (bytes):32500
                                                          Entropy (8bit):5.378903546681047
                                                          Encrypted:false
                                                          SSDEEP:768:zYlbuROstb0e39nKGrkysU0smpu4OLOdzIf1p/5GeSsngurz6aKEEEGo/:zYl61Cysbu4OLOdzIfrIen72ZFo/
                                                          MD5:BF4BF9728A7C302FBA5B14F3D0F1878B
                                                          SHA1:2607CA7A93710D629400077FF3602CB207E6F53D
                                                          SHA-256:8981E7B228DF7D6A8797C0CD1E9B0F1F88337D5F0E1C27A04E7A57D2C4309798
                                                          SHA-512:AC9E170FC3AFDC0CF6BB8E926B93EF129A5FAD1BBA51B60BABCF3555E9B652E98F86A00FB099879DED35DD3FFE72ECFA597E20E6CA8CF402BEDEC40F78412EDA
                                                          Malicious:false
                                                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=5IFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=_b,_tp/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlEr6KOaFsGvhdDsnkaRQWWkVkg2lQ/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=byfTOb,lsjVmc,LEikZe"
                                                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{.var Aua=function(a,b){this.da=a;this.ea=b;if(!c){var c=new _.ap("//www.google.com/images/cleardot.gif");_.op(c)}this.ka=c};_.h=Aua.prototype;_.h.Zc=null;_.h.lZ=1E4;_.h.bA=!1;_.h.nQ=0;_.h.zJ=null;_.h.bV=null;_.h.setTimeout=function(a){this.lZ=a};_.h.start=function(){if(this.bA)throw Error("dc");this.bA=!0;this.nQ=0;Bua(this)};_.h.stop=function(){Cua(this);this.bA=!1};.var Bua=function(a){a.nQ++;navigator!==null&&"onLine"in navigator&&!navigator.onLine?_.km((0,_.bg)(a.aH,a,!1),0):(a.aa=new Image,a.aa.onload=(0,_.bg)(a.Fja,a),a.aa.onerror=(0,_.bg)(a.Eja,a),a.aa.onabort=(0,_.bg)(a.Dja,a),a.zJ=_.km(a.Gja,a.lZ,a),a.aa.src=String(a.ka))};_.h=Aua.prototype;_.h.Fja=function(){this.aH(!0)};_.h.Eja=function(){this.aH(!1)};_.h.Dja=function(){this.aH(!1)};_.h.Gja=function(){this.aH(!1)};._.h.aH=function(a){Cua(this);a?(this.bA=!1,this.da.call(this.ea,!0)):this.nQ<=0?Bua(this):(this.bA=!1,
                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          File Type:ASCII text, with very long lines (2544)
                                                          Category:downloaded
                                                          Size (bytes):358799
                                                          Entropy (8bit):5.624587482410481
                                                          Encrypted:false
                                                          SSDEEP:6144:T/wM8RGYcBlKmhCxiDlnc0pYMSrBg5X3rU:TD8XxEdA
                                                          MD5:A51DFF6CB98C15CBA0A2B688CC0A862F
                                                          SHA1:5CF15DBD322A0F9CF3A820013E185EC2EDD56BB0
                                                          SHA-256:854215C9FE46B6029883F37C44512F7EB10BA97FC7A623C237DC6824BD92DB1E
                                                          SHA-512:D1036F2C4AE71BE22315D5AEC062E1D59EA2570D7138B97F367149C9622BEE35EAC1DBE9818AC7BE107D88683089EBE220951D025CC11908055B108B27D7BD86
                                                          Malicious:false
                                                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=5IFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,EFQ78c,EIOG1e,GwYlN,I6YDgd,IZT63,K0PMbc,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PrPYRd,Rkm0ef,SCuOPb,STuCOe,SpsfSb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,ZakeSe,_b,_tp,aC1iue,aW3pY,bSspM,byfTOb,cYShmd,eVCnO,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,lwddkf,m9oV,mzzZzc,n73qwf,njlZCf,oLggrd,qPfo0c,qmdT9,rCcCxc,siKnQd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,y5vRwf,zbML3c,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlEr6KOaFsGvhdDsnkaRQWWkVkg2lQ/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=K1ZKnb,ziZ8Mc,b3kMqb,mvkUhe,CMcBD,Fndnac,t2srLd,EN3i8d,z0u0L,xiZRqc"
                                                          Preview:"use strict";_F_installCss(".r4WGQb{position:relative}.Dl08I>:first-child{margin-top:0}.Dl08I>:last-child{margin-bottom:0}.IzwVE{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-family:\"Google Sans\",roboto,\"Noto Sans Myanmar UI\",arial,sans-serif;font-size:1.25rem;font-weight:400;letter-spacing:0rem;line-height:1.2}.l5PPKe{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-size:1rem}.l5PPKe .dMNVAe{margin:0;padding:0}.l5PPKe>:first-child{margin-top:0;padding-top:0}.l5PPKe>:last-child{margin-bottom:0;padding-bottom:0}.Dl08I{margin:0;padding:0;position:relative}.Dl08I>.SmR8:only-child{padding-top:1px}.Dl08I>.SmR8:only-child::before{top:0}.Dl08I>.SmR8:not(first-child){padding-bottom:1px}.Dl08I>.SmR8::after{bottom:0}.Dl08I>.SmR8:only-child::before,.Dl08I>.SmR8::after{border-bottom:1px solid #c4c7c5;border-bottom:1px solid var(--gm3-sys-color-outline-variant,#c4c7c5);content:\"\";height:0;left:0;position:absolute;width:100%}.aZvCDf{margin-top:8px;margin-left
                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:downloaded
                                                          Size (bytes):84
                                                          Entropy (8bit):4.875266466142591
                                                          Encrypted:false
                                                          SSDEEP:3:DZFJu0+WVTBCq2Bjdw2KsJJuYHSKnZ:lFJuuVTBudw29nu4SKZ
                                                          MD5:87B6333E98B7620EA1FF98D1A837A39E
                                                          SHA1:105DE6815B0885357DE1414BFC0D77FCC9E924EF
                                                          SHA-256:DCD3C133C5C40BECD4100BBE6EDAE84C9735E778E4234A5E8395C56FF8A733BA
                                                          SHA-512:867D7943D813685FAA76394E53199750C55817E836FD19C933F74D11E9657CE66719A6D6B2E39EE1DE62358BCE364E38A55F4E138DF92337DE6985DDCD5D0994
                                                          Malicious:false
                                                          URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzQSHgmA6QC9dWevzxIFDRkBE_oSBQ3oIX6GEgUN05ioBw==?alt=proto
                                                          Preview:Cj0KBw0ZARP6GgAKKQ3oIX6GGgQISxgCKhwIClIYCg5AIS4jJF8qLSY/Ky8lLBABGP////8PCgcN05ioBxoA
                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          File Type:ASCII text, with very long lines (2907)
                                                          Category:downloaded
                                                          Size (bytes):22833
                                                          Entropy (8bit):5.425034548615223
                                                          Encrypted:false
                                                          SSDEEP:384:7lFo6ZEdpgtmyiPixV9OX9gMBpHkHnfst9lZulagGcwYHiRFjJzN7:77o6ZviPixV8xpEHn89l4IgGcwYCRtb7
                                                          MD5:749B18538FE32BFE0815D75F899F5B21
                                                          SHA1:AF95A019211AF69F752A43CAA54A83C2AFD41D28
                                                          SHA-256:116B2687C1D5E00DB56A79894AB0C12D4E2E000B9379B7E7AD751B84DF611F3F
                                                          SHA-512:E4B6F4556AA0FD9979BB52681508F5E26FFB256473803F74F7F5C8D93FA3636D7D0A5835618FBC6123022805CE0D9616A7451A0F302C665E28A6090B5D588505
                                                          Malicious:false
                                                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=5IFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlEr6KOaFsGvhdDsnkaRQWWkVkg2lQ/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=RqjULd"
                                                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.uu.prototype.da=_.ca(40,function(){return _.rj(this,3)});_.$y=function(a,b){this.key=a;this.defaultValue=!1;this.flagName=b};_.$y.prototype.ctor=function(a){return typeof a==="boolean"?a:this.defaultValue};_.az=function(){this.ka=!0;var a=_.vj(_.dk(_.Be("TSDtV",window),_.zya),_.uu,1,_.qj())[0];if(a){var b={};for(var c=_.n(_.vj(a,_.Aya,2,_.qj())),d=c.next();!d.done;d=c.next()){d=d.value;var e=_.Jj(d,1).toString();switch(_.tj(d,_.vu)){case 3:b[e]=_.Hj(d,_.lj(d,_.vu,3));break;case 2:b[e]=_.Jj(d,_.lj(d,_.vu,2));break;case 4:b[e]=_.Kj(d,_.lj(d,_.vu,4));break;case 5:b[e]=_.Lj(d,_.lj(d,_.vu,5));break;case 6:b[e]=_.Pj(d,_.ff,6,_.vu);break;default:throw Error("jd`"+_.tj(d,_.vu));}}}else b={};this.ea=b;this.token=.a?a.da():null};_.az.prototype.aa=function(a){if(!this.ka||a.key in this.ea)a=a.ctor(this.ea[a.key]);else if(_.Be("nQyAE",window)){var b=_.Cya(a.flagName);if(b===null)a=a.de
                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          File Type:ASCII text, with very long lines (533)
                                                          Category:downloaded
                                                          Size (bytes):9210
                                                          Entropy (8bit):5.404371326611379
                                                          Encrypted:false
                                                          SSDEEP:192:EEFZpeip4HzZlY0If0Ma23jcUcrhCx6VD1TYPi8:Es/p4jgjUhtD1TY68
                                                          MD5:21E893B65627B397E22619A9F5BB9662
                                                          SHA1:F561B0F66211C1E7B22F94B4935C312AB7087E85
                                                          SHA-256:FFA9B8BC8EF2CDFF5EB4BA1A0BA1710A253A5B42535E2A369D5026967DCF4673
                                                          SHA-512:3DE3CD6A4E9B06AB3EB324E90A40B5F2AEEA8D7D6A2651C310E993CF79EEB5AC6E2E33C587F46B2DD20CC862354FD1A61AEBB9B990E6805F6629404BA285F8FA
                                                          Malicious:false
                                                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=5IFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PrPYRd,Rkm0ef,SCuOPb,STuCOe,SpsfSb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,byfTOb,cYShmd,eVCnO,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,qPfo0c,qmdT9,rCcCxc,siKnQd,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlEr6KOaFsGvhdDsnkaRQWWkVkg2lQ/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ltDFwf,SD8Jgb,rmumx,E87wgc,qPYxq,Tbb4sb,pxq3x,f8Gu1e,soHxf,YgOFye,yRXbo,bTi8wc,ywOR5c,PHUIyb"
                                                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.qNa=_.y("SD8Jgb",[]);._.GX=function(a,b){if(typeof b==="string")a.Lc(b);else if(b instanceof _.Fp&&b.ia&&b.ia===_.A)b=_.Ya(b.Lw()),a.empty().append(b);else if(b instanceof _.Ua)b=_.Ya(b),a.empty().append(b);else if(b instanceof Node)a.empty().append(b);else throw Error("Vf");};_.HX=function(a){var b=_.Io(a,"[jsslot]");if(b.size()>0)return b;b=new _.Go([_.Kk("span")]);_.Jo(b,"jsslot","");a.empty().append(b);return b};_.NLb=function(a){return a===null||typeof a==="string"&&_.Hi(a)};._.k("SD8Jgb");._.MX=function(a){_.X.call(this,a.Fa);this.Ua=a.controller.Ua;this.od=a.controllers.od[0]||null;this.header=a.controller.header;this.nav=a.controller.nav;var b;(b=this.oa().find("button:not([type])").el())==null||b.setAttribute("type","button")};_.J(_.MX,_.X);_.MX.Ba=function(){return{controller:{Ua:{jsname:"n7vHCb",ctor:_.mv},header:{jsname:"tJHJj",ctor:_.mv},nav:{jsname:"DH6Rkf",ct
                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          File Type:HTML document, ASCII text, with very long lines (681)
                                                          Category:downloaded
                                                          Size (bytes):4066
                                                          Entropy (8bit):5.363016925556486
                                                          Encrypted:false
                                                          SSDEEP:96:G2CiFZX5BReR68ujioIRVrqtyzBeTV6SfyAKLif9c7w:bCMZXVeR6jiosVrqtyzBaImyAKw9x
                                                          MD5:FC5E597D923838E10390DADD12651A81
                                                          SHA1:C9959F8D539DB5DF07B8246EC12539B6A9CC101F
                                                          SHA-256:A7EBD5280C50AE93C061EAE1E9727329E015E97531F8F2D82D0E3EA76ADB37B4
                                                          SHA-512:784CA572808F184A849388723FBB3701E6981D885BBA8A330A933F90BF0B36A2E4A491D4463A27911B1D9F7A7134F23E15F187FC7CB4554EAE9BC252513EED7C
                                                          Malicious:false
                                                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=5IFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,PHUIyb,PrPYRd,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZakeSe,ZfAoz,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlEr6KOaFsGvhdDsnkaRQWWkVkg2lQ/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=sOXFj,q0xTif,ZZ4WUe"
                                                          Preview:"use strict";_F_installCss(".N7rBcd{overflow-x:auto}sentinel{}");.this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.vg(_.aqa);._.k("sOXFj");.var tu=function(a){_.W.call(this,a.Fa)};_.J(tu,_.W);tu.Ba=_.W.Ba;tu.prototype.aa=function(a){return a()};_.nu(_.$pa,tu);._.l();._.k("oGtAuc");._.yya=new _.pf(_.aqa);._.l();._.k("q0xTif");.var sza=function(a){var b=function(d){_.Sn(d)&&(_.Sn(d).Jc=null,_.Du(d,null));d.XyHi9&&(d.XyHi9=null)};b(a);a=a.querySelectorAll("[c-wiz]");for(var c=0;c<a.length;c++)b(a[c])},Pu=function(a){_.kt.call(this,a.Fa);this.Qa=this.dom=null;if(this.kl()){var b=_.zm(this.Ug(),[_.Em,_.Dm]);b=_.ni([b[_.Em],b[_.Dm]]).then(function(c){this.Qa=c[0];this.dom=c[1]},null,this);_.hu(this,b)}this.Ra=a.lm.zea};_.J(Pu,_.kt);Pu.Ba=function(){return{lm:{zea:function(a){return _.Ue(a)}}}};Pu.prototype.zp=function(a){return this.Ra.zp(a)};.Pu.prototype.getData=function(a){return this.Ra.getData(a)};Pu.prototype.qo=function(){_.Kt(this.d
                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          File Type:ASCII text, with very long lines (3190)
                                                          Category:downloaded
                                                          Size (bytes):339747
                                                          Entropy (8bit):5.53363647964667
                                                          Encrypted:false
                                                          SSDEEP:3072:Vuv7kVKtaVFuzDXG6ZfzeelpRv9xqjne01T2HemAIaDlC6diGVOY50UlRQQIBeDq:svaKtM6ZfTxene0F2HemAaGP6BBe2
                                                          MD5:D2D05D80ACF53F04C1BEB6A387216F5E
                                                          SHA1:6E8B87D352419E28C5F8E3881787DC6C56CEB26E
                                                          SHA-256:4BA0D4EA27446C609D515539A334E3B16A4AC7BF936A996CF7E3927FFDDD569F
                                                          SHA-512:966582697B455B2DDC52210A0F46EFD77EDC67D668E7FC2F14E18DF38E8595472AB76ED17B9D2928E16FA987E3231C2A45D9BD52D9DC2CE7E4C394E2453518E6
                                                          Malicious:false
                                                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=5IFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=LEikZe,_b,_tp,byfTOb,lsjVmc/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlEr6KOaFsGvhdDsnkaRQWWkVkg2lQ/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=n73qwf,SCuOPb,IZT63,vfuNJf,UUJqVe,ws9Tlc,siKnQd,XVq9Qb,STuCOe,njlZCf,m9oV,vjKJJ,y5vRwf,iyZMqd,NTMZac,mzzZzc,rCcCxc,vvMGie,NOeYWe,O6y8ed,L9OGUe,PrPYRd,MpJwZc,qPfo0c,cYShmd,hc6Ubd,Rkm0ef,KUM7Z,oLggrd,inNHtf,L1AAkb,WpP9Yc,lwddkf,gJzDyc,SpsfSb,aC1iue,tUnxGc,aW3pY,ZakeSe,EFQ78c,xQtZb,I6YDgd,zbML3c,zr1jrb,vHEMJe,YHI3We,YTxL4,bSspM,Uas9Hd,zy0vNb,K0PMbc,AvtSve,qmdT9,MY7mZe,xBaz7b,GwYlN,eVCnO,EIOG1e,LDQI"
                                                          Preview:"use strict";_F_installCss(".EE6QGf{border-bottom-style:solid;border-bottom-width:1px;padding:16px;width:100%;z-index:6;background:#fff;background:var(--gm3-sys-color-surface-container-lowest,#fff);border-color:#c4c7c5;border-color:var(--gm3-sys-color-outline-variant,#c4c7c5);display:block;position:relative}.EE6QGf~.S7xv8,.EE6QGf~.gfM9Zd{padding-top:inherit}@media (min-width:600px){.EE6QGf{align-items:center;display:flex;left:0;position:fixed;top:0}.EE6QGf~.S7xv8,.EE6QGf~.gfM9Zd{padding-top:150px}}@media (min-width:600px) and (orientation:landscape){.EE6QGf{display:block;position:relative}.EE6QGf~.S7xv8,.EE6QGf~.gfM9Zd{padding-top:inherit}}@media (min-width:960px) and (orientation:landscape){.EE6QGf{align-items:center;display:flex;left:0;position:fixed;top:0}.EE6QGf~.S7xv8,.EE6QGf~.gfM9Zd{padding-top:150px}}.PZB4Lc{display:flex;width:100%}.YLIzab{font-family:\"Google Sans\",roboto,\"Noto Sans Myanmar UI\",arial,sans-serif;font-size:1rem;font-weight:500;letter-spacing:0rem;line-height:1
                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          File Type:ASCII text, with very long lines (522)
                                                          Category:downloaded
                                                          Size (bytes):5050
                                                          Entropy (8bit):5.289052544075544
                                                          Encrypted:false
                                                          SSDEEP:96:o4We0hP7OBFXYvB1sig3Fd8HkaXzLmUrv8Vh1WJlLQXT2v2gqw:655758Fd8HkaPZ0GmAD
                                                          MD5:26E26FD11772DFF5C7004BEA334289CC
                                                          SHA1:638DAAF541BDE31E95AEE4F8ADA677434D7051DB
                                                          SHA-256:ADFE3E4960982F5EF4C043052A9990D8683C5FC2B590E817B6B1A5774DDE2CE3
                                                          SHA-512:C31929EB6D1C60D6A84A2574FF60490394A6D6F9B354972F3328952F570D80B3F2AEC916B0E1B66DDB1AC056EB75BFAC477E7AF631D0AD1810EDBAF025465D66
                                                          Malicious:false
                                                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=5IFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZfAoz,ZwDk9d,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,iAskyc,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlEr6KOaFsGvhdDsnkaRQWWkVkg2lQ/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=wg1P6b"
                                                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.jNa=_.y("wg1P6b",[_.TA,_.Cn,_.Kn]);._.k("wg1P6b");.var Z5a;Z5a=_.mh(["aria-"]);._.uJ=function(a){_.X.call(this,a.Fa);this.Ka=this.wa=this.aa=this.viewportElement=this.Na=null;this.Hc=a.Ea.ff;this.ab=a.Ea.focus;this.Fc=a.Ea.Fc;this.ea=this.Pi();a=-1*parseInt(_.Co(this.Pi().el(),"marginTop")||"0",10);var b=parseInt(_.Co(this.Pi().el(),"marginBottom")||"0",10);this.Ta={top:a,right:0,bottom:b,left:0};a=_.cf(this.getData("isMenuDynamic"),!1);b=_.cf(this.getData("isMenuHoisted"),!1);this.Ga=a?1:b?2:0;this.ka=!1;this.Ca=1;this.Ga!==1&&(this.aa=this.Sa("U0exHf").children().Wc(0),_.ku(this,.$5a(this,this.aa.el())));_.kF(this.oa())&&(a=this.oa().el(),b=this.we.bind(this),a.__soy_skip_handler=b)};_.J(_.uJ,_.X);_.uJ.Ba=function(){return{Ea:{ff:_.ZE,focus:_.KE,Fc:_.ru}}};_.uJ.prototype.xF=function(a){var b=a.source;this.Na=b;var c;((c=a.data)==null?0:c.fz)?(a=a.data.fz,this.Ca=a==="MOUS
                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Entropy (8bit):6.582087679492459
                                                          TrID:
                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                          • DOS Executable Generic (2002/1) 0.02%
                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                          File name:file.exe
                                                          File size:918'528 bytes
                                                          MD5:a4da09a845d42f57982ff9177c819a39
                                                          SHA1:3c78a95a27531287f51251b13cc27cc0ad429413
                                                          SHA256:52d7013d0601f0308fa745c77172fee02146b6bd6cc12a56dd56653a49fd9641
                                                          SHA512:801b3bb0f5e4c9202f5f389261fa33c57de0e4408db12fbe2b42558be1d1ac36670abd1ae7ee3f4d663fb4dbf84248c9e5f2fd68d38e9f10a86fe94b527cd26b
                                                          SSDEEP:12288:rqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgabTr:rqDEvCTbMWu7rQYlBQcBiT6rprG8afr
                                                          TLSH:B9159E0273D1C062FFAB92334B5AF6515BBC69260123E61F13981DB9BE701B1563E7A3
                                                          File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                          Icon Hash:aaf3e3e3938382a0
                                                          Entrypoint:0x420577
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                          DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x66FD58A9 [Wed Oct 2 14:28:57 2024 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:5
                                                          OS Version Minor:1
                                                          File Version Major:5
                                                          File Version Minor:1
                                                          Subsystem Version Major:5
                                                          Subsystem Version Minor:1
                                                          Import Hash:948cc502fe9226992dce9417f952fce3
                                                          Instruction
                                                          call 00007F82D04FB413h
                                                          jmp 00007F82D04FAD1Fh
                                                          push ebp
                                                          mov ebp, esp
                                                          push esi
                                                          push dword ptr [ebp+08h]
                                                          mov esi, ecx
                                                          call 00007F82D04FAEFDh
                                                          mov dword ptr [esi], 0049FDF0h
                                                          mov eax, esi
                                                          pop esi
                                                          pop ebp
                                                          retn 0004h
                                                          and dword ptr [ecx+04h], 00000000h
                                                          mov eax, ecx
                                                          and dword ptr [ecx+08h], 00000000h
                                                          mov dword ptr [ecx+04h], 0049FDF8h
                                                          mov dword ptr [ecx], 0049FDF0h
                                                          ret
                                                          push ebp
                                                          mov ebp, esp
                                                          push esi
                                                          push dword ptr [ebp+08h]
                                                          mov esi, ecx
                                                          call 00007F82D04FAECAh
                                                          mov dword ptr [esi], 0049FE0Ch
                                                          mov eax, esi
                                                          pop esi
                                                          pop ebp
                                                          retn 0004h
                                                          and dword ptr [ecx+04h], 00000000h
                                                          mov eax, ecx
                                                          and dword ptr [ecx+08h], 00000000h
                                                          mov dword ptr [ecx+04h], 0049FE14h
                                                          mov dword ptr [ecx], 0049FE0Ch
                                                          ret
                                                          push ebp
                                                          mov ebp, esp
                                                          push esi
                                                          mov esi, ecx
                                                          lea eax, dword ptr [esi+04h]
                                                          mov dword ptr [esi], 0049FDD0h
                                                          and dword ptr [eax], 00000000h
                                                          and dword ptr [eax+04h], 00000000h
                                                          push eax
                                                          mov eax, dword ptr [ebp+08h]
                                                          add eax, 04h
                                                          push eax
                                                          call 00007F82D04FDABDh
                                                          pop ecx
                                                          pop ecx
                                                          mov eax, esi
                                                          pop esi
                                                          pop ebp
                                                          retn 0004h
                                                          lea eax, dword ptr [ecx+04h]
                                                          mov dword ptr [ecx], 0049FDD0h
                                                          push eax
                                                          call 00007F82D04FDB08h
                                                          pop ecx
                                                          ret
                                                          push ebp
                                                          mov ebp, esp
                                                          push esi
                                                          mov esi, ecx
                                                          lea eax, dword ptr [esi+04h]
                                                          mov dword ptr [esi], 0049FDD0h
                                                          push eax
                                                          call 00007F82D04FDAF1h
                                                          test byte ptr [ebp+08h], 00000001h
                                                          pop ecx
                                                          Programming Language:
                                                          • [ C ] VS2008 SP1 build 30729
                                                          • [IMP] VS2008 SP1 build 30729
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x9830.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xde0000x7594.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .rsrc0xd40000x98300x9a0092a08592c12691bf1f723d0f4b5a49f8False0.2964437905844156data5.272070162002485IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0xde0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                          RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                          RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                          RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                          RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                          RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                          RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                          RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                          RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                          RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                          RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                          RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                          RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                          RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                          RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                          RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                          RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                          RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                          RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                          RT_RCDATA0xdc7b80xaf8data1.003917378917379
                                                          RT_GROUP_ICON0xdd2b00x76dataEnglishGreat Britain0.6610169491525424
                                                          RT_GROUP_ICON0xdd3280x14dataEnglishGreat Britain1.25
                                                          RT_GROUP_ICON0xdd33c0x14dataEnglishGreat Britain1.15
                                                          RT_GROUP_ICON0xdd3500x14dataEnglishGreat Britain1.25
                                                          RT_VERSION0xdd3640xdcdataEnglishGreat Britain0.6181818181818182
                                                          RT_MANIFEST0xdd4400x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                          DLLImport
                                                          WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                          VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                          COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                          MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                          WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                          PSAPI.DLLGetProcessMemoryInfo
                                                          IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                          USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                          UxTheme.dllIsThemeActive
                                                          KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                          USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                          GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                          COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                          ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                          SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                          ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                          OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                          Language of compilation systemCountry where language is spokenMap
                                                          EnglishGreat Britain
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Oct 2, 2024 17:25:09.165885925 CEST49677443192.168.2.720.50.201.200
                                                          Oct 2, 2024 17:25:09.540344954 CEST49677443192.168.2.720.50.201.200
                                                          Oct 2, 2024 17:25:09.962265015 CEST49671443192.168.2.7204.79.197.203
                                                          Oct 2, 2024 17:25:10.290380001 CEST49677443192.168.2.720.50.201.200
                                                          Oct 2, 2024 17:25:11.791034937 CEST49677443192.168.2.720.50.201.200
                                                          Oct 2, 2024 17:25:14.774684906 CEST49677443192.168.2.720.50.201.200
                                                          Oct 2, 2024 17:25:16.832081079 CEST49699443192.168.2.7142.250.185.142
                                                          Oct 2, 2024 17:25:16.832153082 CEST44349699142.250.185.142192.168.2.7
                                                          Oct 2, 2024 17:25:16.832216024 CEST49699443192.168.2.7142.250.185.142
                                                          Oct 2, 2024 17:25:16.850373983 CEST49699443192.168.2.7142.250.185.142
                                                          Oct 2, 2024 17:25:16.850408077 CEST44349699142.250.185.142192.168.2.7
                                                          Oct 2, 2024 17:25:17.065316916 CEST49675443192.168.2.7104.98.116.138
                                                          Oct 2, 2024 17:25:17.080867052 CEST49674443192.168.2.7104.98.116.138
                                                          Oct 2, 2024 17:25:17.158998013 CEST49672443192.168.2.7104.98.116.138
                                                          Oct 2, 2024 17:25:17.507467985 CEST44349699142.250.185.142192.168.2.7
                                                          Oct 2, 2024 17:25:17.507810116 CEST49699443192.168.2.7142.250.185.142
                                                          Oct 2, 2024 17:25:17.507823944 CEST44349699142.250.185.142192.168.2.7
                                                          Oct 2, 2024 17:25:17.508214951 CEST44349699142.250.185.142192.168.2.7
                                                          Oct 2, 2024 17:25:17.508268118 CEST49699443192.168.2.7142.250.185.142
                                                          Oct 2, 2024 17:25:17.509063005 CEST44349699142.250.185.142192.168.2.7
                                                          Oct 2, 2024 17:25:17.509109974 CEST49699443192.168.2.7142.250.185.142
                                                          Oct 2, 2024 17:25:17.510673046 CEST49699443192.168.2.7142.250.185.142
                                                          Oct 2, 2024 17:25:17.510727882 CEST44349699142.250.185.142192.168.2.7
                                                          Oct 2, 2024 17:25:17.510994911 CEST49699443192.168.2.7142.250.185.142
                                                          Oct 2, 2024 17:25:17.511003017 CEST44349699142.250.185.142192.168.2.7
                                                          Oct 2, 2024 17:25:17.568303108 CEST49699443192.168.2.7142.250.185.142
                                                          Oct 2, 2024 17:25:17.830544949 CEST44349699142.250.185.142192.168.2.7
                                                          Oct 2, 2024 17:25:17.830853939 CEST49699443192.168.2.7142.250.185.142
                                                          Oct 2, 2024 17:25:17.831322908 CEST49699443192.168.2.7142.250.185.142
                                                          Oct 2, 2024 17:25:17.831366062 CEST44349699142.250.185.142192.168.2.7
                                                          Oct 2, 2024 17:25:17.831475973 CEST49699443192.168.2.7142.250.185.142
                                                          Oct 2, 2024 17:25:17.840770006 CEST49705443192.168.2.7142.250.184.238
                                                          Oct 2, 2024 17:25:17.840810061 CEST44349705142.250.184.238192.168.2.7
                                                          Oct 2, 2024 17:25:17.840989113 CEST49705443192.168.2.7142.250.184.238
                                                          Oct 2, 2024 17:25:17.841192007 CEST49705443192.168.2.7142.250.184.238
                                                          Oct 2, 2024 17:25:17.841206074 CEST44349705142.250.184.238192.168.2.7
                                                          Oct 2, 2024 17:25:18.469644070 CEST44349705142.250.184.238192.168.2.7
                                                          Oct 2, 2024 17:25:18.470083952 CEST49705443192.168.2.7142.250.184.238
                                                          Oct 2, 2024 17:25:18.470113993 CEST44349705142.250.184.238192.168.2.7
                                                          Oct 2, 2024 17:25:18.470523119 CEST44349705142.250.184.238192.168.2.7
                                                          Oct 2, 2024 17:25:18.470654964 CEST49705443192.168.2.7142.250.184.238
                                                          Oct 2, 2024 17:25:18.471244097 CEST44349705142.250.184.238192.168.2.7
                                                          Oct 2, 2024 17:25:18.471313000 CEST49705443192.168.2.7142.250.184.238
                                                          Oct 2, 2024 17:25:18.472343922 CEST49705443192.168.2.7142.250.184.238
                                                          Oct 2, 2024 17:25:18.472414970 CEST44349705142.250.184.238192.168.2.7
                                                          Oct 2, 2024 17:25:18.472527981 CEST49705443192.168.2.7142.250.184.238
                                                          Oct 2, 2024 17:25:18.515410900 CEST44349705142.250.184.238192.168.2.7
                                                          Oct 2, 2024 17:25:18.518440008 CEST49705443192.168.2.7142.250.184.238
                                                          Oct 2, 2024 17:25:18.518465996 CEST44349705142.250.184.238192.168.2.7
                                                          Oct 2, 2024 17:25:18.565301895 CEST49705443192.168.2.7142.250.184.238
                                                          Oct 2, 2024 17:25:18.781598091 CEST44349705142.250.184.238192.168.2.7
                                                          Oct 2, 2024 17:25:18.781625032 CEST44349705142.250.184.238192.168.2.7
                                                          Oct 2, 2024 17:25:18.781687021 CEST49705443192.168.2.7142.250.184.238
                                                          Oct 2, 2024 17:25:18.781692028 CEST44349705142.250.184.238192.168.2.7
                                                          Oct 2, 2024 17:25:18.781734943 CEST49705443192.168.2.7142.250.184.238
                                                          Oct 2, 2024 17:25:18.784697056 CEST49705443192.168.2.7142.250.184.238
                                                          Oct 2, 2024 17:25:18.784723043 CEST44349705142.250.184.238192.168.2.7
                                                          Oct 2, 2024 17:25:19.571542978 CEST49671443192.168.2.7204.79.197.203
                                                          Oct 2, 2024 17:25:20.536669970 CEST44349698104.98.116.138192.168.2.7
                                                          Oct 2, 2024 17:25:20.536861897 CEST49698443192.168.2.7104.98.116.138
                                                          Oct 2, 2024 17:25:20.536964893 CEST44349698104.98.116.138192.168.2.7
                                                          Oct 2, 2024 17:25:20.537004948 CEST49698443192.168.2.7104.98.116.138
                                                          Oct 2, 2024 17:25:20.537731886 CEST44349698104.98.116.138192.168.2.7
                                                          Oct 2, 2024 17:25:20.537772894 CEST49698443192.168.2.7104.98.116.138
                                                          Oct 2, 2024 17:25:20.603956938 CEST49709443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:25:20.604013920 CEST44349709142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:25:20.604093075 CEST49709443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:25:20.604317904 CEST49709443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:25:20.604336977 CEST44349709142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:25:20.727910995 CEST49677443192.168.2.720.50.201.200
                                                          Oct 2, 2024 17:25:20.906586885 CEST44349698104.98.116.138192.168.2.7
                                                          Oct 2, 2024 17:25:20.906650066 CEST49698443192.168.2.7104.98.116.138
                                                          Oct 2, 2024 17:25:21.488430023 CEST49710443192.168.2.7184.28.90.27
                                                          Oct 2, 2024 17:25:21.488487959 CEST44349710184.28.90.27192.168.2.7
                                                          Oct 2, 2024 17:25:21.488590002 CEST49710443192.168.2.7184.28.90.27
                                                          Oct 2, 2024 17:25:21.515541077 CEST49710443192.168.2.7184.28.90.27
                                                          Oct 2, 2024 17:25:21.515563965 CEST44349710184.28.90.27192.168.2.7
                                                          Oct 2, 2024 17:25:21.541652918 CEST44349709142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:25:21.587212086 CEST49709443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:25:21.590972900 CEST49709443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:25:21.590993881 CEST44349709142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:25:21.592109919 CEST44349709142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:25:21.593527079 CEST49709443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:25:21.597157955 CEST49709443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:25:21.597238064 CEST44349709142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:25:21.649699926 CEST49709443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:25:21.649733067 CEST44349709142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:25:21.696536064 CEST49709443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:25:22.161077023 CEST44349710184.28.90.27192.168.2.7
                                                          Oct 2, 2024 17:25:22.161154032 CEST49710443192.168.2.7184.28.90.27
                                                          Oct 2, 2024 17:25:22.165802956 CEST49710443192.168.2.7184.28.90.27
                                                          Oct 2, 2024 17:25:22.165815115 CEST44349710184.28.90.27192.168.2.7
                                                          Oct 2, 2024 17:25:22.166125059 CEST44349710184.28.90.27192.168.2.7
                                                          Oct 2, 2024 17:25:22.212172985 CEST49710443192.168.2.7184.28.90.27
                                                          Oct 2, 2024 17:25:22.217504978 CEST49710443192.168.2.7184.28.90.27
                                                          Oct 2, 2024 17:25:22.263395071 CEST44349710184.28.90.27192.168.2.7
                                                          Oct 2, 2024 17:25:22.444454908 CEST44349710184.28.90.27192.168.2.7
                                                          Oct 2, 2024 17:25:22.444614887 CEST44349710184.28.90.27192.168.2.7
                                                          Oct 2, 2024 17:25:22.444663048 CEST49710443192.168.2.7184.28.90.27
                                                          Oct 2, 2024 17:25:22.444700956 CEST49710443192.168.2.7184.28.90.27
                                                          Oct 2, 2024 17:25:22.444700956 CEST49710443192.168.2.7184.28.90.27
                                                          Oct 2, 2024 17:25:22.444716930 CEST44349710184.28.90.27192.168.2.7
                                                          Oct 2, 2024 17:25:22.444729090 CEST44349710184.28.90.27192.168.2.7
                                                          Oct 2, 2024 17:25:22.565510035 CEST49712443192.168.2.7184.28.90.27
                                                          Oct 2, 2024 17:25:22.565551043 CEST44349712184.28.90.27192.168.2.7
                                                          Oct 2, 2024 17:25:22.565629959 CEST49712443192.168.2.7184.28.90.27
                                                          Oct 2, 2024 17:25:22.565948963 CEST49712443192.168.2.7184.28.90.27
                                                          Oct 2, 2024 17:25:22.565954924 CEST44349712184.28.90.27192.168.2.7
                                                          Oct 2, 2024 17:25:23.218519926 CEST44349712184.28.90.27192.168.2.7
                                                          Oct 2, 2024 17:25:23.219306946 CEST49712443192.168.2.7184.28.90.27
                                                          Oct 2, 2024 17:25:23.219964027 CEST49712443192.168.2.7184.28.90.27
                                                          Oct 2, 2024 17:25:23.219980955 CEST44349712184.28.90.27192.168.2.7
                                                          Oct 2, 2024 17:25:23.220257044 CEST44349712184.28.90.27192.168.2.7
                                                          Oct 2, 2024 17:25:23.221447945 CEST49712443192.168.2.7184.28.90.27
                                                          Oct 2, 2024 17:25:23.263408899 CEST44349712184.28.90.27192.168.2.7
                                                          Oct 2, 2024 17:25:23.492224932 CEST44349712184.28.90.27192.168.2.7
                                                          Oct 2, 2024 17:25:23.492294073 CEST44349712184.28.90.27192.168.2.7
                                                          Oct 2, 2024 17:25:23.494326115 CEST49712443192.168.2.7184.28.90.27
                                                          Oct 2, 2024 17:25:23.494326115 CEST49712443192.168.2.7184.28.90.27
                                                          Oct 2, 2024 17:25:23.495352030 CEST49712443192.168.2.7184.28.90.27
                                                          Oct 2, 2024 17:25:23.495371103 CEST44349712184.28.90.27192.168.2.7
                                                          Oct 2, 2024 17:25:27.754709005 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:27.754770041 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:27.754842997 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:27.756261110 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:27.756279945 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:28.415637016 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:28.415981054 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:28.415996075 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:28.417330980 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:28.417398930 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:28.418150902 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:28.418198109 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:28.419333935 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:28.419418097 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:28.419498920 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:28.419507027 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:28.462502956 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:28.714987040 CEST49729443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:25:28.715037107 CEST443497294.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:25:28.715102911 CEST49729443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:25:28.717201948 CEST49729443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:25:28.717226982 CEST443497294.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:25:28.999588966 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:28.999692917 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:28.999732018 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:28.999748945 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:28.999772072 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:28.999799967 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:29.005656958 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:29.005707979 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:29.005717039 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:29.011845112 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:29.011878014 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:29.011900902 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:29.011909962 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:29.011970997 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:29.018081903 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:29.018157959 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:29.024350882 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:29.024422884 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:29.024461985 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:29.024518013 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:29.086401939 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:29.086462975 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:29.086482048 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:29.086496115 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:29.086535931 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:29.088515043 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:29.088566065 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:29.094422102 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:29.094477892 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:29.094959974 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:29.095016956 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:29.100852013 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:29.100920916 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:29.107369900 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:29.107429981 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:29.107498884 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:29.113622904 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:29.113677025 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:29.113701105 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:29.119961977 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:29.120016098 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:29.120028019 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:29.120280027 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:29.120335102 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:29.148175001 CEST49727443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:29.148199081 CEST44349727216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:29.495028973 CEST49733443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:29.495054007 CEST44349733216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:29.495348930 CEST49733443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:29.495348930 CEST49733443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:29.495377064 CEST44349733216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:29.520051956 CEST443497294.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:25:29.520215988 CEST49729443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:25:29.548543930 CEST49734443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:29.548594952 CEST44349734216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:29.548717022 CEST49734443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:29.550668001 CEST49734443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:29.550683022 CEST44349734216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:29.572974920 CEST49729443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:25:29.573044062 CEST443497294.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:25:29.573378086 CEST443497294.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:25:29.620512009 CEST49729443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:25:30.202490091 CEST44349734216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:30.202852011 CEST49734443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:30.202888966 CEST44349734216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:30.203262091 CEST44349734216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:30.203330040 CEST49734443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:30.203974009 CEST44349734216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:30.204030037 CEST49734443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:30.204890966 CEST49734443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:30.204951048 CEST44349734216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:30.205183029 CEST49734443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:30.205189943 CEST44349734216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:30.236507893 CEST44349733216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:30.236896992 CEST49733443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:30.236927986 CEST44349733216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:30.237765074 CEST44349733216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:30.237848997 CEST49733443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:30.238464117 CEST44349733216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:30.238523960 CEST49733443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:30.238682032 CEST49733443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:30.238789082 CEST44349733216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:30.238888979 CEST49733443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:30.238895893 CEST44349733216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:30.246727943 CEST49734443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:30.291971922 CEST49733443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:30.506489038 CEST49729443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:25:30.506716013 CEST44349734216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:30.507133007 CEST44349734216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:30.507217884 CEST49734443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:30.507394075 CEST49734443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:30.507411957 CEST44349734216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:30.507445097 CEST49734443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:30.507466078 CEST49734443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:30.508538961 CEST49739443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:30.508577108 CEST44349739216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:30.508641958 CEST49739443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:30.509711027 CEST49739443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:30.509728909 CEST44349739216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:30.536102057 CEST44349733216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:30.536523104 CEST44349733216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:30.536576033 CEST49733443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:30.536751986 CEST49733443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:30.536772966 CEST44349733216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:30.536784887 CEST49733443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:30.536818981 CEST49733443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:30.537724972 CEST49740443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:30.537810087 CEST44349740216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:30.537894011 CEST49740443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:30.538136959 CEST49740443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:30.538167000 CEST44349740216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:30.547400951 CEST443497294.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:25:30.766733885 CEST443497294.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:25:30.766778946 CEST443497294.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:25:30.766787052 CEST443497294.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:25:30.766797066 CEST443497294.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:25:30.766832113 CEST443497294.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:25:30.766865015 CEST49729443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:25:30.766932964 CEST443497294.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:25:30.766964912 CEST49729443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:25:30.766988039 CEST49729443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:25:30.767024040 CEST443497294.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:25:30.767095089 CEST49729443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:25:30.767108917 CEST443497294.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:25:30.767338037 CEST443497294.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:25:30.767431021 CEST49729443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:25:31.159840107 CEST44349739216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:31.164293051 CEST49739443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:31.164315939 CEST44349739216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:31.164726973 CEST44349739216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:31.164782047 CEST49739443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:31.165452957 CEST44349739216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:31.165503979 CEST49739443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:31.168483973 CEST49739443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:31.168580055 CEST44349739216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:31.168934107 CEST49739443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:31.168945074 CEST44349739216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:31.168965101 CEST49739443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:31.212882042 CEST49739443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:31.212893963 CEST44349739216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:31.273113012 CEST44349740216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:31.273608923 CEST49740443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:31.273655891 CEST44349740216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:31.274046898 CEST44349740216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:31.274120092 CEST49740443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:31.274816036 CEST44349740216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:31.274892092 CEST49740443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:31.275619984 CEST49740443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:31.275691032 CEST44349740216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:31.275780916 CEST49740443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:31.275803089 CEST44349740216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:31.275839090 CEST49740443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:31.321377993 CEST49740443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:31.321414948 CEST44349740216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:31.392751932 CEST44349739216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:31.393487930 CEST44349739216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:31.393569946 CEST49739443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:31.399202108 CEST49739443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:31.399233103 CEST44349739216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:31.442105055 CEST44349709142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:25:31.442192078 CEST44349709142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:25:31.442236900 CEST49709443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:25:31.500572920 CEST44349740216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:31.501389027 CEST44349740216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:31.501461983 CEST49740443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:31.516258001 CEST49740443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:31.516304970 CEST44349740216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:31.581933022 CEST49729443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:25:31.581962109 CEST443497294.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:25:31.581976891 CEST49729443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:25:31.581984043 CEST443497294.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:25:31.719094038 CEST49745443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:25:31.719136953 CEST44349745142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:25:31.719158888 CEST49709443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:25:31.719183922 CEST44349709142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:25:31.719197989 CEST49745443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:25:31.719435930 CEST49745443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:25:31.719451904 CEST44349745142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:25:32.363437891 CEST44349745142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:25:32.365331888 CEST49745443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:25:32.365350008 CEST44349745142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:25:32.365688086 CEST44349745142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:25:32.367687941 CEST49745443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:25:32.367754936 CEST44349745142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:25:32.367857933 CEST49745443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:25:32.411427021 CEST44349745142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:25:32.633789062 CEST49677443192.168.2.720.50.201.200
                                                          Oct 2, 2024 17:25:32.636662006 CEST44349745142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:25:32.636709929 CEST44349745142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:25:32.636740923 CEST44349745142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:25:32.636755943 CEST49745443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:25:32.636782885 CEST44349745142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:25:32.636816025 CEST44349745142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:25:32.636821032 CEST49745443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:25:32.636831045 CEST44349745142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:25:32.636877060 CEST49745443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:25:32.637072086 CEST44349745142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:25:32.637124062 CEST44349745142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:25:32.637165070 CEST49745443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:25:32.640014887 CEST49745443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:25:32.640059948 CEST44349745142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:25:36.399295092 CEST49748443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:36.399341106 CEST44349748216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:36.399488926 CEST49748443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:36.400332928 CEST49748443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:36.400345087 CEST44349748216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:37.031341076 CEST44349748216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:37.031869888 CEST49748443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:37.031903982 CEST44349748216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:37.032277107 CEST44349748216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:37.034043074 CEST49748443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:37.034099102 CEST44349748216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:37.034513950 CEST49748443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:37.034528971 CEST49748443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:37.034543037 CEST44349748216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:37.367244959 CEST44349748216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:37.367532015 CEST44349748216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:25:37.367625952 CEST49748443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:37.368415117 CEST49748443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:25:37.368433952 CEST44349748216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:00.389873028 CEST49751443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:00.389934063 CEST44349751216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:00.390033960 CEST49751443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:00.390481949 CEST49751443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:00.390494108 CEST44349751216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:00.795084000 CEST49752443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:00.795141935 CEST44349752216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:00.795218945 CEST49752443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:00.795542002 CEST49752443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:00.795564890 CEST44349752216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:01.882148981 CEST44349751216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:01.882772923 CEST49751443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:01.882791996 CEST44349751216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:01.883183956 CEST44349751216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:01.883618116 CEST49751443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:01.883635044 CEST49751443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:01.883641005 CEST44349751216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:01.883666992 CEST49751443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:01.883709908 CEST44349751216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:01.931642056 CEST49751443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:02.187839985 CEST44349751216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:02.188898087 CEST44349751216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:02.188973904 CEST49751443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:02.189335108 CEST49751443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:02.189349890 CEST44349751216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:02.231132984 CEST49753443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:02.231188059 CEST44349753216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:02.231288910 CEST49753443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:02.231600046 CEST49753443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:02.231614113 CEST44349753216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:02.738522053 CEST44349752216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:02.747121096 CEST49752443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:02.747139931 CEST44349752216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:02.748616934 CEST44349752216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:02.749376059 CEST49752443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:02.749456882 CEST44349752216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:02.749567032 CEST49752443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:02.749586105 CEST49752443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:02.749603033 CEST44349752216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:03.083739996 CEST44349753216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:03.084085941 CEST49753443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:03.084109068 CEST44349753216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:03.084486008 CEST44349753216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:03.084844112 CEST49753443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:03.084903955 CEST44349753216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:03.085031986 CEST49753443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:03.085067987 CEST49753443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:03.085072994 CEST44349753216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:03.304532051 CEST44349753216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:03.306230068 CEST44349753216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:03.306344986 CEST49753443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:03.307756901 CEST49753443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:03.307777882 CEST44349753216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:03.381639957 CEST44349752216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:03.381777048 CEST44349752216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:03.381974936 CEST49752443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:03.382200956 CEST49752443192.168.2.7216.58.206.46
                                                          Oct 2, 2024 17:26:03.382221937 CEST44349752216.58.206.46192.168.2.7
                                                          Oct 2, 2024 17:26:11.411180973 CEST49754443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:26:11.411235094 CEST443497544.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:26:11.411310911 CEST49754443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:26:11.411669016 CEST49754443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:26:11.411678076 CEST443497544.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:26:12.192537069 CEST443497544.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:26:12.192611933 CEST49754443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:26:12.197849035 CEST49754443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:26:12.197855949 CEST443497544.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:26:12.198069096 CEST443497544.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:26:12.245035887 CEST49754443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:26:13.033621073 CEST49754443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:26:13.079406023 CEST443497544.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:26:13.292859077 CEST443497544.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:26:13.292891979 CEST443497544.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:26:13.292900085 CEST443497544.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:26:13.292912006 CEST443497544.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:26:13.292937994 CEST443497544.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:26:13.293162107 CEST49754443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:26:13.293179989 CEST443497544.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:26:13.293237925 CEST49754443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:26:13.293565989 CEST443497544.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:26:13.293601990 CEST443497544.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:26:13.293626070 CEST49754443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:26:13.293631077 CEST443497544.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:26:13.293653011 CEST49754443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:26:13.293678999 CEST443497544.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:26:13.293718100 CEST49754443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:26:13.955420017 CEST49754443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:26:13.955466986 CEST443497544.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:26:13.955483913 CEST49754443192.168.2.74.175.87.197
                                                          Oct 2, 2024 17:26:13.955492020 CEST443497544.175.87.197192.168.2.7
                                                          Oct 2, 2024 17:26:20.233294010 CEST49758443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:26:20.233344078 CEST44349758142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:26:20.233417034 CEST49758443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:26:20.233946085 CEST49758443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:26:20.233959913 CEST44349758142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:26:20.886161089 CEST44349758142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:26:20.886466026 CEST49758443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:26:20.886495113 CEST44349758142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:26:20.886831045 CEST44349758142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:26:20.887135029 CEST49758443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:26:20.887195110 CEST44349758142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:26:20.946443081 CEST49758443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:26:31.128139973 CEST44349758142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:26:31.128212929 CEST44349758142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:26:31.128300905 CEST49758443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:26:33.464667082 CEST49758443192.168.2.7142.250.184.196
                                                          Oct 2, 2024 17:26:33.464745998 CEST44349758142.250.184.196192.168.2.7
                                                          Oct 2, 2024 17:27:19.677705050 CEST5014853192.168.2.71.1.1.1
                                                          Oct 2, 2024 17:27:19.682566881 CEST53501481.1.1.1192.168.2.7
                                                          Oct 2, 2024 17:27:19.682884932 CEST5014853192.168.2.71.1.1.1
                                                          Oct 2, 2024 17:27:19.682918072 CEST5014853192.168.2.71.1.1.1
                                                          Oct 2, 2024 17:27:19.687866926 CEST53501481.1.1.1192.168.2.7
                                                          Oct 2, 2024 17:27:20.130096912 CEST53501481.1.1.1192.168.2.7
                                                          Oct 2, 2024 17:27:20.130346060 CEST5014853192.168.2.71.1.1.1
                                                          Oct 2, 2024 17:27:20.135524035 CEST53501481.1.1.1192.168.2.7
                                                          Oct 2, 2024 17:27:20.136898041 CEST5014853192.168.2.71.1.1.1
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Oct 2, 2024 17:25:16.425014019 CEST5920453192.168.2.71.1.1.1
                                                          Oct 2, 2024 17:25:16.425426960 CEST4979853192.168.2.71.1.1.1
                                                          Oct 2, 2024 17:25:16.509430885 CEST53605521.1.1.1192.168.2.7
                                                          Oct 2, 2024 17:25:16.509455919 CEST53592041.1.1.1192.168.2.7
                                                          Oct 2, 2024 17:25:16.509661913 CEST53497981.1.1.1192.168.2.7
                                                          Oct 2, 2024 17:25:16.775554895 CEST123123192.168.2.713.95.65.251
                                                          Oct 2, 2024 17:25:16.861501932 CEST53592941.1.1.1192.168.2.7
                                                          Oct 2, 2024 17:25:16.949670076 CEST12312313.95.65.251192.168.2.7
                                                          Oct 2, 2024 17:25:17.833370924 CEST5046153192.168.2.71.1.1.1
                                                          Oct 2, 2024 17:25:17.833370924 CEST5639953192.168.2.71.1.1.1
                                                          Oct 2, 2024 17:25:17.837037086 CEST53577161.1.1.1192.168.2.7
                                                          Oct 2, 2024 17:25:17.840100050 CEST53563991.1.1.1192.168.2.7
                                                          Oct 2, 2024 17:25:17.840325117 CEST53504611.1.1.1192.168.2.7
                                                          Oct 2, 2024 17:25:20.135124922 CEST5231953192.168.2.71.1.1.1
                                                          Oct 2, 2024 17:25:20.135432959 CEST4917153192.168.2.71.1.1.1
                                                          Oct 2, 2024 17:25:20.540595055 CEST53523191.1.1.1192.168.2.7
                                                          Oct 2, 2024 17:25:20.906301022 CEST53491711.1.1.1192.168.2.7
                                                          Oct 2, 2024 17:25:24.669154882 CEST53557851.1.1.1192.168.2.7
                                                          Oct 2, 2024 17:25:27.694005013 CEST4927453192.168.2.71.1.1.1
                                                          Oct 2, 2024 17:25:27.694286108 CEST6544253192.168.2.71.1.1.1
                                                          Oct 2, 2024 17:25:27.701082945 CEST53492741.1.1.1192.168.2.7
                                                          Oct 2, 2024 17:25:27.701098919 CEST53654421.1.1.1192.168.2.7
                                                          Oct 2, 2024 17:25:29.408812046 CEST53606121.1.1.1192.168.2.7
                                                          Oct 2, 2024 17:25:29.485909939 CEST5524653192.168.2.71.1.1.1
                                                          Oct 2, 2024 17:25:29.486110926 CEST6322353192.168.2.71.1.1.1
                                                          Oct 2, 2024 17:25:29.493268967 CEST53552461.1.1.1192.168.2.7
                                                          Oct 2, 2024 17:25:29.493393898 CEST53632231.1.1.1192.168.2.7
                                                          Oct 2, 2024 17:25:34.751878977 CEST53593191.1.1.1192.168.2.7
                                                          Oct 2, 2024 17:25:53.539716005 CEST53532171.1.1.1192.168.2.7
                                                          Oct 2, 2024 17:26:09.657450914 CEST138138192.168.2.7192.168.2.255
                                                          Oct 2, 2024 17:26:15.598229885 CEST53492601.1.1.1192.168.2.7
                                                          Oct 2, 2024 17:26:16.314699888 CEST53577661.1.1.1192.168.2.7
                                                          Oct 2, 2024 17:26:29.412260056 CEST53555451.1.1.1192.168.2.7
                                                          Oct 2, 2024 17:26:30.607570887 CEST5584253192.168.2.71.1.1.1
                                                          Oct 2, 2024 17:26:30.607717991 CEST5515553192.168.2.71.1.1.1
                                                          Oct 2, 2024 17:26:30.614343882 CEST53558421.1.1.1192.168.2.7
                                                          Oct 2, 2024 17:26:30.614717007 CEST53551551.1.1.1192.168.2.7
                                                          Oct 2, 2024 17:26:43.362147093 CEST53651931.1.1.1192.168.2.7
                                                          Oct 2, 2024 17:27:19.675117970 CEST53622211.1.1.1192.168.2.7
                                                          TimestampSource IPDest IPChecksumCodeType
                                                          Oct 2, 2024 17:25:20.906574011 CEST192.168.2.71.1.1.1c200(Port unreachable)Destination Unreachable
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Oct 2, 2024 17:25:16.425014019 CEST192.168.2.71.1.1.10x2f3dStandard query (0)youtube.comA (IP address)IN (0x0001)false
                                                          Oct 2, 2024 17:25:16.425426960 CEST192.168.2.71.1.1.10x3c9fStandard query (0)youtube.com65IN (0x0001)false
                                                          Oct 2, 2024 17:25:17.833370924 CEST192.168.2.71.1.1.10xc5efStandard query (0)www.youtube.comA (IP address)IN (0x0001)false
                                                          Oct 2, 2024 17:25:17.833370924 CEST192.168.2.71.1.1.10x8024Standard query (0)www.youtube.com65IN (0x0001)false
                                                          Oct 2, 2024 17:25:20.135124922 CEST192.168.2.71.1.1.10xc04eStandard query (0)www.google.comA (IP address)IN (0x0001)false
                                                          Oct 2, 2024 17:25:20.135432959 CEST192.168.2.71.1.1.10x9ea9Standard query (0)www.google.com65IN (0x0001)false
                                                          Oct 2, 2024 17:25:27.694005013 CEST192.168.2.71.1.1.10x63b5Standard query (0)accounts.youtube.comA (IP address)IN (0x0001)false
                                                          Oct 2, 2024 17:25:27.694286108 CEST192.168.2.71.1.1.10x877fStandard query (0)accounts.youtube.com65IN (0x0001)false
                                                          Oct 2, 2024 17:25:29.485909939 CEST192.168.2.71.1.1.10x64eaStandard query (0)play.google.comA (IP address)IN (0x0001)false
                                                          Oct 2, 2024 17:25:29.486110926 CEST192.168.2.71.1.1.10x5748Standard query (0)play.google.com65IN (0x0001)false
                                                          Oct 2, 2024 17:26:30.607570887 CEST192.168.2.71.1.1.10x3bc6Standard query (0)play.google.comA (IP address)IN (0x0001)false
                                                          Oct 2, 2024 17:26:30.607717991 CEST192.168.2.71.1.1.10x22b4Standard query (0)play.google.com65IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Oct 2, 2024 17:25:16.509455919 CEST1.1.1.1192.168.2.70x2f3dNo error (0)youtube.com142.250.185.142A (IP address)IN (0x0001)false
                                                          Oct 2, 2024 17:25:16.509661913 CEST1.1.1.1192.168.2.70x3c9fNo error (0)youtube.com65IN (0x0001)false
                                                          Oct 2, 2024 17:25:17.840100050 CEST1.1.1.1192.168.2.70x8024No error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                          Oct 2, 2024 17:25:17.840100050 CEST1.1.1.1192.168.2.70x8024No error (0)youtube-ui.l.google.com65IN (0x0001)false
                                                          Oct 2, 2024 17:25:17.840325117 CEST1.1.1.1192.168.2.70xc5efNo error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                          Oct 2, 2024 17:25:17.840325117 CEST1.1.1.1192.168.2.70xc5efNo error (0)youtube-ui.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                                                          Oct 2, 2024 17:25:17.840325117 CEST1.1.1.1192.168.2.70xc5efNo error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                                                          Oct 2, 2024 17:25:17.840325117 CEST1.1.1.1192.168.2.70xc5efNo error (0)youtube-ui.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                                          Oct 2, 2024 17:25:17.840325117 CEST1.1.1.1192.168.2.70xc5efNo error (0)youtube-ui.l.google.com142.250.181.238A (IP address)IN (0x0001)false
                                                          Oct 2, 2024 17:25:17.840325117 CEST1.1.1.1192.168.2.70xc5efNo error (0)youtube-ui.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                                                          Oct 2, 2024 17:25:17.840325117 CEST1.1.1.1192.168.2.70xc5efNo error (0)youtube-ui.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                                                          Oct 2, 2024 17:25:17.840325117 CEST1.1.1.1192.168.2.70xc5efNo error (0)youtube-ui.l.google.com142.250.185.110A (IP address)IN (0x0001)false
                                                          Oct 2, 2024 17:25:17.840325117 CEST1.1.1.1192.168.2.70xc5efNo error (0)youtube-ui.l.google.com216.58.212.142A (IP address)IN (0x0001)false
                                                          Oct 2, 2024 17:25:17.840325117 CEST1.1.1.1192.168.2.70xc5efNo error (0)youtube-ui.l.google.com142.250.185.238A (IP address)IN (0x0001)false
                                                          Oct 2, 2024 17:25:17.840325117 CEST1.1.1.1192.168.2.70xc5efNo error (0)youtube-ui.l.google.com216.58.206.78A (IP address)IN (0x0001)false
                                                          Oct 2, 2024 17:25:17.840325117 CEST1.1.1.1192.168.2.70xc5efNo error (0)youtube-ui.l.google.com142.250.184.206A (IP address)IN (0x0001)false
                                                          Oct 2, 2024 17:25:17.840325117 CEST1.1.1.1192.168.2.70xc5efNo error (0)youtube-ui.l.google.com216.58.206.46A (IP address)IN (0x0001)false
                                                          Oct 2, 2024 17:25:17.840325117 CEST1.1.1.1192.168.2.70xc5efNo error (0)youtube-ui.l.google.com142.250.186.142A (IP address)IN (0x0001)false
                                                          Oct 2, 2024 17:25:17.840325117 CEST1.1.1.1192.168.2.70xc5efNo error (0)youtube-ui.l.google.com142.250.185.78A (IP address)IN (0x0001)false
                                                          Oct 2, 2024 17:25:17.840325117 CEST1.1.1.1192.168.2.70xc5efNo error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                                                          Oct 2, 2024 17:25:17.840325117 CEST1.1.1.1192.168.2.70xc5efNo error (0)youtube-ui.l.google.com142.250.186.78A (IP address)IN (0x0001)false
                                                          Oct 2, 2024 17:25:20.540595055 CEST1.1.1.1192.168.2.70xc04eNo error (0)www.google.com142.250.184.196A (IP address)IN (0x0001)false
                                                          Oct 2, 2024 17:25:20.906301022 CEST1.1.1.1192.168.2.70x9ea9No error (0)www.google.com65IN (0x0001)false
                                                          Oct 2, 2024 17:25:27.701082945 CEST1.1.1.1192.168.2.70x63b5No error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                          Oct 2, 2024 17:25:27.701082945 CEST1.1.1.1192.168.2.70x63b5No error (0)www3.l.google.com216.58.206.46A (IP address)IN (0x0001)false
                                                          Oct 2, 2024 17:25:27.701098919 CEST1.1.1.1192.168.2.70x877fNo error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                          Oct 2, 2024 17:25:29.493268967 CEST1.1.1.1192.168.2.70x64eaNo error (0)play.google.com216.58.206.46A (IP address)IN (0x0001)false
                                                          Oct 2, 2024 17:26:30.614343882 CEST1.1.1.1192.168.2.70x3bc6No error (0)play.google.com142.250.186.174A (IP address)IN (0x0001)false
                                                          • youtube.com
                                                          • www.youtube.com
                                                          • fs.microsoft.com
                                                          • https:
                                                            • accounts.youtube.com
                                                            • play.google.com
                                                            • www.google.com
                                                          • slscr.update.microsoft.com
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.749699142.250.185.1424437892C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-10-02 15:25:17 UTC839OUTGET /account?=https://accounts.google.com/v3/signin/challenge/pwd HTTP/1.1
                                                          Host: youtube.com
                                                          Connection: keep-alive
                                                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                          sec-ch-ua-mobile: ?0
                                                          sec-ch-ua-platform: "Windows"
                                                          Upgrade-Insecure-Requests: 1
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          X-Client-Data: CI62yQEIpLbJAQipncoBCNrwygEIkqHLAQiFoM0BCNy9zQEIucrNAQii0c0BCIrTzQEIpNbNAQj01s0BCKfYzQEI+cDUFRj1yc0BGOuNpRc=
                                                          Sec-Fetch-Site: none
                                                          Sec-Fetch-Mode: navigate
                                                          Sec-Fetch-User: ?1
                                                          Sec-Fetch-Dest: document
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US,en;q=0.9
                                                          2024-10-02 15:25:17 UTC1704INHTTP/1.1 301 Moved Permanently
                                                          Content-Type: application/binary
                                                          X-Content-Type-Options: nosniff
                                                          Expires: Wed, 02 Oct 2024 15:25:17 GMT
                                                          Date: Wed, 02 Oct 2024 15:25:17 GMT
                                                          Cache-Control: private, max-age=31536000
                                                          Location: https://www.youtube.com/account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd
                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                          X-Frame-Options: SAMEORIGIN
                                                          Origin-Trial: AmhMBR6zCLzDDxpW+HfpP67BqwIknWnyMOXOQGfzYswFmJe+fgaI6XZgAzcxOrzNtP7hEDsOo1jdjFnVr2IdxQ4AAAB4eyJvcmlnaW4iOiJodHRwczovL3lvdXR1YmUuY29tOjQ0MyIsImZlYXR1cmUiOiJXZWJWaWV3WFJlcXVlc3RlZFdpdGhEZXByZWNhdGlvbiIsImV4cGlyeSI6MTc1ODA2NzE5OSwiaXNTdWJkb21haW4iOnRydWV9
                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                          Vary: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                          Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="youtube_main"
                                                          Content-Security-Policy: require-trusted-types-for 'script'
                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                          Report-To: {"group":"youtube_main","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/youtube_main"}]}
                                                          Server: ESF
                                                          Content-Length: 0
                                                          X-XSS-Protection: 0
                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                          Connection: close


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          1192.168.2.749705142.250.184.2384437892C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-10-02 15:25:18 UTC857OUTGET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1
                                                          Host: www.youtube.com
                                                          Connection: keep-alive
                                                          Upgrade-Insecure-Requests: 1
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          X-Client-Data: CI62yQEIpLbJAQipncoBCNrwygEIkqHLAQiFoM0BCNy9zQEIucrNAQii0c0BCIrTzQEIpNbNAQj01s0BCKfYzQEI+cDUFRj1yc0BGOuNpRc=
                                                          Sec-Fetch-Site: none
                                                          Sec-Fetch-Mode: navigate
                                                          Sec-Fetch-User: ?1
                                                          Sec-Fetch-Dest: document
                                                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                          sec-ch-ua-mobile: ?0
                                                          sec-ch-ua-platform: "Windows"
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US,en;q=0.9
                                                          2024-10-02 15:25:18 UTC2634INHTTP/1.1 303 See Other
                                                          Content-Type: application/binary
                                                          X-Content-Type-Options: nosniff
                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                          Pragma: no-cache
                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                          Date: Wed, 02 Oct 2024 15:25:18 GMT
                                                          Location: https://accounts.google.com/ServiceLogin?service=youtube&uilel=3&passive=true&continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%253F%253Dhttps%25253A%25252F%25252Faccounts.google.com%25252Fv3%25252Fsignin%25252Fchallenge%25252Fpwd%26feature%3Dredirect_login&hl=en
                                                          Strict-Transport-Security: max-age=31536000
                                                          X-Frame-Options: SAMEORIGIN
                                                          Origin-Trial: AmhMBR6zCLzDDxpW+HfpP67BqwIknWnyMOXOQGfzYswFmJe+fgaI6XZgAzcxOrzNtP7hEDsOo1jdjFnVr2IdxQ4AAAB4eyJvcmlnaW4iOiJodHRwczovL3lvdXR1YmUuY29tOjQ0MyIsImZlYXR1cmUiOiJXZWJWaWV3WFJlcXVlc3RlZFdpdGhEZXByZWNhdGlvbiIsImV4cGlyeSI6MTc1ODA2NzE5OSwiaXNTdWJkb21haW4iOnRydWV9
                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                          Vary: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                          Report-To: {"group":"youtube_main","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/youtube_main"}]}
                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                          Content-Security-Policy: require-trusted-types-for 'script'
                                                          Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="youtube_main"
                                                          P3P: CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657?hl=en for more info."
                                                          Server: ESF
                                                          Content-Length: 0
                                                          X-XSS-Protection: 0
                                                          Set-Cookie: GPS=1; Domain=.youtube.com; Expires=Wed, 02-Oct-2024 15:55:18 GMT; Path=/; Secure; HttpOnly
                                                          Set-Cookie: YSC=M0d4Ex7jejw; Domain=.youtube.com; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                                          Set-Cookie: VISITOR_INFO1_LIVE=JA3pLARLv_4; Domain=.youtube.com; Expires=Mon, 31-Mar-2025 15:25:18 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                                          Set-Cookie: VISITOR_PRIVACY_METADATA=CgJVUxIEGgAgPg%3D%3D; Domain=.youtube.com; Expires=Mon, 31-Mar-2025 15:25:18 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                          Connection: close


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          2192.168.2.749710184.28.90.27443
                                                          TimestampBytes transferredDirectionData
                                                          2024-10-02 15:25:22 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Accept: */*
                                                          Accept-Encoding: identity
                                                          User-Agent: Microsoft BITS/7.8
                                                          Host: fs.microsoft.com
                                                          2024-10-02 15:25:22 UTC466INHTTP/1.1 200 OK
                                                          Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                                          Content-Type: application/octet-stream
                                                          ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                                          Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                                          Server: ECAcc (lpl/EF06)
                                                          X-CID: 11
                                                          X-Ms-ApiVersion: Distribute 1.2
                                                          X-Ms-Region: prod-neu-z1
                                                          Cache-Control: public, max-age=91228
                                                          Date: Wed, 02 Oct 2024 15:25:22 GMT
                                                          Connection: close
                                                          X-CID: 2


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          3192.168.2.749712184.28.90.27443
                                                          TimestampBytes transferredDirectionData
                                                          2024-10-02 15:25:23 UTC239OUTGET /fs/windows/config.json HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Accept: */*
                                                          Accept-Encoding: identity
                                                          If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
                                                          Range: bytes=0-2147483646
                                                          User-Agent: Microsoft BITS/7.8
                                                          Host: fs.microsoft.com
                                                          2024-10-02 15:25:23 UTC514INHTTP/1.1 200 OK
                                                          ApiVersion: Distribute 1.1
                                                          Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                                          Content-Type: application/octet-stream
                                                          ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                                          Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                                          Server: ECAcc (lpl/EF06)
                                                          X-CID: 11
                                                          X-Ms-ApiVersion: Distribute 1.2
                                                          X-Ms-Region: prod-weu-z1
                                                          Cache-Control: public, max-age=91171
                                                          Date: Wed, 02 Oct 2024 15:25:23 GMT
                                                          Content-Length: 55
                                                          Connection: close
                                                          X-CID: 2
                                                          2024-10-02 15:25:23 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
                                                          Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          4192.168.2.749727216.58.206.464437892C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-10-02 15:25:28 UTC1225OUTGET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=-1188319909&timestamp=1727882727176 HTTP/1.1
                                                          Host: accounts.youtube.com
                                                          Connection: keep-alive
                                                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                          sec-ch-ua-mobile: ?0
                                                          sec-ch-ua-full-version: "117.0.5938.134"
                                                          sec-ch-ua-arch: "x86"
                                                          sec-ch-ua-platform: "Windows"
                                                          sec-ch-ua-platform-version: "10.0.0"
                                                          sec-ch-ua-model: ""
                                                          sec-ch-ua-bitness: "64"
                                                          sec-ch-ua-wow64: ?0
                                                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                                          Upgrade-Insecure-Requests: 1
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          X-Client-Data: CI62yQEIpLbJAQipncoBCNrwygEIkqHLAQiFoM0BCNy9zQEIucrNAQii0c0BCIrTzQEIpNbNAQj01s0BCKfYzQEI+cDUFRj1yc0BGOuNpRc=
                                                          Sec-Fetch-Site: cross-site
                                                          Sec-Fetch-Mode: navigate
                                                          Sec-Fetch-User: ?1
                                                          Sec-Fetch-Dest: iframe
                                                          Referer: https://accounts.google.com/
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US,en;q=0.9
                                                          2024-10-02 15:25:28 UTC1969INHTTP/1.1 200 OK
                                                          Content-Type: text/html; charset=utf-8
                                                          X-Frame-Options: ALLOW-FROM https://accounts.google.com
                                                          Content-Security-Policy: frame-ancestors https://accounts.google.com
                                                          Content-Security-Policy: script-src 'report-sample' 'nonce-2VL_Oj4xNbIM4HrxpuN7eQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport;worker-src 'self'
                                                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport/allowlist
                                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport
                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                          Pragma: no-cache
                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                          Date: Wed, 02 Oct 2024 15:25:28 GMT
                                                          Cross-Origin-Opener-Policy: same-origin
                                                          Cross-Origin-Resource-Policy: cross-origin
                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                          reporting-endpoints: default="/_/AccountsDomainCookiesCheckConnectionHttp/web-reports?context=eJzjstDikmLw05BikPj6kkkDiJ3SZ7AGAXHSv_OsRUB8ufsS63UgVu25xGoKxEUSV1ibgFiIh-PF6a_b2QQWnL-1nFlJLym_MD4zJTWvJLOkMiU_NzEzLzk_Pzsztbg4tagstSjeyMDIxMDSyEjPwCK-wAAA_houBw"
                                                          Server: ESF
                                                          X-XSS-Protection: 0
                                                          X-Content-Type-Options: nosniff
                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                          Accept-Ranges: none
                                                          Vary: Accept-Encoding
                                                          Connection: close
                                                          Transfer-Encoding: chunked
                                                          2024-10-02 15:25:28 UTC1969INData Raw: 37 36 31 39 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 20 6e 6f 6e 63 65 3d 22 32 56 4c 5f 4f 6a 34 78 4e 62 49 4d 34 48 72 78 70 75 4e 37 65 51 22 3e 22 75 73 65 20 73 74 72 69 63 74 22 3b 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 3d 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 7c 7c 7b 7d 3b 28 66 75 6e 63 74 69 6f 6e 28 5f 29 7b 76 61 72 20 77 69 6e 64 6f 77 3d 74 68 69 73 3b 0a 74 72 79 7b 0a 5f 2e 5f 46 5f 74 6f 67 67 6c 65 73 5f 69 6e 69 74 69 61 6c 69 7a 65 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 28 74 79 70 65 6f
                                                          Data Ascii: 7619<html><head><script nonce="2VL_Oj4xNbIM4HrxpuN7eQ">"use strict";this.default_AccountsDomaincookiesCheckconnectionJs=this.default_AccountsDomaincookiesCheckconnectionJs||{};(function(_){var window=this;try{_._F_toggles_initialize=function(a){(typeo
                                                          2024-10-02 15:25:28 UTC1969INData Raw: 54 72 69 64 65 6e 74 5c 2f 28 5c 64 2e 5c 64 29 2f 2e 65 78 65 63 28 62 29 2c 0a 63 5b 31 5d 3d 3d 22 37 2e 30 22 29 69 66 28 62 26 26 62 5b 31 5d 29 73 77 69 74 63 68 28 62 5b 31 5d 29 7b 63 61 73 65 20 22 34 2e 30 22 3a 61 3d 22 38 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 35 2e 30 22 3a 61 3d 22 39 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 36 2e 30 22 3a 61 3d 22 31 30 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 37 2e 30 22 3a 61 3d 22 31 31 2e 30 22 7d 65 6c 73 65 20 61 3d 22 37 2e 30 22 3b 65 6c 73 65 20 61 3d 63 5b 31 5d 3b 62 3d 61 7d 65 6c 73 65 20 62 3d 22 22 3b 72 65 74 75 72 6e 20 62 7d 76 61 72 20 64 3d 52 65 67 45 78 70 28 22 28 5b 41 2d 5a 5d 5b 5c 5c 77 20 5d 2b 29 2f 28 5b 5e 5c 5c 73 5d 2b 29 5c 5c 73 2a 28 3f 3a 5c 5c 28
                                                          Data Ascii: Trident\/(\d.\d)/.exec(b),c[1]=="7.0")if(b&&b[1])switch(b[1]){case "4.0":a="8.0";break;case "5.0":a="9.0";break;case "6.0":a="10.0";break;case "7.0":a="11.0"}else a="7.0";else a=c[1];b=a}else b="";return b}var d=RegExp("([A-Z][\\w ]+)/([^\\s]+)\\s*(?:\\(
                                                          2024-10-02 15:25:29 UTC1969INData Raw: 74 63 68 28 74 79 70 65 6f 66 20 61 29 7b 63 61 73 65 20 22 6e 75 6d 62 65 72 22 3a 72 65 74 75 72 6e 20 69 73 46 69 6e 69 74 65 28 61 29 3f 61 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 69 67 69 6e 74 22 3a 72 65 74 75 72 6e 28 41 61 3f 0a 61 3e 3d 42 61 26 26 61 3c 3d 43 61 3a 61 5b 30 5d 3d 3d 3d 22 2d 22 3f 75 61 28 61 2c 44 61 29 3a 75 61 28 61 2c 45 61 29 29 3f 4e 75 6d 62 65 72 28 61 29 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 72 65 74 75 72 6e 20 61 3f 31 3a 30 3b 63 61 73 65 20 22 6f 62 6a 65 63 74 22 3a 69 66 28 61 29 69 66 28 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 61 29 29 7b 69 66 28 43 28 61 29 29 72 65 74 75 72 6e 7d 65 6c 73 65 20 69 66 28 46 61 26 26 61 21 3d 6e 75 6c 6c 26 26 61 20 69 6e
                                                          Data Ascii: tch(typeof a){case "number":return isFinite(a)?a:String(a);case "bigint":return(Aa?a>=Ba&&a<=Ca:a[0]==="-"?ua(a,Da):ua(a,Ea))?Number(a):String(a);case "boolean":return a?1:0;case "object":if(a)if(Array.isArray(a)){if(C(a))return}else if(Fa&&a!=null&&a in
                                                          2024-10-02 15:25:29 UTC1969INData Raw: 7b 76 61 72 20 62 3b 69 66 28 61 26 26 28 62 3d 51 61 29 21 3d 6e 75 6c 6c 26 26 62 2e 68 61 73 28 61 29 26 26 28 62 3d 61 2e 43 29 29 66 6f 72 28 76 61 72 20 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 62 5b 63 5d 3b 69 66 28 63 3d 3d 3d 62 2e 6c 65 6e 67 74 68 2d 31 26 26 41 28 64 29 29 66 6f 72 28 76 61 72 20 65 20 69 6e 20 64 29 7b 76 61 72 20 66 3d 64 5b 65 5d 3b 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 66 29 26 26 0a 52 61 28 66 2c 61 29 7d 65 6c 73 65 20 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 64 29 26 26 52 61 28 64 2c 61 29 7d 61 3d 45 3f 61 2e 43 3a 4d 61 28 61 2e 43 2c 50 61 2c 76 6f 69 64 20 30 2c 76 6f 69 64 20 30 2c 21 31 29 3b 65 3d 21 45 3b 69 66 28 62 3d 61 2e 6c 65 6e 67 74 68 29 7b 64 3d 61 5b 62 2d
                                                          Data Ascii: {var b;if(a&&(b=Qa)!=null&&b.has(a)&&(b=a.C))for(var c=0;c<b.length;c++){var d=b[c];if(c===b.length-1&&A(d))for(var e in d){var f=d[e];Array.isArray(f)&&Ra(f,a)}else Array.isArray(d)&&Ra(d,a)}a=E?a.C:Ma(a.C,Pa,void 0,void 0,!1);e=!E;if(b=a.length){d=a[b-
                                                          2024-10-02 15:25:29 UTC1969INData Raw: 6f 6c 2e 69 74 65 72 61 74 6f 72 22 2c 66 75 6e 63 74 69 6f 6e 28 61 29 7b 69 66 28 61 29 72 65 74 75 72 6e 20 61 3b 61 3d 53 79 6d 62 6f 6c 28 22 63 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 22 41 72 72 61 79 20 49 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 43 6c 61 6d 70 65 64 41 72 72 61 79 20 49 6e 74 31 36 41 72 72 61 79 20 55 69 6e 74 31 36 41 72 72 61 79 20 49 6e 74 33 32 41 72 72 61 79 20 55 69 6e 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 36 34 41 72 72 61 79 22 2e 73 70 6c 69 74 28 22 20 22 29 2c 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 57 61 5b 62 5b 63 5d 5d 3b 74 79 70 65 6f 66 20 64 3d 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 26 26 74 79 70 65
                                                          Data Ascii: ol.iterator",function(a){if(a)return a;a=Symbol("c");for(var b="Array Int8Array Uint8Array Uint8ClampedArray Int16Array Uint16Array Int32Array Uint32Array Float32Array Float64Array".split(" "),c=0;c<b.length;c++){var d=Wa[b[c]];typeof d==="function"&&type
                                                          2024-10-02 15:25:29 UTC1969INData Raw: 29 3b 65 28 22 66 72 65 65 7a 65 22 29 3b 65 28 22 70 72 65 76 65 6e 74 45 78 74 65 6e 73 69 6f 6e 73 22 29 3b 65 28 22 73 65 61 6c 22 29 3b 76 61 72 20 68 3d 30 2c 67 3d 66 75 6e 63 74 69 6f 6e 28 6b 29 7b 74 68 69 73 2e 67 3d 28 68 2b 3d 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2b 31 29 2e 74 6f 53 74 72 69 6e 67 28 29 3b 69 66 28 6b 29 7b 6b 3d 48 28 6b 29 3b 66 6f 72 28 76 61 72 20 6c 3b 21 28 6c 3d 6b 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6c 3d 6c 2e 76 61 6c 75 65 2c 74 68 69 73 2e 73 65 74 28 6c 5b 30 5d 2c 6c 5b 31 5d 29 7d 7d 3b 67 2e 70 72 6f 74 6f 74 79 70 65 2e 73 65 74 3d 66 75 6e 63 74 69 6f 6e 28 6b 2c 6c 29 7b 69 66 28 21 63 28 6b 29 29 74 68 72 6f 77 20 45 72 72 6f 72 28 22 69 22 29 3b 64 28 6b 29 3b 69 66 28 21 49 28 6b 2c 66 29 29
                                                          Data Ascii: );e("freeze");e("preventExtensions");e("seal");var h=0,g=function(k){this.g=(h+=Math.random()+1).toString();if(k){k=H(k);for(var l;!(l=k.next()).done;)l=l.value,this.set(l[0],l[1])}};g.prototype.set=function(k,l){if(!c(k))throw Error("i");d(k);if(!I(k,f))
                                                          2024-10-02 15:25:29 UTC1969INData Raw: 75 72 6e 20 67 2e 76 61 6c 75 65 7d 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 2e 66 6f 72 45 61 63 68 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 66 6f 72 28 76 61 72 20 6c 3d 74 68 69 73 2e 65 6e 74 72 69 65 73 28 29 2c 6d 3b 21 28 6d 3d 6c 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6d 3d 0a 6d 2e 76 61 6c 75 65 2c 67 2e 63 61 6c 6c 28 6b 2c 6d 5b 31 5d 2c 6d 5b 30 5d 2c 74 68 69 73 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 5b 53 79 6d 62 6f 6c 2e 69 74 65 72 61 74 6f 72 5d 3d 63 2e 70 72 6f 74 6f 74 79 70 65 2e 65 6e 74 72 69 65 73 3b 76 61 72 20 64 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 76 61 72 20 6c 3d 6b 26 26 74 79 70 65 6f 66 20 6b 3b 6c 3d 3d 22 6f 62 6a 65 63 74 22 7c 7c 6c 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 3f 62 2e 68 61 73 28 6b 29
                                                          Data Ascii: urn g.value})};c.prototype.forEach=function(g,k){for(var l=this.entries(),m;!(m=l.next()).done;)m=m.value,g.call(k,m[1],m[0],this)};c.prototype[Symbol.iterator]=c.prototype.entries;var d=function(g,k){var l=k&&typeof k;l=="object"||l=="function"?b.has(k)
                                                          2024-10-02 15:25:29 UTC1969INData Raw: 6f 6e 28 61 29 7b 72 65 74 75 72 6e 20 61 3f 61 3a 66 75 6e 63 74 69 6f 6e 28 62 29 7b 72 65 74 75 72 6e 20 74 79 70 65 6f 66 20 62 3d 3d 3d 22 6e 75 6d 62 65 72 22 26 26 69 73 4e 61 4e 28 62 29 7d 7d 29 3b 76 61 72 20 66 62 3d 66 62 7c 7c 7b 7d 2c 71 3d 74 68 69 73 7c 7c 73 65 6c 66 2c 67 62 3d 71 2e 5f 46 5f 74 6f 67 67 6c 65 73 7c 7c 5b 5d 2c 68 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 61 3d 61 2e 73 70 6c 69 74 28 22 2e 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 71 2c 63 3d 30 3b 63 3c 61 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 69 66 28 62 3d 62 5b 61 5b 63 5d 5d 2c 62 3d 3d 6e 75 6c 6c 29 72 65 74 75 72 6e 20 6e 75 6c 6c 3b 72 65 74 75 72 6e 20 62 7d 2c 69 62 3d 22 63 6c 6f 73 75 72 65 5f 75 69 64 5f 22 2b 28 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2a 31 45
                                                          Data Ascii: on(a){return a?a:function(b){return typeof b==="number"&&isNaN(b)}});var fb=fb||{},q=this||self,gb=q._F_toggles||[],hb=function(a){a=a.split(".");for(var b=q,c=0;c<a.length;c++)if(b=b[a[c]],b==null)return null;return b},ib="closure_uid_"+(Math.random()*1E
                                                          2024-10-02 15:25:29 UTC1969INData Raw: 74 65 78 74 5f 5f 39 38 34 33 38 32 3d 7b 7d 29 3b 61 2e 5f 5f 63 6c 6f 73 75 72 65 5f 5f 65 72 72 6f 72 5f 5f 63 6f 6e 74 65 78 74 5f 5f 39 38 34 33 38 32 2e 73 65 76 65 72 69 74 79 3d 62 7d 3b 76 61 72 20 71 62 3d 66 75 6e 63 74 69 6f 6e 28 61 2c 62 2c 63 29 7b 63 3d 63 7c 7c 71 3b 76 61 72 20 64 3d 63 2e 6f 6e 65 72 72 6f 72 2c 65 3d 21 21 62 3b 63 2e 6f 6e 65 72 72 6f 72 3d 66 75 6e 63 74 69 6f 6e 28 66 2c 68 2c 67 2c 6b 2c 6c 29 7b 64 26 26 64 28 66 2c 68 2c 67 2c 6b 2c 6c 29 3b 61 28 7b 6d 65 73 73 61 67 65 3a 66 2c 66 69 6c 65 4e 61 6d 65 3a 68 2c 6c 69 6e 65 3a 67 2c 6c 69 6e 65 4e 75 6d 62 65 72 3a 67 2c 63 61 3a 6b 2c 65 72 72 6f 72 3a 6c 7d 29 3b 72 65 74 75 72 6e 20 65 7d 7d 2c 74 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 76 61 72 20 62 3d 68
                                                          Data Ascii: text__984382={});a.__closure__error__context__984382.severity=b};var qb=function(a,b,c){c=c||q;var d=c.onerror,e=!!b;c.onerror=function(f,h,g,k,l){d&&d(f,h,g,k,l);a({message:f,fileName:h,line:g,lineNumber:g,ca:k,error:l});return e}},tb=function(a){var b=h
                                                          2024-10-02 15:25:29 UTC1969INData Raw: 22 6e 75 6d 62 65 72 22 3a 66 3d 53 74 72 69 6e 67 28 66 29 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 66 3d 66 3f 22 74 72 75 65 22 3a 22 66 61 6c 73 65 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 66 75 6e 63 74 69 6f 6e 22 3a 66 3d 28 66 3d 73 62 28 66 29 29 3f 66 3a 22 5b 66 6e 5d 22 3b 62 72 65 61 6b 3b 64 65 66 61 75 6c 74 3a 66 3d 0a 74 79 70 65 6f 66 20 66 7d 66 2e 6c 65 6e 67 74 68 3e 34 30 26 26 28 66 3d 66 2e 73 6c 69 63 65 28 30 2c 34 30 29 2b 22 2e 2e 2e 22 29 3b 63 2e 70 75 73 68 28 66 29 7d 62 2e 70 75 73 68 28 61 29 3b 63 2e 70 75 73 68 28 22 29 5c 6e 22 29 3b 74 72 79 7b 63 2e 70 75 73 68 28 77 62 28 61 2e 63 61 6c 6c 65 72 2c 62 29 29 7d 63 61 74 63 68 28 68 29 7b 63 2e 70 75 73 68 28 22 5b 65 78 63 65 70 74 69 6f 6e
                                                          Data Ascii: "number":f=String(f);break;case "boolean":f=f?"true":"false";break;case "function":f=(f=sb(f))?f:"[fn]";break;default:f=typeof f}f.length>40&&(f=f.slice(0,40)+"...");c.push(f)}b.push(a);c.push(")\n");try{c.push(wb(a.caller,b))}catch(h){c.push("[exception


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          5192.168.2.749734216.58.206.464437892C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-10-02 15:25:30 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                          Host: play.google.com
                                                          Connection: keep-alive
                                                          Accept: */*
                                                          Access-Control-Request-Method: POST
                                                          Access-Control-Request-Headers: x-goog-authuser
                                                          Origin: https://accounts.google.com
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                          Sec-Fetch-Mode: cors
                                                          Sec-Fetch-Site: same-site
                                                          Sec-Fetch-Dest: empty
                                                          Referer: https://accounts.google.com/
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US,en;q=0.9
                                                          2024-10-02 15:25:30 UTC520INHTTP/1.1 200 OK
                                                          Access-Control-Allow-Origin: https://accounts.google.com
                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                          Access-Control-Max-Age: 86400
                                                          Access-Control-Allow-Credentials: true
                                                          Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                                                          Content-Type: text/plain; charset=UTF-8
                                                          Date: Wed, 02 Oct 2024 15:25:30 GMT
                                                          Server: Playlog
                                                          Content-Length: 0
                                                          X-XSS-Protection: 0
                                                          X-Frame-Options: SAMEORIGIN
                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                          Connection: close


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          6192.168.2.749733216.58.206.464437892C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-10-02 15:25:30 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                          Host: play.google.com
                                                          Connection: keep-alive
                                                          Accept: */*
                                                          Access-Control-Request-Method: POST
                                                          Access-Control-Request-Headers: x-goog-authuser
                                                          Origin: https://accounts.google.com
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                          Sec-Fetch-Mode: cors
                                                          Sec-Fetch-Site: same-site
                                                          Sec-Fetch-Dest: empty
                                                          Referer: https://accounts.google.com/
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US,en;q=0.9
                                                          2024-10-02 15:25:30 UTC520INHTTP/1.1 200 OK
                                                          Access-Control-Allow-Origin: https://accounts.google.com
                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                          Access-Control-Max-Age: 86400
                                                          Access-Control-Allow-Credentials: true
                                                          Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                                                          Content-Type: text/plain; charset=UTF-8
                                                          Date: Wed, 02 Oct 2024 15:25:30 GMT
                                                          Server: Playlog
                                                          Content-Length: 0
                                                          X-XSS-Protection: 0
                                                          X-Frame-Options: SAMEORIGIN
                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                          Connection: close


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          7192.168.2.7497294.175.87.197443
                                                          TimestampBytes transferredDirectionData
                                                          2024-10-02 15:25:30 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=NX1ndAXlaDB8kh2&MD=FnRvyOlh HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Accept: */*
                                                          User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                                          Host: slscr.update.microsoft.com
                                                          2024-10-02 15:25:30 UTC560INHTTP/1.1 200 OK
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Content-Type: application/octet-stream
                                                          Expires: -1
                                                          Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                                          ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                                                          MS-CorrelationId: 641dda1d-36a8-48cc-bcc8-f22a6e458bdf
                                                          MS-RequestId: 7afe5c08-ac65-4a1d-ba27-4d2d93f83014
                                                          MS-CV: qQ8VYO5Kx0i29ccd.0
                                                          X-Microsoft-SLSClientCache: 2880
                                                          Content-Disposition: attachment; filename=environment.cab
                                                          X-Content-Type-Options: nosniff
                                                          Date: Wed, 02 Oct 2024 15:25:30 GMT
                                                          Connection: close
                                                          Content-Length: 24490
                                                          2024-10-02 15:25:30 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                                                          Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                                                          2024-10-02 15:25:30 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                                                          Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          8192.168.2.749739216.58.206.464437892C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-10-02 15:25:31 UTC1112OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                          Host: play.google.com
                                                          Connection: keep-alive
                                                          Content-Length: 519
                                                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                          sec-ch-ua-mobile: ?0
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                          sec-ch-ua-arch: "x86"
                                                          Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                          sec-ch-ua-full-version: "117.0.5938.134"
                                                          sec-ch-ua-platform-version: "10.0.0"
                                                          X-Goog-AuthUser: 0
                                                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                                          sec-ch-ua-bitness: "64"
                                                          sec-ch-ua-model: ""
                                                          sec-ch-ua-wow64: ?0
                                                          sec-ch-ua-platform: "Windows"
                                                          Accept: */*
                                                          Origin: https://accounts.google.com
                                                          X-Client-Data: CI62yQEIpLbJAQipncoBCNrwygEIkqHLAQiFoM0BCNy9zQEIucrNAQii0c0BCIrTzQEIpNbNAQj01s0BCKfYzQEI+cDUFRj1yc0BGOuNpRc=
                                                          Sec-Fetch-Site: same-site
                                                          Sec-Fetch-Mode: cors
                                                          Sec-Fetch-Dest: empty
                                                          Referer: https://accounts.google.com/
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US,en;q=0.9
                                                          2024-10-02 15:25:31 UTC519OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 32 37 32 38 39 37 34 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                          Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1727882728974",null,null,null
                                                          2024-10-02 15:25:31 UTC932INHTTP/1.1 200 OK
                                                          Access-Control-Allow-Origin: https://accounts.google.com
                                                          Cross-Origin-Resource-Policy: cross-origin
                                                          Access-Control-Allow-Credentials: true
                                                          Access-Control-Allow-Headers: X-Playlog-Web
                                                          Set-Cookie: NID=518=0q-UFb1XL5lCNGvBEEYMQB8VakjZMseXXLsuJcge1IWzqXgm-9QBZzCuSvgsgAlW1zPXvSWvS7EeOfHSUA8sunmFOZhocADLlUVM5HzEyyd2V3s4LqQ_5zB2se4XQKLXQsi3C0achYZvSeKU6WMb6GIjqwBDQlv31Z3uWMs6PF1EoCy2TA; expires=Thu, 03-Apr-2025 15:25:31 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                          P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                          Content-Type: text/plain; charset=UTF-8
                                                          Date: Wed, 02 Oct 2024 15:25:31 GMT
                                                          Server: Playlog
                                                          Cache-Control: private
                                                          X-XSS-Protection: 0
                                                          X-Frame-Options: SAMEORIGIN
                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                          Accept-Ranges: none
                                                          Vary: Accept-Encoding
                                                          Expires: Wed, 02 Oct 2024 15:25:31 GMT
                                                          Connection: close
                                                          Transfer-Encoding: chunked
                                                          2024-10-02 15:25:31 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                          Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                          2024-10-02 15:25:31 UTC5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          9192.168.2.749740216.58.206.464437892C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-10-02 15:25:31 UTC1112OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                          Host: play.google.com
                                                          Connection: keep-alive
                                                          Content-Length: 519
                                                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                          sec-ch-ua-mobile: ?0
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                          sec-ch-ua-arch: "x86"
                                                          Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                          sec-ch-ua-full-version: "117.0.5938.134"
                                                          sec-ch-ua-platform-version: "10.0.0"
                                                          X-Goog-AuthUser: 0
                                                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                                          sec-ch-ua-bitness: "64"
                                                          sec-ch-ua-model: ""
                                                          sec-ch-ua-wow64: ?0
                                                          sec-ch-ua-platform: "Windows"
                                                          Accept: */*
                                                          Origin: https://accounts.google.com
                                                          X-Client-Data: CI62yQEIpLbJAQipncoBCNrwygEIkqHLAQiFoM0BCNy9zQEIucrNAQii0c0BCIrTzQEIpNbNAQj01s0BCKfYzQEI+cDUFRj1yc0BGOuNpRc=
                                                          Sec-Fetch-Site: same-site
                                                          Sec-Fetch-Mode: cors
                                                          Sec-Fetch-Dest: empty
                                                          Referer: https://accounts.google.com/
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US,en;q=0.9
                                                          2024-10-02 15:25:31 UTC519OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 32 37 32 39 30 33 37 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                          Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1727882729037",null,null,null
                                                          2024-10-02 15:25:31 UTC933INHTTP/1.1 200 OK
                                                          Access-Control-Allow-Origin: https://accounts.google.com
                                                          Cross-Origin-Resource-Policy: cross-origin
                                                          Access-Control-Allow-Credentials: true
                                                          Access-Control-Allow-Headers: X-Playlog-Web
                                                          Set-Cookie: NID=518=p8_JYpoq80MBa_4Y8n9TJNWeL8cn0YfQk4Ug1cSwXUGiLxZEnXZMTzxGyXVOJwavlaT25k5CNysNaS8JCybbWApI9aenuAZkAue2oT9S1bAogLtQ0X8qWnlNOKMDl3dmmEz9o74HwLiAKcRIpdKmns_xmf-pC-c_mR4N9WU2EJVejzCdaiI; expires=Thu, 03-Apr-2025 15:25:31 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                          P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                          Content-Type: text/plain; charset=UTF-8
                                                          Date: Wed, 02 Oct 2024 15:25:31 GMT
                                                          Server: Playlog
                                                          Cache-Control: private
                                                          X-XSS-Protection: 0
                                                          X-Frame-Options: SAMEORIGIN
                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                          Accept-Ranges: none
                                                          Vary: Accept-Encoding
                                                          Expires: Wed, 02 Oct 2024 15:25:31 GMT
                                                          Connection: close
                                                          Transfer-Encoding: chunked
                                                          2024-10-02 15:25:31 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                          Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                          2024-10-02 15:25:31 UTC5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          10192.168.2.749745142.250.184.1964437892C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-10-02 15:25:32 UTC1202OUTGET /favicon.ico HTTP/1.1
                                                          Host: www.google.com
                                                          Connection: keep-alive
                                                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                          sec-ch-ua-mobile: ?0
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                          sec-ch-ua-arch: "x86"
                                                          sec-ch-ua-full-version: "117.0.5938.134"
                                                          sec-ch-ua-platform-version: "10.0.0"
                                                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                                          sec-ch-ua-bitness: "64"
                                                          sec-ch-ua-model: ""
                                                          sec-ch-ua-wow64: ?0
                                                          sec-ch-ua-platform: "Windows"
                                                          Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
                                                          X-Client-Data: CI62yQEIpLbJAQipncoBCNrwygEIkqHLAQiFoM0BCNy9zQEIucrNAQii0c0BCIrTzQEIpNbNAQj01s0BCKfYzQEI+cDUFRj1yc0BGOuNpRc=
                                                          Sec-Fetch-Site: same-site
                                                          Sec-Fetch-Mode: no-cors
                                                          Sec-Fetch-Dest: image
                                                          Referer: https://accounts.google.com/
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US,en;q=0.9
                                                          Cookie: NID=518=p8_JYpoq80MBa_4Y8n9TJNWeL8cn0YfQk4Ug1cSwXUGiLxZEnXZMTzxGyXVOJwavlaT25k5CNysNaS8JCybbWApI9aenuAZkAue2oT9S1bAogLtQ0X8qWnlNOKMDl3dmmEz9o74HwLiAKcRIpdKmns_xmf-pC-c_mR4N9WU2EJVejzCdaiI
                                                          2024-10-02 15:25:32 UTC704INHTTP/1.1 200 OK
                                                          Accept-Ranges: bytes
                                                          Cross-Origin-Resource-Policy: cross-origin
                                                          Cross-Origin-Opener-Policy-Report-Only: same-origin; report-to="static-on-bigtable"
                                                          Report-To: {"group":"static-on-bigtable","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/static-on-bigtable"}]}
                                                          Content-Length: 5430
                                                          X-Content-Type-Options: nosniff
                                                          Server: sffe
                                                          X-XSS-Protection: 0
                                                          Date: Wed, 02 Oct 2024 15:13:12 GMT
                                                          Expires: Thu, 10 Oct 2024 15:13:12 GMT
                                                          Cache-Control: public, max-age=691200
                                                          Last-Modified: Tue, 22 Oct 2019 18:30:00 GMT
                                                          Content-Type: image/x-icon
                                                          Vary: Accept-Encoding
                                                          Age: 740
                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                          Connection: close
                                                          2024-10-02 15:25:32 UTC686INData Raw: 00 00 01 00 02 00 10 10 00 00 01 00 20 00 68 04 00 00 26 00 00 00 20 20 00 00 01 00 20 00 a8 10 00 00 8e 04 00 00 28 00 00 00 10 00 00 00 20 00 00 00 01 00 20 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 30 fd fd fd 96 fd fd fd d8 fd fd fd f9 fd fd fd f9 fd fd fd d7 fd fd fd 94 fe fe fe 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd 99 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 95 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd c1 ff ff ff ff fa fd f9 ff b4 d9 a7 ff 76 ba 5d ff 58 ab 3a ff 58 aa 3a ff 72 b8 59 ff ac d5 9d ff f8 fb f6 ff ff
                                                          Data Ascii: h& ( 0.v]X:X:rY
                                                          2024-10-02 15:25:32 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d8 fd fd fd 99 ff ff ff ff 92 cf fb ff 37 52 ec ff 38 46 ea ff d0 d4 fa ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 96 fe fe fe 32 ff ff ff ff f9 f9 fe ff 56 62 ed ff 35 43 ea ff 3b 49 eb ff 95 9c f4 ff cf d2 fa ff d1 d4 fa ff 96 9d f4 ff 52 5e ed ff e1 e3 fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 30 00 00 00 00 fd fd fd 9d ff ff ff ff e8 ea fd ff 58 63 ee ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 6c 76 f0 ff ff ff ff ff ff ff ff ff fd fd fd 98 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd c3 ff ff ff ff f9 f9 fe ff a5 ac f6 ff 5d 69 ee ff 3c 4a eb
                                                          Data Ascii: 7R8F2Vb5C;IR^0Xc5C5C5C5C5C5Clv]i<J
                                                          2024-10-02 15:25:32 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff fd fd fd d0 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fd fd fd 8b ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff b1 d8 a3 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 60 a5 35 ff ca 8e 3e ff f9 c1 9f ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 87 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 25 fd fd fd fb ff ff ff ff ff ff ff ff ff ff ff ff c2 e0 b7 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 6e b6 54 ff 9f ce 8d ff b7 da aa ff b8 db ab ff a5 d2 95 ff 7b bc 64 ff 54 a8 35 ff 53 a8 34 ff 77 a0 37 ff e3 89 41 ff f4 85 42 ff f4 85 42 ff fc
                                                          Data Ascii: S4S4S4S4S4S4S4S4S4S4S4S4S4S4`5>%S4S4S4S4S4S4nT{dT5S4w7ABB
                                                          2024-10-02 15:25:32 UTC1390INData Raw: f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff fb d5 bf ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd ea fd fd fd cb ff ff ff ff ff ff ff ff ff ff ff ff 46 cd fc ff 05 bc fb ff 05 bc fb ff 05 bc fb ff 21 ae f9 ff fb fb ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd c8 fd fd fd 9c ff ff ff ff ff ff ff ff ff ff ff ff 86 df fd ff 05 bc fb ff 05 bc fb ff 15 93 f5 ff 34 49 eb ff b3 b8 f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                          Data Ascii: BBBBBBF!4I
                                                          2024-10-02 15:25:32 UTC574INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d2 fe fe fe 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd 8d fd fd fd fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd fb fd fd fd 8b fe fe fe 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 27 fd fd fd 9f fd fd fd f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                          Data Ascii: $'


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          11192.168.2.749748216.58.206.464437892C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-10-02 15:25:37 UTC1287OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                          Host: play.google.com
                                                          Connection: keep-alive
                                                          Content-Length: 1224
                                                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                          sec-ch-ua-mobile: ?0
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                          sec-ch-ua-arch: "x86"
                                                          Content-Type: text/plain;charset=UTF-8
                                                          sec-ch-ua-full-version: "117.0.5938.134"
                                                          sec-ch-ua-platform-version: "10.0.0"
                                                          X-Goog-AuthUser: 0
                                                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                                          sec-ch-ua-bitness: "64"
                                                          sec-ch-ua-model: ""
                                                          sec-ch-ua-wow64: ?0
                                                          sec-ch-ua-platform: "Windows"
                                                          Accept: */*
                                                          Origin: https://accounts.google.com
                                                          X-Client-Data: CI62yQEIpLbJAQipncoBCNrwygEIkqHLAQiFoM0BCNy9zQEIucrNAQii0c0BCIrTzQEIpNbNAQj01s0BCKfYzQEI+cDUFRj1yc0BGOuNpRc=
                                                          Sec-Fetch-Site: same-site
                                                          Sec-Fetch-Mode: cors
                                                          Sec-Fetch-Dest: empty
                                                          Referer: https://accounts.google.com/
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US,en;q=0.9
                                                          Cookie: NID=518=p8_JYpoq80MBa_4Y8n9TJNWeL8cn0YfQk4Ug1cSwXUGiLxZEnXZMTzxGyXVOJwavlaT25k5CNysNaS8JCybbWApI9aenuAZkAue2oT9S1bAogLtQ0X8qWnlNOKMDl3dmmEz9o74HwLiAKcRIpdKmns_xmf-pC-c_mR4N9WU2EJVejzCdaiI
                                                          2024-10-02 15:25:37 UTC1224OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 34 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 35 35 38 2c 5b 5b 22 31 37 32 37 38 38 32 37 32 35 30 30 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c
                                                          Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,null,null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[4,0,0,0,0]]],558,[["1727882725000",null,null,null,
                                                          2024-10-02 15:25:37 UTC941INHTTP/1.1 200 OK
                                                          Access-Control-Allow-Origin: https://accounts.google.com
                                                          Cross-Origin-Resource-Policy: cross-origin
                                                          Access-Control-Allow-Credentials: true
                                                          Access-Control-Allow-Headers: X-Playlog-Web
                                                          Set-Cookie: NID=518=odV938BJkjal1wLMwzP2hdbKPF5QYN7RSTnBbQ4QT0vECzppUq9IDwYSH4iIlksYrVZsxQvvBZn1a-Od8vUyAkMvtR0u6jmzjIcGjo5qRYhDhTbuODr9j8vVFueR1cgZzLdq4cemVXY1bGx6zLKtnWRjEWhkwF1xtrDRGfdpRYEE_BxgJtYoVoLKFOY; expires=Thu, 03-Apr-2025 15:25:37 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                          P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                          Content-Type: text/plain; charset=UTF-8
                                                          Date: Wed, 02 Oct 2024 15:25:37 GMT
                                                          Server: Playlog
                                                          Cache-Control: private
                                                          X-XSS-Protection: 0
                                                          X-Frame-Options: SAMEORIGIN
                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                          Accept-Ranges: none
                                                          Vary: Accept-Encoding
                                                          Expires: Wed, 02 Oct 2024 15:25:37 GMT
                                                          Connection: close
                                                          Transfer-Encoding: chunked
                                                          2024-10-02 15:25:37 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                          Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                          2024-10-02 15:25:37 UTC5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          12192.168.2.749751216.58.206.464437892C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-10-02 15:26:01 UTC1318OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                          Host: play.google.com
                                                          Connection: keep-alive
                                                          Content-Length: 1525
                                                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                          sec-ch-ua-mobile: ?0
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                          sec-ch-ua-arch: "x86"
                                                          Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                          sec-ch-ua-full-version: "117.0.5938.134"
                                                          sec-ch-ua-platform-version: "10.0.0"
                                                          X-Goog-AuthUser: 0
                                                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                                          sec-ch-ua-bitness: "64"
                                                          sec-ch-ua-model: ""
                                                          sec-ch-ua-wow64: ?0
                                                          sec-ch-ua-platform: "Windows"
                                                          Accept: */*
                                                          Origin: https://accounts.google.com
                                                          X-Client-Data: CI62yQEIpLbJAQipncoBCNrwygEIkqHLAQiFoM0BCNy9zQEIucrNAQii0c0BCIrTzQEIpNbNAQj01s0BCKfYzQEI+cDUFRj1yc0BGOuNpRc=
                                                          Sec-Fetch-Site: same-site
                                                          Sec-Fetch-Mode: cors
                                                          Sec-Fetch-Dest: empty
                                                          Referer: https://accounts.google.com/
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US,en;q=0.9
                                                          Cookie: NID=518=odV938BJkjal1wLMwzP2hdbKPF5QYN7RSTnBbQ4QT0vECzppUq9IDwYSH4iIlksYrVZsxQvvBZn1a-Od8vUyAkMvtR0u6jmzjIcGjo5qRYhDhTbuODr9j8vVFueR1cgZzLdq4cemVXY1bGx6zLKtnWRjEWhkwF1xtrDRGfdpRYEE_BxgJtYoVoLKFOY
                                                          2024-10-02 15:26:01 UTC1525OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 32 37 35 39 38 37 38 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                          Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1727882759878",null,null,null
                                                          2024-10-02 15:26:02 UTC523INHTTP/1.1 200 OK
                                                          Access-Control-Allow-Origin: https://accounts.google.com
                                                          Cross-Origin-Resource-Policy: cross-origin
                                                          Access-Control-Allow-Credentials: true
                                                          Access-Control-Allow-Headers: X-Playlog-Web
                                                          Content-Type: text/plain; charset=UTF-8
                                                          Date: Wed, 02 Oct 2024 15:26:02 GMT
                                                          Server: Playlog
                                                          Cache-Control: private
                                                          X-XSS-Protection: 0
                                                          X-Frame-Options: SAMEORIGIN
                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                          Accept-Ranges: none
                                                          Vary: Accept-Encoding
                                                          Connection: close
                                                          Transfer-Encoding: chunked
                                                          2024-10-02 15:26:02 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                          Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                          2024-10-02 15:26:02 UTC5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          13192.168.2.749752216.58.206.464437892C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-10-02 15:26:02 UTC1318OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                          Host: play.google.com
                                                          Connection: keep-alive
                                                          Content-Length: 1326
                                                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                          sec-ch-ua-mobile: ?0
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                          sec-ch-ua-arch: "x86"
                                                          Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                          sec-ch-ua-full-version: "117.0.5938.134"
                                                          sec-ch-ua-platform-version: "10.0.0"
                                                          X-Goog-AuthUser: 0
                                                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                                          sec-ch-ua-bitness: "64"
                                                          sec-ch-ua-model: ""
                                                          sec-ch-ua-wow64: ?0
                                                          sec-ch-ua-platform: "Windows"
                                                          Accept: */*
                                                          Origin: https://accounts.google.com
                                                          X-Client-Data: CI62yQEIpLbJAQipncoBCNrwygEIkqHLAQiFoM0BCNy9zQEIucrNAQii0c0BCIrTzQEIpNbNAQj01s0BCKfYzQEI+cDUFRj1yc0BGOuNpRc=
                                                          Sec-Fetch-Site: same-site
                                                          Sec-Fetch-Mode: cors
                                                          Sec-Fetch-Dest: empty
                                                          Referer: https://accounts.google.com/
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US,en;q=0.9
                                                          Cookie: NID=518=odV938BJkjal1wLMwzP2hdbKPF5QYN7RSTnBbQ4QT0vECzppUq9IDwYSH4iIlksYrVZsxQvvBZn1a-Od8vUyAkMvtR0u6jmzjIcGjo5qRYhDhTbuODr9j8vVFueR1cgZzLdq4cemVXY1bGx6zLKtnWRjEWhkwF1xtrDRGfdpRYEE_BxgJtYoVoLKFOY
                                                          2024-10-02 15:26:02 UTC1326OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 32 37 36 31 37 32 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                          Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1727882761720",null,null,null
                                                          2024-10-02 15:26:03 UTC523INHTTP/1.1 200 OK
                                                          Access-Control-Allow-Origin: https://accounts.google.com
                                                          Cross-Origin-Resource-Policy: cross-origin
                                                          Access-Control-Allow-Credentials: true
                                                          Access-Control-Allow-Headers: X-Playlog-Web
                                                          Content-Type: text/plain; charset=UTF-8
                                                          Date: Wed, 02 Oct 2024 15:26:03 GMT
                                                          Server: Playlog
                                                          Cache-Control: private
                                                          X-XSS-Protection: 0
                                                          X-Frame-Options: SAMEORIGIN
                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                          Accept-Ranges: none
                                                          Vary: Accept-Encoding
                                                          Connection: close
                                                          Transfer-Encoding: chunked
                                                          2024-10-02 15:26:03 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                          Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                          2024-10-02 15:26:03 UTC5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          14192.168.2.749753216.58.206.464437892C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-10-02 15:26:03 UTC1277OUTPOST /log?hasfast=true&authuser=0&format=json HTTP/1.1
                                                          Host: play.google.com
                                                          Connection: keep-alive
                                                          Content-Length: 864
                                                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                          sec-ch-ua-mobile: ?0
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                          sec-ch-ua-arch: "x86"
                                                          sec-ch-ua-full-version: "117.0.5938.134"
                                                          Content-Type: text/plain;charset=UTF-8
                                                          sec-ch-ua-platform-version: "10.0.0"
                                                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                                          sec-ch-ua-bitness: "64"
                                                          sec-ch-ua-model: ""
                                                          sec-ch-ua-wow64: ?0
                                                          sec-ch-ua-platform: "Windows"
                                                          Accept: */*
                                                          Origin: https://accounts.google.com
                                                          X-Client-Data: CI62yQEIpLbJAQipncoBCNrwygEIkqHLAQiFoM0BCNy9zQEIucrNAQii0c0BCIrTzQEIpNbNAQj01s0BCKfYzQEI+cDUFRj1yc0BGOuNpRc=
                                                          Sec-Fetch-Site: same-site
                                                          Sec-Fetch-Mode: no-cors
                                                          Sec-Fetch-Dest: empty
                                                          Referer: https://accounts.google.com/
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US,en;q=0.9
                                                          Cookie: NID=518=odV938BJkjal1wLMwzP2hdbKPF5QYN7RSTnBbQ4QT0vECzppUq9IDwYSH4iIlksYrVZsxQvvBZn1a-Od8vUyAkMvtR0u6jmzjIcGjo5qRYhDhTbuODr9j8vVFueR1cgZzLdq4cemVXY1bGx6zLKtnWRjEWhkwF1xtrDRGfdpRYEE_BxgJtYoVoLKFOY
                                                          2024-10-02 15:26:03 UTC864OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 62 6f 71 5f 69 64 65 6e 74 69 74 79 66 72 6f 6e 74 65 6e 64 61 75 74 68 75 69 73 65 72 76 65 72 5f 32 30 32 34 30 39 32 39 2e 30 37 5f 70 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 33 2c 30 2c 30
                                                          Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"boq_identityfrontendauthuiserver_20240929.07_p0",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[3,0,0
                                                          2024-10-02 15:26:03 UTC523INHTTP/1.1 200 OK
                                                          Access-Control-Allow-Origin: https://accounts.google.com
                                                          Cross-Origin-Resource-Policy: cross-origin
                                                          Access-Control-Allow-Credentials: true
                                                          Access-Control-Allow-Headers: X-Playlog-Web
                                                          Content-Type: text/plain; charset=UTF-8
                                                          Date: Wed, 02 Oct 2024 15:26:03 GMT
                                                          Server: Playlog
                                                          Cache-Control: private
                                                          X-XSS-Protection: 0
                                                          X-Frame-Options: SAMEORIGIN
                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                          Accept-Ranges: none
                                                          Vary: Accept-Encoding
                                                          Connection: close
                                                          Transfer-Encoding: chunked
                                                          2024-10-02 15:26:03 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                          Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                          2024-10-02 15:26:03 UTC5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          15192.168.2.7497544.175.87.197443
                                                          TimestampBytes transferredDirectionData
                                                          2024-10-02 15:26:13 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=NX1ndAXlaDB8kh2&MD=FnRvyOlh HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Accept: */*
                                                          User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                                          Host: slscr.update.microsoft.com
                                                          2024-10-02 15:26:13 UTC560INHTTP/1.1 200 OK
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Content-Type: application/octet-stream
                                                          Expires: -1
                                                          Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                                          ETag: "vic+p1MiJJ+/WMnK08jaWnCBGDfvkGRzPk9f8ZadQHg=_1440"
                                                          MS-CorrelationId: d3083be7-6a7a-48ee-898f-22ab09cd1667
                                                          MS-RequestId: 40d101e0-d19f-46bf-b390-5df118d1ac43
                                                          MS-CV: 6JnEn3saC0aZYvPX.0
                                                          X-Microsoft-SLSClientCache: 1440
                                                          Content-Disposition: attachment; filename=environment.cab
                                                          X-Content-Type-Options: nosniff
                                                          Date: Wed, 02 Oct 2024 15:26:12 GMT
                                                          Connection: close
                                                          Content-Length: 30005
                                                          2024-10-02 15:26:13 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 8d 2b 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 5b 49 00 00 14 00 00 00 00 00 10 00 8d 2b 00 00 a8 49 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 72 4d 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 fe f6 51 be 21 2b 72 4d 43 4b ed 7c 05 58 54 eb da f6 14 43 49 37 0a 02 d2 b9 86 0e 41 52 a4 1b 24 a5 bb 43 24 44 18 94 90 92 52 41 3a 05 09 95 ee 54 b0 00 91 2e e9 12 10 04 11 c9 6f 10 b7 a2 67 9f bd cf 3e ff b7 ff b3 bf 73 ed e1 9a 99 f5 c6 7a d7 bb de f5 3e cf fd 3c f7 dc 17 4a 1a 52 e7 41 a8 97 1e 14 f4 e5 25 7d f4 05 82 82 c1 20 30 08 06 ba c3 05 02 11 7f a9 c1 ff d2 87 5c 1e f4 ed 65 8e 7a 1f f6 0a 40 03 1d 7b f9 83 2c 1c 2f db b8 3a 39 3a 58 38 ba 73 5e
                                                          Data Ascii: MSCF+D[I+IdrMenvironment.cabQ!+rMCK|XTCI7AR$C$DRA:T.og>sz><JRA%} 0\ez@{,/:9:X8s^
                                                          2024-10-02 15:26:13 UTC14181INData Raw: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 26 30 24 06 03 55 04 03 13 1d 4d 69 63 72 6f 73 6f 66 74 20 54 69 6d 65 2d 53 74 61 6d 70 20 50 43 41 20 32 30 31 30 30 1e 17 0d 32 33 31 30 31 32 31 39 30 37 32 35 5a 17 0d 32 35 30 31 31 30 31 39 30 37 32 35 5a 30 81 d2 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 2d 30 2b 06 03 55 04 0b 13 24 4d 69 63 72 6f
                                                          Data Ascii: UUS10UWashington10URedmond10UMicrosoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100231012190725Z250110190725Z010UUS10UWashington10URedmond10UMicrosoft Corporation1-0+U$Micro


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:1
                                                          Start time:11:25:13
                                                          Start date:02/10/2024
                                                          Path:C:\Users\user\Desktop\file.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\file.exe"
                                                          Imagebase:0xd60000
                                                          File size:918'528 bytes
                                                          MD5 hash:A4DA09A845D42F57982FF9177C819A39
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:3
                                                          Start time:11:25:14
                                                          Start date:02/10/2024
                                                          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
                                                          Imagebase:0x7ff6c4390000
                                                          File size:3'242'272 bytes
                                                          MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:false

                                                          Target ID:5
                                                          Start time:11:25:14
                                                          Start date:02/10/2024
                                                          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=2112,i,10021536574544599090,10325126768946313152,262144 /prefetch:8
                                                          Imagebase:0x7ff6c4390000
                                                          File size:3'242'272 bytes
                                                          MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:false

                                                          Target ID:7
                                                          Start time:11:25:29
                                                          Start date:02/10/2024
                                                          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5236 --field-trial-handle=2112,i,10021536574544599090,10325126768946313152,262144 /prefetch:8
                                                          Imagebase:0x7ff6c4390000
                                                          File size:3'242'272 bytes
                                                          MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:false

                                                          Target ID:8
                                                          Start time:11:25:29
                                                          Start date:02/10/2024
                                                          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 --field-trial-handle=2112,i,10021536574544599090,10325126768946313152,262144 /prefetch:8
                                                          Imagebase:0x7ff6c4390000
                                                          File size:3'242'272 bytes
                                                          MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:2%
                                                            Dynamic/Decrypted Code Coverage:0%
                                                            Signature Coverage:7%
                                                            Total number of Nodes:1526
                                                            Total number of Limit Nodes:41
                                                            execution_graph 95643 d63156 95646 d63170 95643->95646 95647 d63187 95646->95647 95648 d6318c 95647->95648 95649 d631eb 95647->95649 95686 d631e9 95647->95686 95650 d63265 PostQuitMessage 95648->95650 95651 d63199 95648->95651 95653 da2dfb 95649->95653 95654 d631f1 95649->95654 95676 d6316a 95650->95676 95658 d631a4 95651->95658 95659 da2e7c 95651->95659 95652 d631d0 DefWindowProcW 95652->95676 95705 d618e2 10 API calls 95653->95705 95655 d6321d SetTimer RegisterWindowMessageW 95654->95655 95656 d631f8 95654->95656 95663 d63246 CreatePopupMenu 95655->95663 95655->95676 95660 da2d9c 95656->95660 95661 d63201 KillTimer 95656->95661 95664 da2e68 95658->95664 95665 d631ae 95658->95665 95718 dcbf30 34 API calls ___scrt_fastfail 95659->95718 95673 da2da1 95660->95673 95674 da2dd7 MoveWindow 95660->95674 95691 d630f2 95661->95691 95662 da2e1c 95706 d7e499 42 API calls 95662->95706 95663->95676 95695 dcc161 95664->95695 95670 da2e4d 95665->95670 95671 d631b9 95665->95671 95670->95652 95717 dc0ad7 22 API calls 95670->95717 95677 d631c4 95671->95677 95678 d63253 95671->95678 95672 da2e8e 95672->95652 95672->95676 95679 da2dc6 SetFocus 95673->95679 95680 da2da7 95673->95680 95674->95676 95677->95652 95688 d630f2 Shell_NotifyIconW 95677->95688 95703 d6326f 44 API calls ___scrt_fastfail 95678->95703 95679->95676 95680->95677 95684 da2db0 95680->95684 95704 d618e2 10 API calls 95684->95704 95686->95652 95687 d63263 95687->95676 95689 da2e41 95688->95689 95707 d63837 95689->95707 95692 d63154 95691->95692 95693 d63104 ___scrt_fastfail 95691->95693 95702 d63c50 DeleteObject DestroyWindow 95692->95702 95694 d63123 Shell_NotifyIconW 95693->95694 95694->95692 95696 dcc179 ___scrt_fastfail 95695->95696 95697 dcc276 95695->95697 95719 d63923 95696->95719 95697->95676 95699 dcc25f KillTimer SetTimer 95699->95697 95700 dcc1a0 95700->95699 95701 dcc251 Shell_NotifyIconW 95700->95701 95701->95699 95702->95676 95703->95687 95704->95676 95705->95662 95706->95677 95708 d63862 ___scrt_fastfail 95707->95708 95831 d64212 95708->95831 95711 d638e8 95713 d63906 Shell_NotifyIconW 95711->95713 95714 da3386 Shell_NotifyIconW 95711->95714 95715 d63923 24 API calls 95713->95715 95716 d6391c 95715->95716 95716->95686 95717->95686 95718->95672 95720 d6393f 95719->95720 95737 d63a13 95719->95737 95741 d66270 95720->95741 95723 da3393 LoadStringW 95726 da33ad 95723->95726 95724 d6395a 95746 d66b57 95724->95746 95740 d63994 ___scrt_fastfail 95726->95740 95759 d6a8c7 22 API calls __fread_nolock 95726->95759 95727 d6396f 95728 da33c9 95727->95728 95729 d6397c 95727->95729 95760 d66350 22 API calls 95728->95760 95729->95726 95731 d63986 95729->95731 95758 d66350 22 API calls 95731->95758 95734 da33d7 95734->95740 95761 d633c6 95734->95761 95736 d639f9 Shell_NotifyIconW 95736->95737 95737->95700 95738 da33f9 95739 d633c6 22 API calls 95738->95739 95739->95740 95740->95736 95770 d7fe0b 95741->95770 95743 d66295 95780 d7fddb 95743->95780 95745 d6394d 95745->95723 95745->95724 95747 d66b67 _wcslen 95746->95747 95748 da4ba1 95746->95748 95751 d66ba2 95747->95751 95752 d66b7d 95747->95752 95806 d693b2 95748->95806 95750 da4baa 95750->95750 95754 d7fddb 22 API calls 95751->95754 95805 d66f34 22 API calls 95752->95805 95756 d66bae 95754->95756 95755 d66b85 __fread_nolock 95755->95727 95757 d7fe0b 22 API calls 95756->95757 95757->95755 95758->95740 95759->95740 95760->95734 95762 da30bb 95761->95762 95763 d633dd 95761->95763 95765 d7fddb 22 API calls 95762->95765 95816 d633ee 95763->95816 95767 da30c5 _wcslen 95765->95767 95766 d633e8 95766->95738 95768 d7fe0b 22 API calls 95767->95768 95769 da30fe __fread_nolock 95768->95769 95772 d7fddb 95770->95772 95773 d7fdfa 95772->95773 95775 d7fdfc 95772->95775 95790 d8ea0c 95772->95790 95797 d84ead 7 API calls 2 library calls 95772->95797 95773->95743 95776 d8066d 95775->95776 95798 d832a4 RaiseException 95775->95798 95799 d832a4 RaiseException 95776->95799 95778 d8068a 95778->95743 95782 d7fde0 95780->95782 95781 d8ea0c ___std_exception_copy 21 API calls 95781->95782 95782->95781 95783 d7fdfa 95782->95783 95786 d7fdfc 95782->95786 95802 d84ead 7 API calls 2 library calls 95782->95802 95783->95745 95785 d8066d 95804 d832a4 RaiseException 95785->95804 95786->95785 95803 d832a4 RaiseException 95786->95803 95788 d8068a 95788->95745 95795 d93820 _abort 95790->95795 95791 d9385e 95801 d8f2d9 20 API calls _abort 95791->95801 95793 d93849 RtlAllocateHeap 95794 d9385c 95793->95794 95793->95795 95794->95772 95795->95791 95795->95793 95800 d84ead 7 API calls 2 library calls 95795->95800 95797->95772 95798->95776 95799->95778 95800->95795 95801->95794 95802->95782 95803->95785 95804->95788 95805->95755 95807 d693c9 __fread_nolock 95806->95807 95808 d693c0 95806->95808 95807->95750 95808->95807 95810 d6aec9 95808->95810 95811 d6aedc 95810->95811 95815 d6aed9 __fread_nolock 95810->95815 95812 d7fddb 22 API calls 95811->95812 95813 d6aee7 95812->95813 95814 d7fe0b 22 API calls 95813->95814 95814->95815 95815->95807 95817 d633fe _wcslen 95816->95817 95818 da311d 95817->95818 95819 d63411 95817->95819 95821 d7fddb 22 API calls 95818->95821 95826 d6a587 95819->95826 95823 da3127 95821->95823 95822 d6341e __fread_nolock 95822->95766 95824 d7fe0b 22 API calls 95823->95824 95825 da3157 __fread_nolock 95824->95825 95827 d6a59d 95826->95827 95830 d6a598 __fread_nolock 95826->95830 95828 d7fe0b 22 API calls 95827->95828 95829 daf80f 95827->95829 95828->95830 95829->95829 95830->95822 95832 d638b7 95831->95832 95833 da35a4 95831->95833 95832->95711 95835 dcc874 42 API calls _strftime 95832->95835 95833->95832 95834 da35ad DestroyIcon 95833->95834 95834->95832 95835->95711 95836 d62e37 95915 d6a961 95836->95915 95840 d62e6b 95934 d63a5a 95840->95934 95842 d62e7f 95941 d69cb3 95842->95941 95847 da2cb0 95987 dd2cf9 95847->95987 95849 d62ead 95969 d6a8c7 22 API calls __fread_nolock 95849->95969 95850 da2cc3 95852 da2ccf 95850->95852 96013 d64f39 95850->96013 95856 d64f39 68 API calls 95852->95856 95853 d62ec3 95970 d66f88 22 API calls 95853->95970 95858 da2ce5 95856->95858 95857 d62ecf 95859 d69cb3 22 API calls 95857->95859 96019 d63084 22 API calls 95858->96019 95860 d62edc 95859->95860 95971 d6a81b 41 API calls 95860->95971 95863 d62eec 95865 d69cb3 22 API calls 95863->95865 95864 da2d02 96020 d63084 22 API calls 95864->96020 95866 d62f12 95865->95866 95972 d6a81b 41 API calls 95866->95972 95869 da2d1e 95870 d63a5a 24 API calls 95869->95870 95871 da2d44 95870->95871 96021 d63084 22 API calls 95871->96021 95872 d62f21 95875 d6a961 22 API calls 95872->95875 95874 da2d50 96022 d6a8c7 22 API calls __fread_nolock 95874->96022 95877 d62f3f 95875->95877 95973 d63084 22 API calls 95877->95973 95878 da2d5e 96023 d63084 22 API calls 95878->96023 95881 d62f4b 95974 d84a28 40 API calls 3 library calls 95881->95974 95882 da2d6d 96024 d6a8c7 22 API calls __fread_nolock 95882->96024 95884 d62f59 95884->95858 95885 d62f63 95884->95885 95975 d84a28 40 API calls 3 library calls 95885->95975 95888 d62f6e 95888->95864 95890 d62f78 95888->95890 95889 da2d83 96025 d63084 22 API calls 95889->96025 95976 d84a28 40 API calls 3 library calls 95890->95976 95893 da2d90 95894 d62f83 95894->95869 95895 d62f8d 95894->95895 95977 d84a28 40 API calls 3 library calls 95895->95977 95897 d62f98 95898 d62fdc 95897->95898 95978 d63084 22 API calls 95897->95978 95898->95882 95899 d62fe8 95898->95899 95899->95893 95981 d663eb 22 API calls 95899->95981 95902 d62fbf 95979 d6a8c7 22 API calls __fread_nolock 95902->95979 95903 d62ff8 95982 d66a50 22 API calls 95903->95982 95906 d62fcd 95980 d63084 22 API calls 95906->95980 95907 d63006 95983 d670b0 23 API calls 95907->95983 95912 d63021 95913 d63065 95912->95913 95984 d66f88 22 API calls 95912->95984 95985 d670b0 23 API calls 95912->95985 95986 d63084 22 API calls 95912->95986 95916 d7fe0b 22 API calls 95915->95916 95917 d6a976 95916->95917 95918 d7fddb 22 API calls 95917->95918 95919 d62e4d 95918->95919 95920 d64ae3 95919->95920 95921 d64af0 __wsopen_s 95920->95921 95922 d66b57 22 API calls 95921->95922 95923 d64b22 95921->95923 95922->95923 95933 d64b58 95923->95933 96026 d64c6d 95923->96026 95925 d64c6d 22 API calls 95925->95933 95926 d69cb3 22 API calls 95928 d64c52 95926->95928 95927 d69cb3 22 API calls 95927->95933 95929 d6515f 22 API calls 95928->95929 95931 d64c5e 95929->95931 95931->95840 95932 d64c29 95932->95926 95932->95931 95933->95925 95933->95927 95933->95932 96029 d6515f 95933->96029 96035 da1f50 95934->96035 95937 d69cb3 22 API calls 95938 d63a8d 95937->95938 96037 d63aa2 95938->96037 95940 d63a97 95940->95842 95942 d69cc2 _wcslen 95941->95942 95943 d7fe0b 22 API calls 95942->95943 95944 d69cea __fread_nolock 95943->95944 95945 d7fddb 22 API calls 95944->95945 95946 d62e8c 95945->95946 95947 d64ecb 95946->95947 96057 d64e90 LoadLibraryA 95947->96057 95952 d64ef6 LoadLibraryExW 96065 d64e59 LoadLibraryA 95952->96065 95953 da3ccf 95954 d64f39 68 API calls 95953->95954 95956 da3cd6 95954->95956 95958 d64e59 3 API calls 95956->95958 95960 da3cde 95958->95960 96087 d650f5 95960->96087 95961 d64f20 95961->95960 95962 d64f2c 95961->95962 95964 d64f39 68 API calls 95962->95964 95965 d62ea5 95964->95965 95965->95847 95965->95849 95968 da3d05 95969->95853 95970->95857 95971->95863 95972->95872 95973->95881 95974->95884 95975->95888 95976->95894 95977->95897 95978->95902 95979->95906 95980->95898 95981->95903 95982->95907 95983->95912 95984->95912 95985->95912 95986->95912 95988 dd2d15 95987->95988 95989 d6511f 64 API calls 95988->95989 95990 dd2d29 95989->95990 96237 dd2e66 95990->96237 95993 dd2d3f 95993->95850 95994 d650f5 40 API calls 95995 dd2d56 95994->95995 95996 d650f5 40 API calls 95995->95996 95997 dd2d66 95996->95997 95998 d650f5 40 API calls 95997->95998 95999 dd2d81 95998->95999 96000 d650f5 40 API calls 95999->96000 96001 dd2d9c 96000->96001 96002 d6511f 64 API calls 96001->96002 96003 dd2db3 96002->96003 96004 d8ea0c ___std_exception_copy 21 API calls 96003->96004 96005 dd2dba 96004->96005 96006 d8ea0c ___std_exception_copy 21 API calls 96005->96006 96007 dd2dc4 96006->96007 96008 d650f5 40 API calls 96007->96008 96009 dd2dd8 96008->96009 96010 dd28fe 27 API calls 96009->96010 96011 dd2dee 96010->96011 96011->95993 96243 dd22ce 79 API calls 96011->96243 96014 d64f43 96013->96014 96015 d64f4a 96013->96015 96244 d8e678 96014->96244 96017 d64f6a FreeLibrary 96015->96017 96018 d64f59 96015->96018 96017->96018 96018->95852 96019->95864 96020->95869 96021->95874 96022->95878 96023->95882 96024->95889 96025->95893 96027 d6aec9 22 API calls 96026->96027 96028 d64c78 96027->96028 96028->95923 96030 d6516e 96029->96030 96034 d6518f __fread_nolock 96029->96034 96032 d7fe0b 22 API calls 96030->96032 96031 d7fddb 22 API calls 96033 d651a2 96031->96033 96032->96034 96033->95933 96034->96031 96036 d63a67 GetModuleFileNameW 96035->96036 96036->95937 96038 da1f50 __wsopen_s 96037->96038 96039 d63aaf GetFullPathNameW 96038->96039 96040 d63ace 96039->96040 96041 d63ae9 96039->96041 96042 d66b57 22 API calls 96040->96042 96051 d6a6c3 96041->96051 96044 d63ada 96042->96044 96047 d637a0 96044->96047 96048 d637ae 96047->96048 96049 d693b2 22 API calls 96048->96049 96050 d637c2 96049->96050 96050->95940 96052 d6a6dd 96051->96052 96056 d6a6d0 96051->96056 96053 d7fddb 22 API calls 96052->96053 96054 d6a6e7 96053->96054 96055 d7fe0b 22 API calls 96054->96055 96055->96056 96056->96044 96058 d64ec6 96057->96058 96059 d64ea8 GetProcAddress 96057->96059 96062 d8e5eb 96058->96062 96060 d64eb8 96059->96060 96060->96058 96061 d64ebf FreeLibrary 96060->96061 96061->96058 96095 d8e52a 96062->96095 96064 d64eea 96064->95952 96064->95953 96066 d64e6e GetProcAddress 96065->96066 96067 d64e8d 96065->96067 96068 d64e7e 96066->96068 96070 d64f80 96067->96070 96068->96067 96069 d64e86 FreeLibrary 96068->96069 96069->96067 96071 d7fe0b 22 API calls 96070->96071 96072 d64f95 96071->96072 96163 d65722 96072->96163 96074 d64fa1 __fread_nolock 96075 d650a5 96074->96075 96076 da3d1d 96074->96076 96085 d64fdc 96074->96085 96166 d642a2 CreateStreamOnHGlobal 96075->96166 96177 dd304d 74 API calls 96076->96177 96079 da3d22 96081 d6511f 64 API calls 96079->96081 96080 d650f5 40 API calls 96080->96085 96082 da3d45 96081->96082 96083 d650f5 40 API calls 96082->96083 96086 d6506e ISource 96083->96086 96085->96079 96085->96080 96085->96086 96172 d6511f 96085->96172 96086->95961 96088 d65107 96087->96088 96091 da3d70 96087->96091 96199 d8e8c4 96088->96199 96092 dd28fe 96220 dd274e 96092->96220 96094 dd2919 96094->95968 96098 d8e536 ___DestructExceptionObject 96095->96098 96096 d8e544 96120 d8f2d9 20 API calls _abort 96096->96120 96098->96096 96100 d8e574 96098->96100 96099 d8e549 96121 d927ec 26 API calls __wsopen_s 96099->96121 96102 d8e579 96100->96102 96103 d8e586 96100->96103 96122 d8f2d9 20 API calls _abort 96102->96122 96112 d98061 96103->96112 96106 d8e58f 96108 d8e5a2 96106->96108 96109 d8e595 96106->96109 96107 d8e554 __wsopen_s 96107->96064 96124 d8e5d4 LeaveCriticalSection __fread_nolock 96108->96124 96123 d8f2d9 20 API calls _abort 96109->96123 96113 d9806d ___DestructExceptionObject 96112->96113 96125 d92f5e EnterCriticalSection 96113->96125 96115 d9807b 96126 d980fb 96115->96126 96119 d980ac __wsopen_s 96119->96106 96120->96099 96121->96107 96122->96107 96123->96107 96124->96107 96125->96115 96135 d9811e 96126->96135 96127 d98177 96144 d94c7d 96127->96144 96132 d98189 96134 d98088 96132->96134 96157 d93405 11 API calls 2 library calls 96132->96157 96139 d980b7 96134->96139 96135->96127 96135->96134 96142 d8918d EnterCriticalSection 96135->96142 96143 d891a1 LeaveCriticalSection 96135->96143 96136 d981a8 96158 d8918d EnterCriticalSection 96136->96158 96162 d92fa6 LeaveCriticalSection 96139->96162 96141 d980be 96141->96119 96142->96135 96143->96135 96149 d94c8a _abort 96144->96149 96145 d94cca 96160 d8f2d9 20 API calls _abort 96145->96160 96146 d94cb5 RtlAllocateHeap 96147 d94cc8 96146->96147 96146->96149 96151 d929c8 96147->96151 96149->96145 96149->96146 96159 d84ead 7 API calls 2 library calls 96149->96159 96152 d929fc __dosmaperr 96151->96152 96153 d929d3 RtlFreeHeap 96151->96153 96152->96132 96153->96152 96154 d929e8 96153->96154 96161 d8f2d9 20 API calls _abort 96154->96161 96156 d929ee GetLastError 96156->96152 96157->96136 96158->96134 96159->96149 96160->96147 96161->96156 96162->96141 96164 d7fddb 22 API calls 96163->96164 96165 d65734 96164->96165 96165->96074 96167 d642bc FindResourceExW 96166->96167 96169 d642d9 96166->96169 96168 da35ba LoadResource 96167->96168 96167->96169 96168->96169 96170 da35cf SizeofResource 96168->96170 96169->96085 96170->96169 96171 da35e3 LockResource 96170->96171 96171->96169 96173 d6512e 96172->96173 96176 da3d90 96172->96176 96178 d8ece3 96173->96178 96177->96079 96181 d8eaaa 96178->96181 96180 d6513c 96180->96085 96185 d8eab6 ___DestructExceptionObject 96181->96185 96182 d8eac2 96194 d8f2d9 20 API calls _abort 96182->96194 96184 d8eae8 96196 d8918d EnterCriticalSection 96184->96196 96185->96182 96185->96184 96187 d8eac7 96195 d927ec 26 API calls __wsopen_s 96187->96195 96188 d8eaf4 96197 d8ec0a 62 API calls 2 library calls 96188->96197 96191 d8eb08 96198 d8eb27 LeaveCriticalSection __fread_nolock 96191->96198 96193 d8ead2 __wsopen_s 96193->96180 96194->96187 96195->96193 96196->96188 96197->96191 96198->96193 96202 d8e8e1 96199->96202 96201 d65118 96201->96092 96203 d8e8ed ___DestructExceptionObject 96202->96203 96204 d8e92d 96203->96204 96205 d8e900 ___scrt_fastfail 96203->96205 96206 d8e925 __wsopen_s 96203->96206 96217 d8918d EnterCriticalSection 96204->96217 96215 d8f2d9 20 API calls _abort 96205->96215 96206->96201 96209 d8e937 96218 d8e6f8 38 API calls 4 library calls 96209->96218 96210 d8e91a 96216 d927ec 26 API calls __wsopen_s 96210->96216 96213 d8e94e 96219 d8e96c LeaveCriticalSection __fread_nolock 96213->96219 96215->96210 96216->96206 96217->96209 96218->96213 96219->96206 96223 d8e4e8 96220->96223 96222 dd275d 96222->96094 96226 d8e469 96223->96226 96225 d8e505 96225->96222 96227 d8e478 96226->96227 96228 d8e48c 96226->96228 96234 d8f2d9 20 API calls _abort 96227->96234 96233 d8e488 __alldvrm 96228->96233 96236 d9333f 11 API calls 2 library calls 96228->96236 96230 d8e47d 96235 d927ec 26 API calls __wsopen_s 96230->96235 96233->96225 96234->96230 96235->96233 96236->96233 96241 dd2e7a 96237->96241 96238 dd28fe 27 API calls 96238->96241 96239 dd2d3b 96239->95993 96239->95994 96240 d650f5 40 API calls 96240->96241 96241->96238 96241->96239 96241->96240 96242 d6511f 64 API calls 96241->96242 96242->96241 96243->95993 96245 d8e684 ___DestructExceptionObject 96244->96245 96246 d8e6aa 96245->96246 96247 d8e695 96245->96247 96254 d8e6a5 __wsopen_s 96246->96254 96257 d8918d EnterCriticalSection 96246->96257 96274 d8f2d9 20 API calls _abort 96247->96274 96249 d8e69a 96275 d927ec 26 API calls __wsopen_s 96249->96275 96252 d8e6c6 96258 d8e602 96252->96258 96254->96015 96255 d8e6d1 96276 d8e6ee LeaveCriticalSection __fread_nolock 96255->96276 96257->96252 96259 d8e60f 96258->96259 96260 d8e624 96258->96260 96309 d8f2d9 20 API calls _abort 96259->96309 96272 d8e61f 96260->96272 96277 d8dc0b 96260->96277 96262 d8e614 96310 d927ec 26 API calls __wsopen_s 96262->96310 96269 d8e646 96294 d9862f 96269->96294 96272->96255 96273 d929c8 _free 20 API calls 96273->96272 96274->96249 96275->96254 96276->96254 96278 d8dc1f 96277->96278 96279 d8dc23 96277->96279 96283 d94d7a 96278->96283 96279->96278 96280 d8d955 __fread_nolock 26 API calls 96279->96280 96281 d8dc43 96280->96281 96311 d959be 62 API calls 3 library calls 96281->96311 96284 d94d90 96283->96284 96286 d8e640 96283->96286 96285 d929c8 _free 20 API calls 96284->96285 96284->96286 96285->96286 96287 d8d955 96286->96287 96288 d8d961 96287->96288 96289 d8d976 96287->96289 96312 d8f2d9 20 API calls _abort 96288->96312 96289->96269 96291 d8d966 96313 d927ec 26 API calls __wsopen_s 96291->96313 96293 d8d971 96293->96269 96295 d9863e 96294->96295 96296 d98653 96294->96296 96317 d8f2c6 20 API calls _abort 96295->96317 96298 d9868e 96296->96298 96303 d9867a 96296->96303 96319 d8f2c6 20 API calls _abort 96298->96319 96300 d98643 96318 d8f2d9 20 API calls _abort 96300->96318 96301 d98693 96320 d8f2d9 20 API calls _abort 96301->96320 96314 d98607 96303->96314 96306 d9869b 96321 d927ec 26 API calls __wsopen_s 96306->96321 96307 d8e64c 96307->96272 96307->96273 96309->96262 96310->96272 96311->96278 96312->96291 96313->96293 96322 d98585 96314->96322 96316 d9862b 96316->96307 96317->96300 96318->96307 96319->96301 96320->96306 96321->96307 96323 d98591 ___DestructExceptionObject 96322->96323 96333 d95147 EnterCriticalSection 96323->96333 96325 d9859f 96326 d985d1 96325->96326 96327 d985c6 96325->96327 96349 d8f2d9 20 API calls _abort 96326->96349 96334 d986ae 96327->96334 96330 d985cc 96350 d985fb LeaveCriticalSection __wsopen_s 96330->96350 96332 d985ee __wsopen_s 96332->96316 96333->96325 96351 d953c4 96334->96351 96336 d986c4 96364 d95333 21 API calls 2 library calls 96336->96364 96337 d986f6 96337->96336 96341 d953c4 __wsopen_s 26 API calls 96337->96341 96338 d986be 96338->96336 96338->96337 96340 d953c4 __wsopen_s 26 API calls 96338->96340 96343 d986ed 96340->96343 96344 d98702 CloseHandle 96341->96344 96342 d9871c 96348 d9873e 96342->96348 96365 d8f2a3 20 API calls __dosmaperr 96342->96365 96345 d953c4 __wsopen_s 26 API calls 96343->96345 96344->96336 96346 d9870e GetLastError 96344->96346 96345->96337 96346->96336 96348->96330 96349->96330 96350->96332 96352 d953d1 96351->96352 96353 d953e6 96351->96353 96366 d8f2c6 20 API calls _abort 96352->96366 96358 d9540b 96353->96358 96368 d8f2c6 20 API calls _abort 96353->96368 96355 d953d6 96367 d8f2d9 20 API calls _abort 96355->96367 96358->96338 96359 d95416 96369 d8f2d9 20 API calls _abort 96359->96369 96360 d953de 96360->96338 96362 d9541e 96370 d927ec 26 API calls __wsopen_s 96362->96370 96364->96342 96365->96348 96366->96355 96367->96360 96368->96359 96369->96362 96370->96360 96371 d803fb 96372 d80407 ___DestructExceptionObject 96371->96372 96400 d7feb1 96372->96400 96374 d8040e 96375 d80561 96374->96375 96378 d80438 96374->96378 96430 d8083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 96375->96430 96377 d80568 96423 d84e52 96377->96423 96389 d80477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 96378->96389 96411 d9247d 96378->96411 96385 d80457 96387 d804d8 96419 d80959 96387->96419 96389->96387 96426 d84e1a 38 API calls 2 library calls 96389->96426 96391 d804de 96392 d804f3 96391->96392 96427 d80992 GetModuleHandleW 96392->96427 96394 d804fa 96394->96377 96395 d804fe 96394->96395 96396 d80507 96395->96396 96428 d84df5 28 API calls _abort 96395->96428 96429 d80040 13 API calls 2 library calls 96396->96429 96399 d8050f 96399->96385 96401 d7feba 96400->96401 96432 d80698 IsProcessorFeaturePresent 96401->96432 96403 d7fec6 96433 d82c94 10 API calls 3 library calls 96403->96433 96405 d7fecb 96406 d7fecf 96405->96406 96434 d92317 96405->96434 96406->96374 96409 d7fee6 96409->96374 96412 d92494 96411->96412 96413 d80a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 96412->96413 96414 d80451 96413->96414 96414->96385 96415 d92421 96414->96415 96417 d92450 96415->96417 96416 d80a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 96418 d92479 96416->96418 96417->96416 96418->96389 96493 d82340 96419->96493 96421 d8096c GetStartupInfoW 96422 d8097f 96421->96422 96422->96391 96495 d84bcf 96423->96495 96426->96387 96427->96394 96428->96396 96429->96399 96430->96377 96432->96403 96433->96405 96438 d9d1f6 96434->96438 96437 d82cbd 8 API calls 3 library calls 96437->96406 96439 d9d213 96438->96439 96442 d9d20f 96438->96442 96439->96442 96444 d94bfb 96439->96444 96441 d7fed8 96441->96409 96441->96437 96456 d80a8c 96442->96456 96445 d94c07 ___DestructExceptionObject 96444->96445 96463 d92f5e EnterCriticalSection 96445->96463 96447 d94c0e 96464 d950af 96447->96464 96449 d94c1d 96455 d94c2c 96449->96455 96477 d94a8f 29 API calls 96449->96477 96452 d94c27 96478 d94b45 GetStdHandle GetFileType 96452->96478 96454 d94c3d __wsopen_s 96454->96439 96479 d94c48 LeaveCriticalSection _abort 96455->96479 96457 d80a95 96456->96457 96458 d80a97 IsProcessorFeaturePresent 96456->96458 96457->96441 96460 d80c5d 96458->96460 96492 d80c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96460->96492 96462 d80d40 96462->96441 96463->96447 96465 d950bb ___DestructExceptionObject 96464->96465 96466 d950c8 96465->96466 96467 d950df 96465->96467 96488 d8f2d9 20 API calls _abort 96466->96488 96480 d92f5e EnterCriticalSection 96467->96480 96470 d950cd 96489 d927ec 26 API calls __wsopen_s 96470->96489 96472 d950d7 __wsopen_s 96472->96449 96473 d950eb 96476 d95117 96473->96476 96481 d95000 96473->96481 96490 d9513e LeaveCriticalSection _abort 96476->96490 96477->96452 96478->96455 96479->96454 96480->96473 96482 d94c7d _abort 20 API calls 96481->96482 96483 d95012 96482->96483 96487 d9501f 96483->96487 96491 d93405 11 API calls 2 library calls 96483->96491 96484 d929c8 _free 20 API calls 96486 d95071 96484->96486 96486->96473 96487->96484 96488->96470 96489->96472 96490->96472 96491->96483 96492->96462 96494 d82357 96493->96494 96494->96421 96494->96494 96496 d84bdb _abort 96495->96496 96497 d84be2 96496->96497 96498 d84bf4 96496->96498 96534 d84d29 GetModuleHandleW 96497->96534 96519 d92f5e EnterCriticalSection 96498->96519 96501 d84be7 96501->96498 96535 d84d6d GetModuleHandleExW 96501->96535 96504 d84bfb 96514 d84c99 96504->96514 96516 d84c70 96504->96516 96520 d921a8 96504->96520 96507 d84ce2 96543 da1d29 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 96507->96543 96508 d84cb6 96526 d84ce8 96508->96526 96509 d92421 _abort 5 API calls 96509->96514 96513 d92421 _abort 5 API calls 96518 d84c88 96513->96518 96523 d84cd9 96514->96523 96516->96513 96516->96518 96518->96509 96519->96504 96544 d91ee1 96520->96544 96563 d92fa6 LeaveCriticalSection 96523->96563 96525 d84cb2 96525->96507 96525->96508 96564 d9360c 96526->96564 96529 d84d16 96531 d84d6d _abort 8 API calls 96529->96531 96530 d84cf6 GetPEB 96530->96529 96532 d84d06 GetCurrentProcess TerminateProcess 96530->96532 96533 d84d1e ExitProcess 96531->96533 96532->96529 96534->96501 96536 d84dba 96535->96536 96537 d84d97 GetProcAddress 96535->96537 96539 d84dc9 96536->96539 96540 d84dc0 FreeLibrary 96536->96540 96538 d84dac 96537->96538 96538->96536 96541 d80a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 96539->96541 96540->96539 96542 d84bf3 96541->96542 96542->96498 96547 d91e90 96544->96547 96546 d91f05 96546->96516 96548 d91e9c ___DestructExceptionObject 96547->96548 96555 d92f5e EnterCriticalSection 96548->96555 96550 d91eaa 96556 d91f31 96550->96556 96554 d91ec8 __wsopen_s 96554->96546 96555->96550 96557 d91f59 96556->96557 96558 d91f51 96556->96558 96557->96558 96561 d929c8 _free 20 API calls 96557->96561 96559 d80a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 96558->96559 96560 d91eb7 96559->96560 96562 d91ed5 LeaveCriticalSection _abort 96560->96562 96561->96558 96562->96554 96563->96525 96565 d93631 96564->96565 96566 d93627 96564->96566 96571 d92fd7 5 API calls 2 library calls 96565->96571 96568 d80a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 96566->96568 96570 d84cf2 96568->96570 96569 d93648 96569->96566 96570->96529 96570->96530 96571->96569 96572 d61033 96577 d64c91 96572->96577 96576 d61042 96578 d6a961 22 API calls 96577->96578 96579 d64cff 96578->96579 96585 d63af0 96579->96585 96581 d64d9c 96582 d61038 96581->96582 96588 d651f7 22 API calls __fread_nolock 96581->96588 96584 d800a3 29 API calls __onexit 96582->96584 96584->96576 96589 d63b1c 96585->96589 96588->96581 96590 d63b0f 96589->96590 96591 d63b29 96589->96591 96590->96581 96591->96590 96592 d63b30 RegOpenKeyExW 96591->96592 96592->96590 96593 d63b4a RegQueryValueExW 96592->96593 96594 d63b80 RegCloseKey 96593->96594 96595 d63b6b 96593->96595 96594->96590 96595->96594 96596 d6f7bf 96597 d6fcb6 96596->96597 96598 d6f7d3 96596->96598 96685 d6aceb 23 API calls ISource 96597->96685 96600 d6fcc2 96598->96600 96602 d7fddb 22 API calls 96598->96602 96686 d6aceb 23 API calls ISource 96600->96686 96603 d6f7e5 96602->96603 96603->96600 96604 d6f83e 96603->96604 96605 d6fd3d 96603->96605 96622 d6ed9d ISource 96604->96622 96631 d71310 96604->96631 96687 dd1155 22 API calls 96605->96687 96608 db4beb 96693 dd359c 82 API calls __wsopen_s 96608->96693 96609 d6fef7 96609->96622 96689 d6a8c7 22 API calls __fread_nolock 96609->96689 96611 d7fddb 22 API calls 96626 d6ec76 ISource 96611->96626 96613 db4b0b 96691 dd359c 82 API calls __wsopen_s 96613->96691 96614 db4600 96614->96622 96688 d6a8c7 22 API calls __fread_nolock 96614->96688 96619 d6a8c7 22 API calls 96619->96626 96621 d80242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96621->96626 96623 d6fbe3 96623->96622 96625 db4bdc 96623->96625 96630 d6f3ae ISource 96623->96630 96624 d6a961 22 API calls 96624->96626 96692 dd359c 82 API calls __wsopen_s 96625->96692 96626->96608 96626->96609 96626->96611 96626->96613 96626->96614 96626->96619 96626->96621 96626->96622 96626->96623 96626->96624 96627 d800a3 29 API calls pre_c_initialization 96626->96627 96629 d801f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96626->96629 96626->96630 96683 d701e0 348 API calls 2 library calls 96626->96683 96684 d706a0 41 API calls ISource 96626->96684 96627->96626 96629->96626 96630->96622 96690 dd359c 82 API calls __wsopen_s 96630->96690 96632 d71376 96631->96632 96633 d717b0 96631->96633 96635 db6331 96632->96635 96638 d71940 9 API calls 96632->96638 96749 d80242 5 API calls __Init_thread_wait 96633->96749 96754 de709c 348 API calls 96635->96754 96636 d717ba 96642 d69cb3 22 API calls 96636->96642 96644 d717fb 96636->96644 96639 d713a0 96638->96639 96641 d71940 9 API calls 96639->96641 96640 db633d 96640->96626 96643 d713b6 96641->96643 96651 d717d4 96642->96651 96643->96644 96646 d713ec 96643->96646 96645 db6346 96644->96645 96647 d7182c 96644->96647 96755 dd359c 82 API calls __wsopen_s 96645->96755 96646->96645 96670 d71408 __fread_nolock 96646->96670 96751 d6aceb 23 API calls ISource 96647->96751 96650 d71839 96752 d7d217 348 API calls 96650->96752 96750 d801f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96651->96750 96654 db636e 96756 dd359c 82 API calls __wsopen_s 96654->96756 96655 d7152f 96657 db63d1 96655->96657 96658 d7153c 96655->96658 96758 de5745 54 API calls _wcslen 96657->96758 96659 d71940 9 API calls 96658->96659 96661 d71549 96659->96661 96665 d71940 9 API calls 96661->96665 96677 d715c7 ISource 96661->96677 96662 d7fddb 22 API calls 96662->96670 96663 d7fe0b 22 API calls 96663->96670 96664 d71872 96664->96635 96753 d7faeb 23 API calls 96664->96753 96674 d71563 96665->96674 96666 d7171d 96666->96626 96670->96650 96670->96654 96670->96655 96670->96662 96670->96663 96671 db63b2 96670->96671 96670->96677 96724 d6ec40 96670->96724 96757 dd359c 82 API calls __wsopen_s 96671->96757 96674->96677 96759 d6a8c7 22 API calls __fread_nolock 96674->96759 96676 d7167b ISource 96676->96666 96748 d7ce17 22 API calls ISource 96676->96748 96677->96664 96677->96676 96694 d71940 96677->96694 96704 d7f645 96677->96704 96711 dd5c5a 96677->96711 96716 dea2ea 96677->96716 96721 deab67 96677->96721 96760 dd359c 82 API calls __wsopen_s 96677->96760 96683->96626 96684->96626 96685->96600 96686->96605 96687->96622 96688->96622 96689->96622 96690->96622 96691->96622 96692->96608 96693->96622 96695 d71981 96694->96695 96696 d7195d 96694->96696 96761 d80242 5 API calls __Init_thread_wait 96695->96761 96703 d7196e 96696->96703 96763 d80242 5 API calls __Init_thread_wait 96696->96763 96698 d7198b 96698->96696 96762 d801f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96698->96762 96701 d78727 96701->96703 96764 d801f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96701->96764 96703->96677 96765 d6b567 96704->96765 96706 d7f659 96707 d7f661 timeGetTime 96706->96707 96708 dbf2dc Sleep 96706->96708 96709 d6b567 39 API calls 96707->96709 96710 d7f677 96709->96710 96710->96677 96771 d67510 96711->96771 96715 dd5c77 96715->96677 96717 d67510 53 API calls 96716->96717 96718 dea306 96717->96718 96803 dcd4dc CreateToolhelp32Snapshot Process32FirstW 96718->96803 96720 dea315 96720->96677 96824 deaff9 96721->96824 96742 d6ec76 ISource 96724->96742 96725 d7fddb 22 API calls 96725->96742 96726 d80242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96726->96742 96727 d6fef7 96740 d6ed9d ISource 96727->96740 96934 d6a8c7 22 API calls __fread_nolock 96727->96934 96730 db4b0b 96936 dd359c 82 API calls __wsopen_s 96730->96936 96731 d6a8c7 22 API calls 96731->96742 96732 db4600 96732->96740 96933 d6a8c7 22 API calls __fread_nolock 96732->96933 96738 d6fbe3 96738->96740 96741 db4bdc 96738->96741 96747 d6f3ae ISource 96738->96747 96739 d6a961 22 API calls 96739->96742 96740->96670 96937 dd359c 82 API calls __wsopen_s 96741->96937 96742->96725 96742->96726 96742->96727 96742->96730 96742->96731 96742->96732 96742->96738 96742->96739 96742->96740 96743 d800a3 29 API calls pre_c_initialization 96742->96743 96745 d801f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96742->96745 96746 db4beb 96742->96746 96742->96747 96931 d701e0 348 API calls 2 library calls 96742->96931 96932 d706a0 41 API calls ISource 96742->96932 96743->96742 96745->96742 96938 dd359c 82 API calls __wsopen_s 96746->96938 96747->96740 96935 dd359c 82 API calls __wsopen_s 96747->96935 96748->96676 96749->96636 96750->96644 96751->96650 96752->96664 96753->96664 96754->96640 96755->96677 96756->96677 96757->96677 96758->96674 96759->96677 96760->96677 96761->96698 96762->96696 96763->96701 96764->96703 96766 d6b578 96765->96766 96767 d6b57f 96765->96767 96766->96767 96770 d862d1 39 API calls _strftime 96766->96770 96767->96706 96769 d6b5c2 96769->96706 96770->96769 96772 d67525 96771->96772 96788 d67522 96771->96788 96773 d6752d 96772->96773 96774 d6755b 96772->96774 96799 d851c6 26 API calls 96773->96799 96777 d6756d 96774->96777 96783 da50f6 96774->96783 96785 da500f 96774->96785 96800 d7fb21 51 API calls 96777->96800 96778 d6753d 96782 d7fddb 22 API calls 96778->96782 96779 da510e 96779->96779 96784 d67547 96782->96784 96802 d85183 26 API calls 96783->96802 96786 d69cb3 22 API calls 96784->96786 96787 d7fe0b 22 API calls 96785->96787 96793 da5088 96785->96793 96786->96788 96789 da5058 96787->96789 96794 dcdbbe lstrlenW 96788->96794 96790 d7fddb 22 API calls 96789->96790 96791 da507f 96790->96791 96792 d69cb3 22 API calls 96791->96792 96792->96793 96801 d7fb21 51 API calls 96793->96801 96795 dcdbdc GetFileAttributesW 96794->96795 96797 dcdc06 96794->96797 96796 dcdbe8 FindFirstFileW 96795->96796 96795->96797 96796->96797 96798 dcdbf9 FindClose 96796->96798 96797->96715 96798->96797 96799->96778 96800->96778 96801->96783 96802->96779 96813 dcdef7 96803->96813 96805 dcd529 Process32NextW 96806 dcd5db CloseHandle 96805->96806 96812 dcd522 96805->96812 96806->96720 96807 d6a961 22 API calls 96807->96812 96808 d69cb3 22 API calls 96808->96812 96812->96805 96812->96806 96812->96807 96812->96808 96819 d6525f 22 API calls 96812->96819 96820 d66350 22 API calls 96812->96820 96821 d7ce60 41 API calls 96812->96821 96814 dcdf02 96813->96814 96815 dcdf19 96814->96815 96818 dcdf1f 96814->96818 96822 d863b2 GetStringTypeW _strftime 96814->96822 96823 d862fb 39 API calls _strftime 96815->96823 96818->96812 96819->96812 96820->96812 96821->96812 96822->96814 96823->96818 96825 deb01d ___scrt_fastfail 96824->96825 96826 deb058 96825->96826 96827 deb094 96825->96827 96828 d6b567 39 API calls 96826->96828 96831 d6b567 39 API calls 96827->96831 96833 deb08b 96827->96833 96829 deb063 96828->96829 96829->96833 96837 d6b567 39 API calls 96829->96837 96830 deb0ed 96834 d67510 53 API calls 96830->96834 96832 deb0a5 96831->96832 96836 d6b567 39 API calls 96832->96836 96833->96830 96838 d6b567 39 API calls 96833->96838 96835 deb10b 96834->96835 96915 d67620 96835->96915 96836->96833 96840 deb078 96837->96840 96838->96830 96842 d6b567 39 API calls 96840->96842 96841 deb115 96843 deb11f 96841->96843 96844 deb1d8 96841->96844 96842->96833 96845 d67510 53 API calls 96843->96845 96846 deb20a GetCurrentDirectoryW 96844->96846 96849 d67510 53 API calls 96844->96849 96847 deb130 96845->96847 96848 d7fe0b 22 API calls 96846->96848 96850 d67620 22 API calls 96847->96850 96851 deb22f GetCurrentDirectoryW 96848->96851 96852 deb1ef 96849->96852 96853 deb13a 96850->96853 96854 deb23c 96851->96854 96855 d67620 22 API calls 96852->96855 96857 d67510 53 API calls 96853->96857 96859 deb275 96854->96859 96919 d69c6e 22 API calls 96854->96919 96856 deb1f9 _wcslen 96855->96856 96856->96846 96856->96859 96858 deb14b 96857->96858 96860 d67620 22 API calls 96858->96860 96864 deb28b 96859->96864 96865 deb287 96859->96865 96862 deb155 96860->96862 96866 d67510 53 API calls 96862->96866 96863 deb255 96920 d69c6e 22 API calls 96863->96920 96922 dd07c0 10 API calls 96864->96922 96872 deb39a CreateProcessW 96865->96872 96873 deb2f8 96865->96873 96869 deb166 96866->96869 96874 d67620 22 API calls 96869->96874 96870 deb265 96921 d69c6e 22 API calls 96870->96921 96871 deb294 96923 dd06e6 10 API calls 96871->96923 96914 deb32f _wcslen 96872->96914 96925 dc11c8 39 API calls 96873->96925 96878 deb170 96874->96878 96879 deb1a6 GetSystemDirectoryW 96878->96879 96882 d67510 53 API calls 96878->96882 96884 d7fe0b 22 API calls 96879->96884 96880 deb2aa 96924 dd05a7 8 API calls 96880->96924 96881 deb2fd 96885 deb32a 96881->96885 96886 deb323 96881->96886 96888 deb187 96882->96888 96891 deb1cb GetSystemDirectoryW 96884->96891 96927 dc14ce 6 API calls 96885->96927 96926 dc1201 128 API calls 2 library calls 96886->96926 96893 d67620 22 API calls 96888->96893 96890 deb2d0 96890->96865 96891->96854 96892 deb328 96892->96914 96894 deb191 _wcslen 96893->96894 96894->96854 96894->96879 96895 deb42f CloseHandle 96897 deb43f 96895->96897 96905 deb49a 96895->96905 96896 deb3d6 GetLastError 96904 deb41a 96896->96904 96899 deb446 CloseHandle 96897->96899 96900 deb451 96897->96900 96899->96900 96902 deb458 CloseHandle 96900->96902 96903 deb463 96900->96903 96901 deb4a6 96901->96904 96902->96903 96906 deb46a CloseHandle 96903->96906 96907 deb475 96903->96907 96930 dd0175 6 API calls 96904->96930 96905->96901 96910 deb4d2 CloseHandle 96905->96910 96906->96907 96928 dd09d9 34 API calls 96907->96928 96910->96904 96911 deab79 96911->96677 96912 deb486 96929 deb536 25 API calls 96912->96929 96914->96895 96914->96896 96916 d6762a _wcslen 96915->96916 96917 d7fe0b 22 API calls 96916->96917 96918 d6763f 96917->96918 96918->96841 96919->96863 96920->96870 96921->96859 96922->96871 96923->96880 96924->96890 96925->96881 96926->96892 96927->96914 96928->96912 96929->96905 96930->96911 96931->96742 96932->96742 96933->96740 96934->96740 96935->96740 96936->96740 96937->96746 96938->96740 96939 d6defc 96942 d61d6f 96939->96942 96941 d6df07 96943 d61d8c 96942->96943 96951 d61f6f 96943->96951 96945 d61da6 96946 da2759 96945->96946 96948 d61e36 96945->96948 96950 d61dc2 96945->96950 96955 dd359c 82 API calls __wsopen_s 96946->96955 96948->96941 96950->96948 96954 d6289a 23 API calls 96950->96954 96952 d6ec40 348 API calls 96951->96952 96953 d61f98 96952->96953 96953->96945 96954->96948 96955->96948 96956 d6105b 96961 d6344d 96956->96961 96958 d6106a 96992 d800a3 29 API calls __onexit 96958->96992 96960 d61074 96962 d6345d __wsopen_s 96961->96962 96963 d6a961 22 API calls 96962->96963 96964 d63513 96963->96964 96965 d63a5a 24 API calls 96964->96965 96966 d6351c 96965->96966 96993 d63357 96966->96993 96969 d633c6 22 API calls 96970 d63535 96969->96970 96971 d6515f 22 API calls 96970->96971 96972 d63544 96971->96972 96973 d6a961 22 API calls 96972->96973 96974 d6354d 96973->96974 96975 d6a6c3 22 API calls 96974->96975 96976 d63556 RegOpenKeyExW 96975->96976 96977 da3176 RegQueryValueExW 96976->96977 96982 d63578 96976->96982 96978 da320c RegCloseKey 96977->96978 96979 da3193 96977->96979 96978->96982 96991 da321e _wcslen 96978->96991 96980 d7fe0b 22 API calls 96979->96980 96981 da31ac 96980->96981 96983 d65722 22 API calls 96981->96983 96982->96958 96984 da31b7 RegQueryValueExW 96983->96984 96985 da31d4 96984->96985 96988 da31ee ISource 96984->96988 96986 d66b57 22 API calls 96985->96986 96986->96988 96987 d64c6d 22 API calls 96987->96991 96988->96978 96989 d69cb3 22 API calls 96989->96991 96990 d6515f 22 API calls 96990->96991 96991->96982 96991->96987 96991->96989 96991->96990 96992->96960 96994 da1f50 __wsopen_s 96993->96994 96995 d63364 GetFullPathNameW 96994->96995 96996 d63386 96995->96996 96997 d66b57 22 API calls 96996->96997 96998 d633a4 96997->96998 96998->96969 96999 d61098 97004 d642de 96999->97004 97003 d610a7 97005 d6a961 22 API calls 97004->97005 97006 d642f5 GetVersionExW 97005->97006 97007 d66b57 22 API calls 97006->97007 97008 d64342 97007->97008 97009 d693b2 22 API calls 97008->97009 97018 d64378 97008->97018 97010 d6436c 97009->97010 97012 d637a0 22 API calls 97010->97012 97011 d6441b GetCurrentProcess IsWow64Process 97013 d64437 97011->97013 97012->97018 97014 d6444f LoadLibraryA 97013->97014 97015 da3824 GetSystemInfo 97013->97015 97016 d64460 GetProcAddress 97014->97016 97017 d6449c GetSystemInfo 97014->97017 97016->97017 97020 d64470 GetNativeSystemInfo 97016->97020 97021 d64476 97017->97021 97018->97011 97019 da37df 97018->97019 97020->97021 97022 d6109d 97021->97022 97023 d6447a FreeLibrary 97021->97023 97024 d800a3 29 API calls __onexit 97022->97024 97023->97022 97024->97003 97025 db3f75 97036 d7ceb1 97025->97036 97027 db3f8b 97028 db4006 97027->97028 97103 d7e300 23 API calls 97027->97103 97045 d6bf40 97028->97045 97030 db3fe6 97034 db4052 97030->97034 97104 dd1abf 22 API calls 97030->97104 97033 db4a88 97034->97033 97105 dd359c 82 API calls __wsopen_s 97034->97105 97037 d7ced2 97036->97037 97038 d7cebf 97036->97038 97040 d7ced7 97037->97040 97041 d7cf05 97037->97041 97106 d6aceb 23 API calls ISource 97038->97106 97042 d7fddb 22 API calls 97040->97042 97107 d6aceb 23 API calls ISource 97041->97107 97044 d7cec9 97042->97044 97044->97027 97108 d6adf0 97045->97108 97047 d6bf9d 97048 db04b6 97047->97048 97049 d6bfa9 97047->97049 97127 dd359c 82 API calls __wsopen_s 97048->97127 97051 db04c6 97049->97051 97052 d6c01e 97049->97052 97128 dd359c 82 API calls __wsopen_s 97051->97128 97113 d6ac91 97052->97113 97055 d6c603 97055->97034 97056 d6c7da 97061 d7fe0b 22 API calls 97056->97061 97057 dc7120 22 API calls 97074 d6c039 ISource __fread_nolock 97057->97074 97066 d6c808 __fread_nolock 97061->97066 97063 db04f5 97067 db055a 97063->97067 97129 d7d217 348 API calls 97063->97129 97071 d7fe0b 22 API calls 97066->97071 97067->97055 97130 dd359c 82 API calls __wsopen_s 97067->97130 97068 d6ec40 348 API calls 97068->97074 97069 d6af8a 22 API calls 97069->97074 97070 db091a 97140 dd3209 23 API calls 97070->97140 97075 d6c350 ISource __fread_nolock 97071->97075 97074->97055 97074->97056 97074->97057 97074->97063 97074->97066 97074->97067 97074->97068 97074->97069 97074->97070 97076 db08a5 97074->97076 97080 db0591 97074->97080 97083 db08f6 97074->97083 97085 d6c237 97074->97085 97087 d6bbe0 40 API calls 97074->97087 97093 d7fddb 22 API calls 97074->97093 97098 db09bf 97074->97098 97102 d7fe0b 22 API calls 97074->97102 97117 d6ad81 97074->97117 97132 dc7099 22 API calls __fread_nolock 97074->97132 97133 de5745 54 API calls _wcslen 97074->97133 97134 d7aa42 22 API calls ISource 97074->97134 97135 dcf05c 40 API calls 97074->97135 97136 d6a993 41 API calls 97074->97136 97137 d6aceb 23 API calls ISource 97074->97137 97088 d6c3ac 97075->97088 97126 d7ce17 22 API calls ISource 97075->97126 97077 d6ec40 348 API calls 97076->97077 97078 db08cf 97077->97078 97078->97055 97138 d6a81b 41 API calls 97078->97138 97131 dd359c 82 API calls __wsopen_s 97080->97131 97139 dd359c 82 API calls __wsopen_s 97083->97139 97092 d6c253 97085->97092 97141 d6a8c7 22 API calls __fread_nolock 97085->97141 97087->97074 97088->97034 97091 db0976 97142 d6aceb 23 API calls ISource 97091->97142 97092->97091 97096 d6c297 ISource 97092->97096 97093->97074 97096->97098 97124 d6aceb 23 API calls ISource 97096->97124 97098->97055 97143 dd359c 82 API calls __wsopen_s 97098->97143 97099 d6c335 97099->97098 97100 d6c342 97099->97100 97125 d6a704 22 API calls ISource 97100->97125 97102->97074 97103->97030 97104->97028 97105->97033 97106->97044 97107->97044 97109 d6ae01 97108->97109 97112 d6ae1c ISource 97108->97112 97110 d6aec9 22 API calls 97109->97110 97111 d6ae09 CharUpperBuffW 97110->97111 97111->97112 97112->97047 97114 d6acae 97113->97114 97115 d6acd1 97114->97115 97144 dd359c 82 API calls __wsopen_s 97114->97144 97115->97074 97118 dafadb 97117->97118 97119 d6ad92 97117->97119 97120 d7fddb 22 API calls 97119->97120 97121 d6ad99 97120->97121 97145 d6adcd 97121->97145 97124->97099 97125->97075 97126->97075 97127->97051 97128->97055 97129->97067 97130->97055 97131->97055 97132->97074 97133->97074 97134->97074 97135->97074 97136->97074 97137->97074 97138->97083 97139->97055 97140->97085 97141->97092 97142->97098 97143->97055 97144->97115 97148 d6addd 97145->97148 97146 d6adb6 97146->97074 97147 d7fddb 22 API calls 97147->97148 97148->97146 97148->97147 97149 d6a961 22 API calls 97148->97149 97151 d6adcd 22 API calls 97148->97151 97152 d6a8c7 22 API calls __fread_nolock 97148->97152 97149->97148 97151->97148 97152->97148 97153 d61044 97158 d610f3 97153->97158 97155 d6104a 97194 d800a3 29 API calls __onexit 97155->97194 97157 d61054 97195 d61398 97158->97195 97162 d6116a 97163 d6a961 22 API calls 97162->97163 97164 d61174 97163->97164 97165 d6a961 22 API calls 97164->97165 97166 d6117e 97165->97166 97167 d6a961 22 API calls 97166->97167 97168 d61188 97167->97168 97169 d6a961 22 API calls 97168->97169 97170 d611c6 97169->97170 97171 d6a961 22 API calls 97170->97171 97172 d61292 97171->97172 97205 d6171c 97172->97205 97176 d612c4 97177 d6a961 22 API calls 97176->97177 97178 d612ce 97177->97178 97179 d71940 9 API calls 97178->97179 97180 d612f9 97179->97180 97226 d61aab 97180->97226 97182 d61315 97183 d61325 GetStdHandle 97182->97183 97184 d6137a 97183->97184 97185 da2485 97183->97185 97188 d61387 OleInitialize 97184->97188 97185->97184 97186 da248e 97185->97186 97187 d7fddb 22 API calls 97186->97187 97189 da2495 97187->97189 97188->97155 97233 dd011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 97189->97233 97191 da249e 97234 dd0944 CreateThread 97191->97234 97193 da24aa CloseHandle 97193->97184 97194->97157 97235 d613f1 97195->97235 97198 d613f1 22 API calls 97199 d613d0 97198->97199 97200 d6a961 22 API calls 97199->97200 97201 d613dc 97200->97201 97202 d66b57 22 API calls 97201->97202 97203 d61129 97202->97203 97204 d61bc3 6 API calls 97203->97204 97204->97162 97206 d6a961 22 API calls 97205->97206 97207 d6172c 97206->97207 97208 d6a961 22 API calls 97207->97208 97209 d61734 97208->97209 97210 d6a961 22 API calls 97209->97210 97211 d6174f 97210->97211 97212 d7fddb 22 API calls 97211->97212 97213 d6129c 97212->97213 97214 d61b4a 97213->97214 97215 d61b58 97214->97215 97216 d6a961 22 API calls 97215->97216 97217 d61b63 97216->97217 97218 d6a961 22 API calls 97217->97218 97219 d61b6e 97218->97219 97220 d6a961 22 API calls 97219->97220 97221 d61b79 97220->97221 97222 d6a961 22 API calls 97221->97222 97223 d61b84 97222->97223 97224 d7fddb 22 API calls 97223->97224 97225 d61b96 RegisterWindowMessageW 97224->97225 97225->97176 97227 da272d 97226->97227 97228 d61abb 97226->97228 97242 dd3209 23 API calls 97227->97242 97230 d7fddb 22 API calls 97228->97230 97232 d61ac3 97230->97232 97231 da2738 97232->97182 97233->97191 97234->97193 97243 dd092a 28 API calls 97234->97243 97236 d6a961 22 API calls 97235->97236 97237 d613fc 97236->97237 97238 d6a961 22 API calls 97237->97238 97239 d61404 97238->97239 97240 d6a961 22 API calls 97239->97240 97241 d613c6 97240->97241 97241->97198 97242->97231 97244 d62de3 97245 d62df0 __wsopen_s 97244->97245 97246 da2c2b ___scrt_fastfail 97245->97246 97247 d62e09 97245->97247 97250 da2c47 GetOpenFileNameW 97246->97250 97248 d63aa2 23 API calls 97247->97248 97249 d62e12 97248->97249 97260 d62da5 97249->97260 97252 da2c96 97250->97252 97254 d66b57 22 API calls 97252->97254 97256 da2cab 97254->97256 97256->97256 97257 d62e27 97278 d644a8 97257->97278 97261 da1f50 __wsopen_s 97260->97261 97262 d62db2 GetLongPathNameW 97261->97262 97263 d66b57 22 API calls 97262->97263 97264 d62dda 97263->97264 97265 d63598 97264->97265 97266 d6a961 22 API calls 97265->97266 97267 d635aa 97266->97267 97268 d63aa2 23 API calls 97267->97268 97269 d635b5 97268->97269 97270 d635c0 97269->97270 97274 da32eb 97269->97274 97272 d6515f 22 API calls 97270->97272 97273 d635cc 97272->97273 97307 d635f3 97273->97307 97277 da330d 97274->97277 97313 d7ce60 41 API calls 97274->97313 97276 d635df 97276->97257 97279 d64ecb 94 API calls 97278->97279 97280 d644cd 97279->97280 97281 da3833 97280->97281 97282 d64ecb 94 API calls 97280->97282 97283 dd2cf9 80 API calls 97281->97283 97284 d644e1 97282->97284 97285 da3848 97283->97285 97284->97281 97286 d644e9 97284->97286 97287 da3869 97285->97287 97288 da384c 97285->97288 97290 d644f5 97286->97290 97291 da3854 97286->97291 97289 d7fe0b 22 API calls 97287->97289 97292 d64f39 68 API calls 97288->97292 97306 da38ae 97289->97306 97314 d6940c 136 API calls 2 library calls 97290->97314 97315 dcda5a 82 API calls 97291->97315 97292->97291 97295 da3862 97295->97287 97296 d62e31 97297 d64f39 68 API calls 97300 da3a5f 97297->97300 97300->97297 97321 dc989b 82 API calls __wsopen_s 97300->97321 97303 d69cb3 22 API calls 97303->97306 97306->97300 97306->97303 97316 dc967e 22 API calls __fread_nolock 97306->97316 97317 dc95ad 42 API calls _wcslen 97306->97317 97318 dd0b5a 22 API calls 97306->97318 97319 d6a4a1 22 API calls __fread_nolock 97306->97319 97320 d63ff7 22 API calls 97306->97320 97308 d63605 97307->97308 97312 d63624 __fread_nolock 97307->97312 97310 d7fe0b 22 API calls 97308->97310 97309 d7fddb 22 API calls 97311 d6363b 97309->97311 97310->97312 97311->97276 97312->97309 97313->97274 97314->97296 97315->97295 97316->97306 97317->97306 97318->97306 97319->97306 97320->97306 97321->97300 97322 da2402 97325 d61410 97322->97325 97326 da24b8 DestroyWindow 97325->97326 97327 d6144f mciSendStringW 97325->97327 97340 da24c4 97326->97340 97328 d6146b 97327->97328 97332 d616c6 97327->97332 97330 d61479 97328->97330 97328->97340 97329 d616d5 UnregisterHotKey 97329->97332 97358 d6182e 97330->97358 97332->97328 97332->97329 97334 da2509 97339 da252d 97334->97339 97341 da251c FreeLibrary 97334->97341 97335 da24d8 97335->97340 97364 d66246 CloseHandle 97335->97364 97336 da24e2 FindClose 97336->97340 97337 d6148e 97337->97339 97346 d6149c 97337->97346 97342 da2541 VirtualFree 97339->97342 97349 d61509 97339->97349 97340->97334 97340->97335 97340->97336 97341->97334 97342->97339 97343 d614f8 CoUninitialize 97343->97349 97344 d61514 97348 d61524 97344->97348 97345 da2589 97351 da2598 ISource 97345->97351 97365 dd32eb 6 API calls ISource 97345->97365 97346->97343 97362 d61944 VirtualFreeEx CloseHandle 97348->97362 97349->97344 97349->97345 97354 da2627 97351->97354 97366 dc64d4 22 API calls ISource 97351->97366 97353 d6153a 97353->97351 97355 d6161f 97353->97355 97354->97354 97355->97354 97363 d61876 CloseHandle InternetCloseHandle InternetCloseHandle WaitForSingleObject 97355->97363 97357 d616c1 97360 d6183b 97358->97360 97359 d61480 97359->97334 97359->97337 97360->97359 97367 dc702a 22 API calls 97360->97367 97362->97353 97363->97357 97364->97335 97365->97345 97366->97351 97367->97360 97368 d61cad SystemParametersInfoW 97369 db2a00 97375 d6d7b0 ISource 97369->97375 97370 d6db11 PeekMessageW 97370->97375 97371 d6d807 GetInputState 97371->97370 97371->97375 97372 d6d9d5 97374 db1cbe TranslateAcceleratorW 97374->97375 97375->97370 97375->97371 97375->97372 97375->97374 97376 d6da04 timeGetTime 97375->97376 97377 d6db73 TranslateMessage DispatchMessageW 97375->97377 97378 d6db8f PeekMessageW 97375->97378 97379 d6dbaf Sleep 97375->97379 97380 db2b74 Sleep 97375->97380 97383 db1dda timeGetTime 97375->97383 97394 db2a51 97375->97394 97397 d6ec40 348 API calls 97375->97397 97398 d71310 348 API calls 97375->97398 97399 d6bf40 348 API calls 97375->97399 97401 d6dd50 97375->97401 97408 d7edf6 97375->97408 97413 d6dfd0 348 API calls 3 library calls 97375->97413 97414 d7e551 timeGetTime 97375->97414 97416 dd3a2a 23 API calls 97375->97416 97417 dd359c 82 API calls __wsopen_s 97375->97417 97376->97375 97377->97378 97378->97375 97379->97375 97380->97394 97415 d7e300 23 API calls 97383->97415 97385 dcd4dc 47 API calls 97385->97394 97386 db2c0b GetExitCodeProcess 97387 db2c21 WaitForSingleObject 97386->97387 97388 db2c37 CloseHandle 97386->97388 97387->97375 97387->97388 97388->97394 97389 df29bf GetForegroundWindow 97389->97394 97391 db2ca9 Sleep 97391->97375 97394->97372 97394->97375 97394->97385 97394->97386 97394->97389 97394->97391 97418 de5658 23 API calls 97394->97418 97419 dce97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 97394->97419 97420 d7e551 timeGetTime 97394->97420 97397->97375 97398->97375 97399->97375 97402 d6dd83 97401->97402 97403 d6dd6f 97401->97403 97453 dd359c 82 API calls __wsopen_s 97402->97453 97421 d6d260 97403->97421 97406 d6dd7a 97406->97375 97407 db2f75 97407->97407 97410 d7ee12 97408->97410 97411 d7ee09 97408->97411 97409 d7ee36 IsDialogMessageW 97409->97410 97409->97411 97410->97409 97410->97411 97412 dbefaf GetClassLongW 97410->97412 97411->97375 97412->97409 97412->97410 97413->97375 97414->97375 97415->97375 97416->97375 97417->97375 97418->97394 97419->97394 97420->97394 97422 d6ec40 348 API calls 97421->97422 97432 d6d29d 97422->97432 97424 d6d30b ISource 97424->97406 97425 d6d6d5 97425->97424 97434 d7fe0b 22 API calls 97425->97434 97426 d6d3c3 97426->97425 97428 d6d3ce 97426->97428 97427 d6d5ff 97430 d6d614 97427->97430 97431 db1bb5 97427->97431 97429 d7fddb 22 API calls 97428->97429 97442 d6d3d5 __fread_nolock 97429->97442 97435 d7fddb 22 API calls 97430->97435 97458 de5705 23 API calls 97431->97458 97432->97424 97432->97425 97432->97426 97433 d6d4b8 97432->97433 97438 db1bc4 97432->97438 97440 d7fddb 22 API calls 97432->97440 97448 d6d429 ISource __fread_nolock 97432->97448 97437 d7fe0b 22 API calls 97433->97437 97434->97442 97445 d6d46a 97435->97445 97437->97448 97459 dd359c 82 API calls __wsopen_s 97438->97459 97439 d7fddb 22 API calls 97441 d6d3f6 97439->97441 97440->97432 97441->97448 97454 d6bec0 348 API calls 97441->97454 97442->97439 97442->97441 97444 db1ba4 97457 dd359c 82 API calls __wsopen_s 97444->97457 97445->97406 97447 d61f6f 348 API calls 97447->97448 97448->97427 97448->97444 97448->97445 97448->97447 97449 db1b7f 97448->97449 97451 db1b5d 97448->97451 97456 dd359c 82 API calls __wsopen_s 97449->97456 97455 dd359c 82 API calls __wsopen_s 97451->97455 97453->97407 97454->97448 97455->97445 97456->97445 97457->97445 97458->97438 97459->97424 97460 d98402 97465 d981be 97460->97465 97462 d9842a 97470 d981ef try_get_first_available_module 97465->97470 97467 d983ee 97484 d927ec 26 API calls __wsopen_s 97467->97484 97469 d98343 97469->97462 97477 da0984 97469->97477 97473 d98338 97470->97473 97480 d88e0b 40 API calls 2 library calls 97470->97480 97472 d9838c 97472->97473 97481 d88e0b 40 API calls 2 library calls 97472->97481 97473->97469 97483 d8f2d9 20 API calls _abort 97473->97483 97475 d983ab 97475->97473 97482 d88e0b 40 API calls 2 library calls 97475->97482 97485 da0081 97477->97485 97479 da099f 97479->97462 97480->97472 97481->97475 97482->97473 97483->97467 97484->97469 97486 da008d ___DestructExceptionObject 97485->97486 97487 da009b 97486->97487 97490 da00d4 97486->97490 97543 d8f2d9 20 API calls _abort 97487->97543 97489 da00a0 97544 d927ec 26 API calls __wsopen_s 97489->97544 97496 da065b 97490->97496 97495 da00aa __wsopen_s 97495->97479 97546 da042f 97496->97546 97499 da068d 97578 d8f2c6 20 API calls _abort 97499->97578 97500 da06a6 97564 d95221 97500->97564 97503 da06ab 97504 da06cb 97503->97504 97505 da06b4 97503->97505 97577 da039a CreateFileW 97504->97577 97580 d8f2c6 20 API calls _abort 97505->97580 97509 da06b9 97581 d8f2d9 20 API calls _abort 97509->97581 97511 da0781 GetFileType 97512 da078c GetLastError 97511->97512 97518 da07d3 97511->97518 97584 d8f2a3 20 API calls __dosmaperr 97512->97584 97513 da0756 GetLastError 97583 d8f2a3 20 API calls __dosmaperr 97513->97583 97515 da0704 97515->97511 97515->97513 97582 da039a CreateFileW 97515->97582 97517 da079a CloseHandle 97520 da0692 97517->97520 97521 da07c3 97517->97521 97586 d9516a 21 API calls 2 library calls 97518->97586 97579 d8f2d9 20 API calls _abort 97520->97579 97585 d8f2d9 20 API calls _abort 97521->97585 97523 da0749 97523->97511 97523->97513 97525 da07f4 97527 da0840 97525->97527 97587 da05ab 72 API calls 3 library calls 97525->97587 97526 da07c8 97526->97520 97531 da086d 97527->97531 97588 da014d 72 API calls 4 library calls 97527->97588 97530 da0866 97530->97531 97532 da087e 97530->97532 97533 d986ae __wsopen_s 29 API calls 97531->97533 97534 da00f8 97532->97534 97535 da08fc CloseHandle 97532->97535 97533->97534 97545 da0121 LeaveCriticalSection __wsopen_s 97534->97545 97589 da039a CreateFileW 97535->97589 97537 da0927 97538 da095d 97537->97538 97539 da0931 GetLastError 97537->97539 97538->97534 97590 d8f2a3 20 API calls __dosmaperr 97539->97590 97541 da093d 97591 d95333 21 API calls 2 library calls 97541->97591 97543->97489 97544->97495 97545->97495 97547 da0450 97546->97547 97548 da046a 97546->97548 97547->97548 97599 d8f2d9 20 API calls _abort 97547->97599 97592 da03bf 97548->97592 97551 da045f 97600 d927ec 26 API calls __wsopen_s 97551->97600 97553 da04a2 97554 da04d1 97553->97554 97601 d8f2d9 20 API calls _abort 97553->97601 97561 da0524 97554->97561 97603 d8d70d 26 API calls 2 library calls 97554->97603 97557 da051f 97559 da059e 97557->97559 97557->97561 97558 da04c6 97602 d927ec 26 API calls __wsopen_s 97558->97602 97604 d927fc 11 API calls _abort 97559->97604 97561->97499 97561->97500 97563 da05aa 97565 d9522d ___DestructExceptionObject 97564->97565 97607 d92f5e EnterCriticalSection 97565->97607 97567 d9527b 97608 d9532a 97567->97608 97569 d95259 97572 d95000 __wsopen_s 21 API calls 97569->97572 97570 d95234 97570->97567 97570->97569 97574 d952c7 EnterCriticalSection 97570->97574 97571 d952a4 __wsopen_s 97571->97503 97573 d9525e 97572->97573 97573->97567 97611 d95147 EnterCriticalSection 97573->97611 97574->97567 97576 d952d4 LeaveCriticalSection 97574->97576 97576->97570 97577->97515 97578->97520 97579->97534 97580->97509 97581->97520 97582->97523 97583->97520 97584->97517 97585->97526 97586->97525 97587->97527 97588->97530 97589->97537 97590->97541 97591->97538 97594 da03d7 97592->97594 97593 da03f2 97593->97553 97594->97593 97605 d8f2d9 20 API calls _abort 97594->97605 97596 da0416 97606 d927ec 26 API calls __wsopen_s 97596->97606 97598 da0421 97598->97553 97599->97551 97600->97548 97601->97558 97602->97554 97603->97557 97604->97563 97605->97596 97606->97598 97607->97570 97612 d92fa6 LeaveCriticalSection 97608->97612 97610 d95331 97610->97571 97611->97567 97612->97610 97613 da2ba5 97614 d62b25 97613->97614 97615 da2baf 97613->97615 97641 d62b83 7 API calls 97614->97641 97617 d63a5a 24 API calls 97615->97617 97618 da2bb8 97617->97618 97620 d69cb3 22 API calls 97618->97620 97623 da2bc6 97620->97623 97622 d62b2f 97626 d63837 49 API calls 97622->97626 97627 d62b44 97622->97627 97624 da2bce 97623->97624 97625 da2bf5 97623->97625 97628 d633c6 22 API calls 97624->97628 97629 d633c6 22 API calls 97625->97629 97626->97627 97632 d62b5f 97627->97632 97635 d630f2 Shell_NotifyIconW 97627->97635 97630 da2bd9 97628->97630 97631 da2bf1 GetForegroundWindow ShellExecuteW 97629->97631 97645 d66350 22 API calls 97630->97645 97637 da2c26 97631->97637 97639 d62b66 SetCurrentDirectoryW 97632->97639 97635->97632 97636 da2be7 97638 d633c6 22 API calls 97636->97638 97637->97632 97638->97631 97640 d62b7a 97639->97640 97646 d62cd4 7 API calls 97641->97646 97643 d62b2a 97644 d62c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 97643->97644 97644->97622 97645->97636 97646->97643

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 389 d642de-d6434d call d6a961 GetVersionExW call d66b57 394 d64353 389->394 395 da3617-da362a 389->395 396 d64355-d64357 394->396 397 da362b-da362f 395->397 398 d6435d-d643bc call d693b2 call d637a0 396->398 399 da3656 396->399 400 da3632-da363e 397->400 401 da3631 397->401 418 d643c2-d643c4 398->418 419 da37df-da37e6 398->419 405 da365d-da3660 399->405 400->397 403 da3640-da3642 400->403 401->400 403->396 404 da3648-da364f 403->404 404->395 407 da3651 404->407 408 da3666-da36a8 405->408 409 d6441b-d64435 GetCurrentProcess IsWow64Process 405->409 407->399 408->409 413 da36ae-da36b1 408->413 411 d64437 409->411 412 d64494-d6449a 409->412 415 d6443d-d64449 411->415 412->415 416 da36db-da36e5 413->416 417 da36b3-da36bd 413->417 420 d6444f-d6445e LoadLibraryA 415->420 421 da3824-da3828 GetSystemInfo 415->421 425 da36f8-da3702 416->425 426 da36e7-da36f3 416->426 422 da36ca-da36d6 417->422 423 da36bf-da36c5 417->423 418->405 424 d643ca-d643dd 418->424 427 da37e8 419->427 428 da3806-da3809 419->428 431 d64460-d6446e GetProcAddress 420->431 432 d6449c-d644a6 GetSystemInfo 420->432 422->409 423->409 433 d643e3-d643e5 424->433 434 da3726-da372f 424->434 436 da3704-da3710 425->436 437 da3715-da3721 425->437 426->409 435 da37ee 427->435 429 da380b-da381a 428->429 430 da37f4-da37fc 428->430 429->435 440 da381c-da3822 429->440 430->428 431->432 441 d64470-d64474 GetNativeSystemInfo 431->441 442 d64476-d64478 432->442 443 da374d-da3762 433->443 444 d643eb-d643ee 433->444 438 da373c-da3748 434->438 439 da3731-da3737 434->439 435->430 436->409 437->409 438->409 439->409 440->430 441->442 447 d64481-d64493 442->447 448 d6447a-d6447b FreeLibrary 442->448 445 da376f-da377b 443->445 446 da3764-da376a 443->446 449 d643f4-d6440f 444->449 450 da3791-da3794 444->450 445->409 446->409 448->447 452 d64415 449->452 453 da3780-da378c 449->453 450->409 451 da379a-da37c1 450->451 454 da37ce-da37da 451->454 455 da37c3-da37c9 451->455 452->409 453->409 454->409 455->409
                                                            APIs
                                                            • GetVersionExW.KERNEL32(?), ref: 00D6430D
                                                              • Part of subcall function 00D66B57: _wcslen.LIBCMT ref: 00D66B6A
                                                            • GetCurrentProcess.KERNEL32(?,00DFCB64,00000000,?,?), ref: 00D64422
                                                            • IsWow64Process.KERNEL32(00000000,?,?), ref: 00D64429
                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00D64454
                                                            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00D64466
                                                            • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00D64474
                                                            • FreeLibrary.KERNEL32(00000000,?,?), ref: 00D6447B
                                                            • GetSystemInfo.KERNEL32(?,?,?), ref: 00D644A0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                            • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                            • API String ID: 3290436268-3101561225
                                                            • Opcode ID: 07f8518135965756d2d7ba0dcd0b25ced8ad042d56ea639f27de21e849415830
                                                            • Instruction ID: 2033620defc0d5b774ddbf600fad0bbcb1b7216e8c8af4f08a9fba55b40b9c4d
                                                            • Opcode Fuzzy Hash: 07f8518135965756d2d7ba0dcd0b25ced8ad042d56ea639f27de21e849415830
                                                            • Instruction Fuzzy Hash: 5EA1916291A3CCDFC711CB7B7C491A57FE56B26340B1A98EDE081B3B62D660950CCB32

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 793 d642a2-d642ba CreateStreamOnHGlobal 794 d642bc-d642d3 FindResourceExW 793->794 795 d642da-d642dd 793->795 796 da35ba-da35c9 LoadResource 794->796 797 d642d9 794->797 796->797 798 da35cf-da35dd SizeofResource 796->798 797->795 798->797 799 da35e3-da35ee LockResource 798->799 799->797 800 da35f4-da3612 799->800 800->797
                                                            APIs
                                                            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00D650AA,?,?,00000000,00000000), ref: 00D642B2
                                                            • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00D650AA,?,?,00000000,00000000), ref: 00D642C9
                                                            • LoadResource.KERNEL32(?,00000000,?,?,00D650AA,?,?,00000000,00000000,?,?,?,?,?,?,00D64F20), ref: 00DA35BE
                                                            • SizeofResource.KERNEL32(?,00000000,?,?,00D650AA,?,?,00000000,00000000,?,?,?,?,?,?,00D64F20), ref: 00DA35D3
                                                            • LockResource.KERNEL32(00D650AA,?,?,00D650AA,?,?,00000000,00000000,?,?,?,?,?,?,00D64F20,?), ref: 00DA35E6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                            • String ID: SCRIPT
                                                            • API String ID: 3051347437-3967369404
                                                            • Opcode ID: a7d397675249dab697039797aac9d30c7534dcf030e934444fcb5fb8f11e3e8d
                                                            • Instruction ID: 022d86c1a005e924e0dce764e7ca8df45e98b4721f3bbb8f15265a3d655a4203
                                                            • Opcode Fuzzy Hash: a7d397675249dab697039797aac9d30c7534dcf030e934444fcb5fb8f11e3e8d
                                                            • Instruction Fuzzy Hash: C0117C70201704BFD7218B65DD58F277BB9EBC9B51F248169F402DA250DB71DC24C634

                                                            Control-flow Graph

                                                            APIs
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00D62B6B
                                                              • Part of subcall function 00D63A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00E31418,?,00D62E7F,?,?,?,00000000), ref: 00D63A78
                                                              • Part of subcall function 00D69CB3: _wcslen.LIBCMT ref: 00D69CBD
                                                            • GetForegroundWindow.USER32(runas,?,?,?,?,?,00E22224), ref: 00DA2C10
                                                            • ShellExecuteW.SHELL32(00000000,?,?,00E22224), ref: 00DA2C17
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                            • String ID: runas
                                                            • API String ID: 448630720-4000483414
                                                            • Opcode ID: 89c2d080884ed4a2f66cf9fb3e0726609a47b5d5943d8902b1f9920a1fa4467d
                                                            • Instruction ID: d57d98fa8be1374110dfb62bdfa72ed2c6118070918805c1277642d7161fb8be
                                                            • Opcode Fuzzy Hash: 89c2d080884ed4a2f66cf9fb3e0726609a47b5d5943d8902b1f9920a1fa4467d
                                                            • Instruction Fuzzy Hash: 8111E931208345ABC704FF68E9569BEBBA4DFD5340F08242DF092631A6DF318A49D732

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1239 dcd4dc-dcd524 CreateToolhelp32Snapshot Process32FirstW call dcdef7 1242 dcd5d2-dcd5d5 1239->1242 1243 dcd529-dcd538 Process32NextW 1242->1243 1244 dcd5db-dcd5ea CloseHandle 1242->1244 1243->1244 1245 dcd53e-dcd5ad call d6a961 * 2 call d69cb3 call d6525f call d6988f call d66350 call d7ce60 1243->1245 1260 dcd5af-dcd5b1 1245->1260 1261 dcd5b7-dcd5be 1245->1261 1262 dcd5c0-dcd5cd call d6988f * 2 1260->1262 1263 dcd5b3-dcd5b5 1260->1263 1261->1262 1262->1242 1263->1261 1263->1262
                                                            APIs
                                                            • CreateToolhelp32Snapshot.KERNEL32 ref: 00DCD501
                                                            • Process32FirstW.KERNEL32(00000000,?), ref: 00DCD50F
                                                            • Process32NextW.KERNEL32(00000000,?), ref: 00DCD52F
                                                            • CloseHandle.KERNELBASE(00000000), ref: 00DCD5DC
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                            • String ID:
                                                            • API String ID: 420147892-0
                                                            • Opcode ID: 5cace15253eeb111a1bbc46921b262949a3eed87e6b46860c73f16af519cf028
                                                            • Instruction ID: 717c6d516daa1c504601a989fe2e3244f8ed8a34ce9d10f5559686ae43996114
                                                            • Opcode Fuzzy Hash: 5cace15253eeb111a1bbc46921b262949a3eed87e6b46860c73f16af519cf028
                                                            • Instruction Fuzzy Hash: A9316A711083419FD301EF54C891AABBBE8EF9A354F14092DF585972A1EB719948CBB2

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1267 dcdbbe-dcdbda lstrlenW 1268 dcdbdc-dcdbe6 GetFileAttributesW 1267->1268 1269 dcdc06 1267->1269 1270 dcdbe8-dcdbf7 FindFirstFileW 1268->1270 1271 dcdc09-dcdc0d 1268->1271 1269->1271 1270->1269 1272 dcdbf9-dcdc04 FindClose 1270->1272 1272->1271
                                                            APIs
                                                            • lstrlenW.KERNEL32(?,00DA5222), ref: 00DCDBCE
                                                            • GetFileAttributesW.KERNELBASE(?), ref: 00DCDBDD
                                                            • FindFirstFileW.KERNEL32(?,?), ref: 00DCDBEE
                                                            • FindClose.KERNEL32(00000000), ref: 00DCDBFA
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: FileFind$AttributesCloseFirstlstrlen
                                                            • String ID:
                                                            • API String ID: 2695905019-0
                                                            • Opcode ID: ba18d982cd1e5699b8b26f429303fd2d18fbdad66b163765efbe793a18a69032
                                                            • Instruction ID: e75fe5fa81216fa47f9b78207ac086f237d3160af7607eeae5576325bf9cfa1b
                                                            • Opcode Fuzzy Hash: ba18d982cd1e5699b8b26f429303fd2d18fbdad66b163765efbe793a18a69032
                                                            • Instruction Fuzzy Hash: 1EF0A7304206155782206B789E0D97A377D9E05334B188716F475C21E0EBB06964C5B9
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(00D928E9,?,00D84CBE,00D928E9,00E288B8,0000000C,00D84E15,00D928E9,00000002,00000000,?,00D928E9), ref: 00D84D09
                                                            • TerminateProcess.KERNEL32(00000000,?,00D84CBE,00D928E9,00E288B8,0000000C,00D84E15,00D928E9,00000002,00000000,?,00D928E9), ref: 00D84D10
                                                            • ExitProcess.KERNEL32 ref: 00D84D22
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Process$CurrentExitTerminate
                                                            • String ID:
                                                            • API String ID: 1703294689-0
                                                            • Opcode ID: 774558948a894e9562e79af83b2f2601b99e0cb6c59ce1b6ff757308c058a905
                                                            • Instruction ID: 6b4c51fc9c79fefbbaca2b59bebb5201670582a169af923aeddfa728ff766e15
                                                            • Opcode Fuzzy Hash: 774558948a894e9562e79af83b2f2601b99e0cb6c59ce1b6ff757308c058a905
                                                            • Instruction Fuzzy Hash: 78E0B631010249ABCF12BF54DE09A687B69EB41795B148014FC05CA222CB35ED62DBB0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: BuffCharUpper
                                                            • String ID: p#
                                                            • API String ID: 3964851224-4182048217
                                                            • Opcode ID: aff056239e22f12bd09327cc75a7842c2fe9430e0935e2f739097199dcf329e9
                                                            • Instruction ID: 64a8ea1658b364150941387be16c3e1a860e7cb6be7aa3b321d3c0cc262b9e5c
                                                            • Opcode Fuzzy Hash: aff056239e22f12bd09327cc75a7842c2fe9430e0935e2f739097199dcf329e9
                                                            • Instruction Fuzzy Hash: 55A23570618341DFD720DF18C480B6ABBE1BF89304F18996DE9DA9B352D771E845CBA2

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 deaff9-deb056 call d82340 3 deb058-deb06b call d6b567 0->3 4 deb094-deb098 0->4 13 deb06d-deb092 call d6b567 * 2 3->13 14 deb0c8 3->14 6 deb0dd-deb0e0 4->6 7 deb09a-deb0bb call d6b567 * 2 4->7 9 deb0f5-deb119 call d67510 call d67620 6->9 10 deb0e2-deb0e5 6->10 29 deb0bf-deb0c4 7->29 31 deb11f-deb178 call d67510 call d67620 call d67510 call d67620 call d67510 call d67620 9->31 32 deb1d8-deb1e0 9->32 15 deb0e8-deb0ed call d6b567 10->15 13->29 19 deb0cb-deb0cf 14->19 15->9 24 deb0d9-deb0db 19->24 25 deb0d1-deb0d7 19->25 24->6 24->9 25->15 29->6 33 deb0c6 29->33 79 deb17a-deb195 call d67510 call d67620 31->79 80 deb1a6-deb1d6 GetSystemDirectoryW call d7fe0b GetSystemDirectoryW 31->80 36 deb20a-deb238 GetCurrentDirectoryW call d7fe0b GetCurrentDirectoryW 32->36 37 deb1e2-deb1fd call d67510 call d67620 32->37 33->19 45 deb23c 36->45 37->36 50 deb1ff-deb208 call d84963 37->50 49 deb240-deb244 45->49 52 deb246-deb270 call d69c6e * 3 49->52 53 deb275-deb285 call dd00d9 49->53 50->36 50->53 52->53 62 deb28b-deb2e1 call dd07c0 call dd06e6 call dd05a7 53->62 63 deb287-deb289 53->63 66 deb2ee-deb2f2 62->66 99 deb2e3 62->99 63->66 71 deb39a-deb3be CreateProcessW 66->71 72 deb2f8-deb321 call dc11c8 66->72 76 deb3c1-deb3d4 call d7fe14 * 2 71->76 88 deb32a call dc14ce 72->88 89 deb323-deb328 call dc1201 72->89 103 deb42f-deb43d CloseHandle 76->103 104 deb3d6-deb3e8 76->104 79->80 105 deb197-deb1a0 call d84963 79->105 80->45 98 deb32f-deb33c call d84963 88->98 89->98 115 deb33e-deb345 98->115 116 deb347-deb357 call d84963 98->116 99->66 107 deb43f-deb444 103->107 108 deb49c 103->108 109 deb3ed-deb3fc 104->109 110 deb3ea 104->110 105->49 105->80 117 deb446-deb44c CloseHandle 107->117 118 deb451-deb456 107->118 113 deb4a0-deb4a4 108->113 111 deb3fe 109->111 112 deb401-deb42a GetLastError call d6630c call d6cfa0 109->112 110->109 111->112 127 deb4e5-deb4f6 call dd0175 112->127 120 deb4a6-deb4b0 113->120 121 deb4b2-deb4bc 113->121 115->115 115->116 136 deb359-deb360 116->136 137 deb362-deb372 call d84963 116->137 117->118 124 deb458-deb45e CloseHandle 118->124 125 deb463-deb468 118->125 120->127 128 deb4be 121->128 129 deb4c4-deb4e3 call d6cfa0 CloseHandle 121->129 124->125 131 deb46a-deb470 CloseHandle 125->131 132 deb475-deb49a call dd09d9 call deb536 125->132 128->129 129->127 131->132 132->113 136->136 136->137 147 deb37d-deb398 call d7fe14 * 3 137->147 148 deb374-deb37b 137->148 147->76 148->147 148->148
                                                            APIs
                                                            • _wcslen.LIBCMT ref: 00DEB198
                                                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00DEB1B0
                                                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00DEB1D4
                                                            • _wcslen.LIBCMT ref: 00DEB200
                                                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00DEB214
                                                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00DEB236
                                                            • _wcslen.LIBCMT ref: 00DEB332
                                                              • Part of subcall function 00DD05A7: GetStdHandle.KERNEL32(000000F6), ref: 00DD05C6
                                                            • _wcslen.LIBCMT ref: 00DEB34B
                                                            • _wcslen.LIBCMT ref: 00DEB366
                                                            • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00DEB3B6
                                                            • GetLastError.KERNEL32(00000000), ref: 00DEB407
                                                            • CloseHandle.KERNEL32(?), ref: 00DEB439
                                                            • CloseHandle.KERNEL32(00000000), ref: 00DEB44A
                                                            • CloseHandle.KERNEL32(00000000), ref: 00DEB45C
                                                            • CloseHandle.KERNEL32(00000000), ref: 00DEB46E
                                                            • CloseHandle.KERNEL32(?), ref: 00DEB4E3
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                            • String ID:
                                                            • API String ID: 2178637699-0
                                                            • Opcode ID: 170d2e5ab78c8d7f5fe39f06471d62fb0e981db528086aa63d11e57fc1c1d403
                                                            • Instruction ID: f057385532456fe8780f131aab0e3f54e57d4063e1a9037354aead567a394e98
                                                            • Opcode Fuzzy Hash: 170d2e5ab78c8d7f5fe39f06471d62fb0e981db528086aa63d11e57fc1c1d403
                                                            • Instruction Fuzzy Hash: BBF14A315082409FC725EF25C891B6BBBE5EF85324F18855EF4999B2A2DB31EC44CB72
                                                            APIs
                                                            • GetInputState.USER32 ref: 00D6D807
                                                            • timeGetTime.WINMM ref: 00D6DA07
                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00D6DB28
                                                            • TranslateMessage.USER32(?), ref: 00D6DB7B
                                                            • DispatchMessageW.USER32(?), ref: 00D6DB89
                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00D6DB9F
                                                            • Sleep.KERNELBASE(0000000A), ref: 00D6DBB1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                            • String ID:
                                                            • API String ID: 2189390790-0
                                                            • Opcode ID: aca048da64980eb745047386e6afc06fafb204fdbeacf4379431446c8b3bf557
                                                            • Instruction ID: ad7175388ec8ceca161cdaee4ead3ff9300f07b84fc3886f8b8c1e566b95d549
                                                            • Opcode Fuzzy Hash: aca048da64980eb745047386e6afc06fafb204fdbeacf4379431446c8b3bf557
                                                            • Instruction Fuzzy Hash: B742AF31A08345DFD728CF25D894BBABBA2FF55304F18855EE49687291D770E848CBB2

                                                            Control-flow Graph

                                                            APIs
                                                            • GetSysColorBrush.USER32(0000000F), ref: 00D62D07
                                                            • RegisterClassExW.USER32(00000030), ref: 00D62D31
                                                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00D62D42
                                                            • InitCommonControlsEx.COMCTL32(?), ref: 00D62D5F
                                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00D62D6F
                                                            • LoadIconW.USER32(000000A9), ref: 00D62D85
                                                            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00D62D94
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                            • API String ID: 2914291525-1005189915
                                                            • Opcode ID: 21430ca9d66d742169469f730c917d63a56a7d45ab15a6fc00e5267b168f2873
                                                            • Instruction ID: ec8478f7f9be6202bdfc1827f7d7786b4adbba64dabb79e15524ef5fff99fd08
                                                            • Opcode Fuzzy Hash: 21430ca9d66d742169469f730c917d63a56a7d45ab15a6fc00e5267b168f2873
                                                            • Instruction Fuzzy Hash: 1821D0B191130CAFDB009FA5E949BADBFB4FB08700F10915AE611F62A0D7B11558CFA0

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 457 da065b-da068b call da042f 460 da068d-da0698 call d8f2c6 457->460 461 da06a6-da06b2 call d95221 457->461 466 da069a-da06a1 call d8f2d9 460->466 467 da06cb-da0714 call da039a 461->467 468 da06b4-da06c9 call d8f2c6 call d8f2d9 461->468 478 da097d-da0983 466->478 476 da0781-da078a GetFileType 467->476 477 da0716-da071f 467->477 468->466 479 da078c-da07bd GetLastError call d8f2a3 CloseHandle 476->479 480 da07d3-da07d6 476->480 482 da0721-da0725 477->482 483 da0756-da077c GetLastError call d8f2a3 477->483 479->466 494 da07c3-da07ce call d8f2d9 479->494 485 da07d8-da07dd 480->485 486 da07df-da07e5 480->486 482->483 487 da0727-da0754 call da039a 482->487 483->466 490 da07e9-da0837 call d9516a 485->490 486->490 491 da07e7 486->491 487->476 487->483 500 da0839-da0845 call da05ab 490->500 501 da0847-da086b call da014d 490->501 491->490 494->466 500->501 506 da086f-da0879 call d986ae 500->506 507 da087e-da08c1 501->507 508 da086d 501->508 506->478 510 da08e2-da08f0 507->510 511 da08c3-da08c7 507->511 508->506 514 da097b 510->514 515 da08f6-da08fa 510->515 511->510 513 da08c9-da08dd 511->513 513->510 514->478 515->514 516 da08fc-da092f CloseHandle call da039a 515->516 519 da0963-da0977 516->519 520 da0931-da095d GetLastError call d8f2a3 call d95333 516->520 519->514 520->519
                                                            APIs
                                                              • Part of subcall function 00DA039A: CreateFileW.KERNELBASE(00000000,00000000,?,00DA0704,?,?,00000000,?,00DA0704,00000000,0000000C), ref: 00DA03B7
                                                            • GetLastError.KERNEL32 ref: 00DA076F
                                                            • __dosmaperr.LIBCMT ref: 00DA0776
                                                            • GetFileType.KERNELBASE(00000000), ref: 00DA0782
                                                            • GetLastError.KERNEL32 ref: 00DA078C
                                                            • __dosmaperr.LIBCMT ref: 00DA0795
                                                            • CloseHandle.KERNEL32(00000000), ref: 00DA07B5
                                                            • CloseHandle.KERNEL32(?), ref: 00DA08FF
                                                            • GetLastError.KERNEL32 ref: 00DA0931
                                                            • __dosmaperr.LIBCMT ref: 00DA0938
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                            • String ID: H
                                                            • API String ID: 4237864984-2852464175
                                                            • Opcode ID: f2d01e5d58fd8e2a531cc29d28344378d680aef65a37b211561e5d6e85eec480
                                                            • Instruction ID: 45cdd6b88b0f9657d368c0c6f61a126e363caa975a2b5ec81f7a6c9be13fd622
                                                            • Opcode Fuzzy Hash: f2d01e5d58fd8e2a531cc29d28344378d680aef65a37b211561e5d6e85eec480
                                                            • Instruction Fuzzy Hash: BFA12432A102088FDF19AF68D855BAE3FA0EB46320F184159F815EB391DB31DC16CBB1

                                                            Control-flow Graph

                                                            APIs
                                                              • Part of subcall function 00D63A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00E31418,?,00D62E7F,?,?,?,00000000), ref: 00D63A78
                                                              • Part of subcall function 00D63357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00D63379
                                                            • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00D6356A
                                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00DA318D
                                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00DA31CE
                                                            • RegCloseKey.ADVAPI32(?), ref: 00DA3210
                                                            • _wcslen.LIBCMT ref: 00DA3277
                                                            • _wcslen.LIBCMT ref: 00DA3286
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                            • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                            • API String ID: 98802146-2727554177
                                                            • Opcode ID: 86597ca262b06d756640202daf6dd7e60f25b62b02ea607877fab1242fc77cb0
                                                            • Instruction ID: e9e96b544ce8dd9b87a4a56d46e77c70e17d0d640dd60ad643a420580955fcee
                                                            • Opcode Fuzzy Hash: 86597ca262b06d756640202daf6dd7e60f25b62b02ea607877fab1242fc77cb0
                                                            • Instruction Fuzzy Hash: 3C71737140430A9FC314EF66EC859ABBBE8FF95750F50442EF685A3160EB749A48CB71

                                                            Control-flow Graph

                                                            APIs
                                                            • GetSysColorBrush.USER32(0000000F), ref: 00D62B8E
                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 00D62B9D
                                                            • LoadIconW.USER32(00000063), ref: 00D62BB3
                                                            • LoadIconW.USER32(000000A4), ref: 00D62BC5
                                                            • LoadIconW.USER32(000000A2), ref: 00D62BD7
                                                            • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00D62BEF
                                                            • RegisterClassExW.USER32(?), ref: 00D62C40
                                                              • Part of subcall function 00D62CD4: GetSysColorBrush.USER32(0000000F), ref: 00D62D07
                                                              • Part of subcall function 00D62CD4: RegisterClassExW.USER32(00000030), ref: 00D62D31
                                                              • Part of subcall function 00D62CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00D62D42
                                                              • Part of subcall function 00D62CD4: InitCommonControlsEx.COMCTL32(?), ref: 00D62D5F
                                                              • Part of subcall function 00D62CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00D62D6F
                                                              • Part of subcall function 00D62CD4: LoadIconW.USER32(000000A9), ref: 00D62D85
                                                              • Part of subcall function 00D62CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00D62D94
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                            • String ID: #$0$AutoIt v3
                                                            • API String ID: 423443420-4155596026
                                                            • Opcode ID: 7970a93556785745842022d3d53839a852a27be91ea13573db3287c451630239
                                                            • Instruction ID: 42d074b72ecdf3610aee86ec357ef312ab32021c1f0a6510e7bd98365dc95e85
                                                            • Opcode Fuzzy Hash: 7970a93556785745842022d3d53839a852a27be91ea13573db3287c451630239
                                                            • Instruction Fuzzy Hash: 63212571A1031CAFDB109FA6ED49BA97FB4FB48B50F11409EE600B67A0D3B10558CFA0

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 598 d63170-d63185 599 d63187-d6318a 598->599 600 d631e5-d631e7 598->600 601 d6318c-d63193 599->601 602 d631eb 599->602 600->599 603 d631e9 600->603 604 d63265-d6326d PostQuitMessage 601->604 605 d63199-d6319e 601->605 607 da2dfb-da2e23 call d618e2 call d7e499 602->607 608 d631f1-d631f6 602->608 606 d631d0-d631d8 DefWindowProcW 603->606 615 d63219-d6321b 604->615 612 d631a4-d631a8 605->612 613 da2e7c-da2e90 call dcbf30 605->613 614 d631de-d631e4 606->614 643 da2e28-da2e2f 607->643 609 d6321d-d63244 SetTimer RegisterWindowMessageW 608->609 610 d631f8-d631fb 608->610 609->615 619 d63246-d63251 CreatePopupMenu 609->619 616 da2d9c-da2d9f 610->616 617 d63201-d6320f KillTimer call d630f2 610->617 620 da2e68-da2e72 call dcc161 612->620 621 d631ae-d631b3 612->621 613->615 637 da2e96 613->637 615->614 629 da2da1-da2da5 616->629 630 da2dd7-da2df6 MoveWindow 616->630 632 d63214 call d63c50 617->632 619->615 633 da2e77 620->633 626 da2e4d-da2e54 621->626 627 d631b9-d631be 621->627 626->606 631 da2e5a-da2e63 call dc0ad7 626->631 635 d631c4-d631ca 627->635 636 d63253-d63263 call d6326f 627->636 638 da2dc6-da2dd2 SetFocus 629->638 639 da2da7-da2daa 629->639 630->615 631->606 632->615 633->615 635->606 635->643 636->615 637->606 638->615 639->635 644 da2db0-da2dc1 call d618e2 639->644 643->606 648 da2e35-da2e48 call d630f2 call d63837 643->648 644->615 648->606
                                                            APIs
                                                            • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00D6316A,?,?), ref: 00D631D8
                                                            • KillTimer.USER32(?,00000001,?,?,?,?,?,00D6316A,?,?), ref: 00D63204
                                                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00D63227
                                                            • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00D6316A,?,?), ref: 00D63232
                                                            • CreatePopupMenu.USER32 ref: 00D63246
                                                            • PostQuitMessage.USER32(00000000), ref: 00D63267
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                            • String ID: TaskbarCreated
                                                            • API String ID: 129472671-2362178303
                                                            • Opcode ID: e5cf8b0414c773fca7034d30d15b02fb026140cab02c12c92604f83f7a730fe6
                                                            • Instruction ID: 111f8e0b1fe40c80ee33dcea5ed00450e7a7ead33ff4691f07a1cd722ebd139e
                                                            • Opcode Fuzzy Hash: e5cf8b0414c773fca7034d30d15b02fb026140cab02c12c92604f83f7a730fe6
                                                            • Instruction Fuzzy Hash: CD417731250308ABDB142B789D1EB793E19EB4A340F08416DFA42E62A1CB75CB58C7B5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 654 d61410-d61449 655 da24b8-da24b9 DestroyWindow 654->655 656 d6144f-d61465 mciSendStringW 654->656 661 da24c4-da24d1 655->661 657 d616c6-d616d3 656->657 658 d6146b-d61473 656->658 659 d616d5-d616f0 UnregisterHotKey 657->659 660 d616f8-d616ff 657->660 658->661 662 d61479-d61488 call d6182e 658->662 659->660 664 d616f2-d616f3 call d610d0 659->664 660->658 665 d61705 660->665 666 da24d3-da24d6 661->666 667 da2500-da2507 661->667 673 da250e-da251a 662->673 674 d6148e-d61496 662->674 664->660 665->657 671 da24d8-da24e0 call d66246 666->671 672 da24e2-da24e5 FindClose 666->672 667->661 670 da2509 667->670 670->673 675 da24eb-da24f8 671->675 672->675 681 da251c-da251e FreeLibrary 673->681 682 da2524-da252b 673->682 678 da2532-da253f 674->678 679 d6149c-d614c1 call d6cfa0 674->679 675->667 680 da24fa-da24fb call dd32b1 675->680 686 da2541-da255e VirtualFree 678->686 687 da2566-da256d 678->687 692 d614c3 679->692 693 d614f8-d61503 CoUninitialize 679->693 680->667 681->682 682->673 685 da252d 682->685 685->678 686->687 690 da2560-da2561 call dd3317 686->690 687->678 688 da256f 687->688 694 da2574-da2578 688->694 690->687 695 d614c6-d614f6 call d61a05 call d619ae 692->695 693->694 696 d61509-d6150e 693->696 694->696 697 da257e-da2584 694->697 695->693 699 d61514-d6151e 696->699 700 da2589-da2596 call dd32eb 696->700 697->696 703 d61707-d61714 call d7f80e 699->703 704 d61524-d615a5 call d6988f call d61944 call d617d5 call d7fe14 call d6177c call d6988f call d6cfa0 call d617fe call d7fe14 699->704 713 da2598 700->713 703->704 715 d6171a 703->715 717 da259d-da25bf call d7fdcd 704->717 743 d615ab-d615cf call d7fe14 704->743 713->717 715->703 722 da25c1 717->722 725 da25c6-da25e8 call d7fdcd 722->725 731 da25ea 725->731 734 da25ef-da2611 call d7fdcd 731->734 741 da2613 734->741 744 da2618-da2625 call dc64d4 741->744 743->725 749 d615d5-d615f9 call d7fe14 743->749 750 da2627 744->750 749->734 755 d615ff-d61619 call d7fe14 749->755 752 da262c-da2639 call d7ac64 750->752 758 da263b 752->758 755->744 760 d6161f-d61643 call d617d5 call d7fe14 755->760 761 da2640-da264d call dd3245 758->761 760->752 769 d61649-d61651 760->769 767 da264f 761->767 771 da2654-da2661 call dd32cc 767->771 769->761 770 d61657-d61675 call d6988f call d6190a 769->770 770->771 780 d6167b-d61689 770->780 777 da2663 771->777 779 da2668-da2675 call dd32cc 777->779 785 da2677 779->785 780->779 782 d6168f-d616c5 call d6988f * 3 call d61876 780->782 785->785
                                                            APIs
                                                            • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00D61459
                                                            • CoUninitialize.COMBASE ref: 00D614F8
                                                            • UnregisterHotKey.USER32(?), ref: 00D616DD
                                                            • DestroyWindow.USER32(?), ref: 00DA24B9
                                                            • FreeLibrary.KERNEL32(?), ref: 00DA251E
                                                            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00DA254B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                            • String ID: close all
                                                            • API String ID: 469580280-3243417748
                                                            • Opcode ID: db4a123c5574ae9e5050c7f11b70da6b285a672061ac0f00014c85eb1363e575
                                                            • Instruction ID: 1d108078d7cfa36bf36dcaa95e31cb9ef9f8475e29f56fba77be4bb499a87532
                                                            • Opcode Fuzzy Hash: db4a123c5574ae9e5050c7f11b70da6b285a672061ac0f00014c85eb1363e575
                                                            • Instruction Fuzzy Hash: 24D14A357022128FCB29EF59C995A29F7A4FF05700F1981ADE44AAB251DB30ED26CF71

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 803 d62c63-d62cd3 CreateWindowExW * 2 ShowWindow * 2
                                                            APIs
                                                            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00D62C91
                                                            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00D62CB2
                                                            • ShowWindow.USER32(00000000,?,?,?,?,?,?,00D61CAD,?), ref: 00D62CC6
                                                            • ShowWindow.USER32(00000000,?,?,?,?,?,?,00D61CAD,?), ref: 00D62CCF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Window$CreateShow
                                                            • String ID: AutoIt v3$edit
                                                            • API String ID: 1584632944-3779509399
                                                            • Opcode ID: 74dcdb3a975cc34e7835f57e0b01e220867a26d735a69d4361f2289afa55f49b
                                                            • Instruction ID: a581b9b3556e358aa65d49d70fe3a411c02428c3c75a5ac931f4b1cf715e4052
                                                            • Opcode Fuzzy Hash: 74dcdb3a975cc34e7835f57e0b01e220867a26d735a69d4361f2289afa55f49b
                                                            • Instruction Fuzzy Hash: E9F0B77555029C7EEB211717AC0CFBB6EBDD7C6F50B02509EFA00A76A0C6611858DEB0

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1228 d63b1c-d63b27 1229 d63b99-d63b9b 1228->1229 1230 d63b29-d63b2e 1228->1230 1231 d63b8c-d63b8f 1229->1231 1230->1229 1232 d63b30-d63b48 RegOpenKeyExW 1230->1232 1232->1229 1233 d63b4a-d63b69 RegQueryValueExW 1232->1233 1234 d63b80-d63b8b RegCloseKey 1233->1234 1235 d63b6b-d63b76 1233->1235 1234->1231 1236 d63b90-d63b97 1235->1236 1237 d63b78-d63b7a 1235->1237 1238 d63b7e 1236->1238 1237->1238 1238->1234
                                                            APIs
                                                            • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00D63B0F,SwapMouseButtons,00000004,?), ref: 00D63B40
                                                            • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00D63B0F,SwapMouseButtons,00000004,?), ref: 00D63B61
                                                            • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00D63B0F,SwapMouseButtons,00000004,?), ref: 00D63B83
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CloseOpenQueryValue
                                                            • String ID: Control Panel\Mouse
                                                            • API String ID: 3677997916-824357125
                                                            • Opcode ID: 58a6c0ac2303576f4a4a7eba706519014d8cc280b81e7562219f75cd669cb0f6
                                                            • Instruction ID: e3b7f2071222a3ca6b165258c939239402f6568e1b7c6eaa3340806b8ed24e75
                                                            • Opcode Fuzzy Hash: 58a6c0ac2303576f4a4a7eba706519014d8cc280b81e7562219f75cd669cb0f6
                                                            • Instruction Fuzzy Hash: 0E115AB1520208FFDB208FA8DC44EEEB7B8EF01740B108459A805D7210D6319E409770
                                                            APIs
                                                            • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00DA33A2
                                                              • Part of subcall function 00D66B57: _wcslen.LIBCMT ref: 00D66B6A
                                                            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00D63A04
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: IconLoadNotifyShell_String_wcslen
                                                            • String ID: Line:
                                                            • API String ID: 2289894680-1585850449
                                                            • Opcode ID: a72dc3c27d0bf7441338c79d9c1b27b04dedc5fe562b9582788470695e86d154
                                                            • Instruction ID: 0321ab1c9deb944367c71e3700cb5a54856a30be962c19601fa1520b790b430d
                                                            • Opcode Fuzzy Hash: a72dc3c27d0bf7441338c79d9c1b27b04dedc5fe562b9582788470695e86d154
                                                            • Instruction Fuzzy Hash: 5231AD71408304ABC721EB24DC49BEBB7E8EF44710F04496EF59992191EB709A48CBF2
                                                            APIs
                                                            • GetOpenFileNameW.COMDLG32(?), ref: 00DA2C8C
                                                              • Part of subcall function 00D63AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00D63A97,?,?,00D62E7F,?,?,?,00000000), ref: 00D63AC2
                                                              • Part of subcall function 00D62DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00D62DC4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Name$Path$FileFullLongOpen
                                                            • String ID: X$`e
                                                            • API String ID: 779396738-4036142377
                                                            • Opcode ID: 310af6f78716aff81720efe723292132ae0d6627b21764f9cabbf0b10b3b67c4
                                                            • Instruction ID: 1a2f6e4e2dbda39db950a21aed685770286c643b65d9ff56e177931097d0cbd4
                                                            • Opcode Fuzzy Hash: 310af6f78716aff81720efe723292132ae0d6627b21764f9cabbf0b10b3b67c4
                                                            • Instruction Fuzzy Hash: 8021A271A002989FCB01EF98D846BEE7BF8EF49314F008059E445F7241DBB49A898FB1
                                                            APIs
                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00D80668
                                                              • Part of subcall function 00D832A4: RaiseException.KERNEL32(?,?,?,00D8068A,?,00E31444,?,?,?,?,?,?,00D8068A,00D61129,00E28738,00D61129), ref: 00D83304
                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00D80685
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Exception@8Throw$ExceptionRaise
                                                            • String ID: Unknown exception
                                                            • API String ID: 3476068407-410509341
                                                            • Opcode ID: e8ad586fb30448eeb2a22ccd4df3612be0c7f7471a054db8be5dce68066a4434
                                                            • Instruction ID: 28f201cf06682e4c549914d9c993a6a57667779f23e72c669fe5173606396c7d
                                                            • Opcode Fuzzy Hash: e8ad586fb30448eeb2a22ccd4df3612be0c7f7471a054db8be5dce68066a4434
                                                            • Instruction Fuzzy Hash: 63F0C23490030DB78B20B764E846DAE7B6C9E00710B648575B928D6591FF71DA29CBB0
                                                            APIs
                                                              • Part of subcall function 00D61BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00D61BF4
                                                              • Part of subcall function 00D61BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00D61BFC
                                                              • Part of subcall function 00D61BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00D61C07
                                                              • Part of subcall function 00D61BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00D61C12
                                                              • Part of subcall function 00D61BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00D61C1A
                                                              • Part of subcall function 00D61BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00D61C22
                                                              • Part of subcall function 00D61B4A: RegisterWindowMessageW.USER32(00000004,?,00D612C4), ref: 00D61BA2
                                                            • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00D6136A
                                                            • OleInitialize.OLE32 ref: 00D61388
                                                            • CloseHandle.KERNEL32(00000000,00000000), ref: 00DA24AB
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                            • String ID:
                                                            • API String ID: 1986988660-0
                                                            • Opcode ID: 8a412206b3e06964ab8929f2e0bedcde0b6340da6f6f845ec1de0ad9051ea528
                                                            • Instruction ID: 80226356bc42cb64b20db62f8840914ea7ed79c952cb3471ac3eccb72f640f2d
                                                            • Opcode Fuzzy Hash: 8a412206b3e06964ab8929f2e0bedcde0b6340da6f6f845ec1de0ad9051ea528
                                                            • Instruction Fuzzy Hash: F671CCB4911308AFC388DF7BA94E6653EE0FB8934175992AED05AF7361EB304409CF65
                                                            APIs
                                                              • Part of subcall function 00D63923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00D63A04
                                                            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00DCC259
                                                            • KillTimer.USER32(?,00000001,?,?), ref: 00DCC261
                                                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00DCC270
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: IconNotifyShell_Timer$Kill
                                                            • String ID:
                                                            • API String ID: 3500052701-0
                                                            • Opcode ID: 4c748975f86fda8a9b71abe87f1406d0bdcd410070016235f336370d9e7553f4
                                                            • Instruction ID: 90d7569f9285695df4ec0a0888f5440b8a27707f62f21ed2cbbf70f6b5e3b11d
                                                            • Opcode Fuzzy Hash: 4c748975f86fda8a9b71abe87f1406d0bdcd410070016235f336370d9e7553f4
                                                            • Instruction Fuzzy Hash: 0131B170914344AFEB329B648895BE6FBEC9B06308F04549ED6DEA7241C3745A88CB65
                                                            APIs
                                                            • CloseHandle.KERNELBASE(00000000,00000000,?,?,00D985CC,?,00E28CC8,0000000C), ref: 00D98704
                                                            • GetLastError.KERNEL32(?,00D985CC,?,00E28CC8,0000000C), ref: 00D9870E
                                                            • __dosmaperr.LIBCMT ref: 00D98739
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CloseErrorHandleLast__dosmaperr
                                                            • String ID:
                                                            • API String ID: 2583163307-0
                                                            • Opcode ID: 5e4b73f08b55f5f0390d4f641910cb4ac190ab9765cc9be3f11387cbebef3972
                                                            • Instruction ID: 2072595a2fcc6fac63fb6c033b35d0c2fad866c3d6cad9bd9d7d554c34bfe917
                                                            • Opcode Fuzzy Hash: 5e4b73f08b55f5f0390d4f641910cb4ac190ab9765cc9be3f11387cbebef3972
                                                            • Instruction Fuzzy Hash: D90108336056202ADF257374A845B7E6B598B83F74F2D0129E914DF1D2DEA0CC81E2B0
                                                            APIs
                                                            • TranslateMessage.USER32(?), ref: 00D6DB7B
                                                            • DispatchMessageW.USER32(?), ref: 00D6DB89
                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00D6DB9F
                                                            • Sleep.KERNELBASE(0000000A), ref: 00D6DBB1
                                                            • TranslateAcceleratorW.USER32(?,?,?), ref: 00DB1CC9
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                            • String ID:
                                                            • API String ID: 3288985973-0
                                                            • Opcode ID: 21cbf0f01b23769727fd0f028fc26fba2812b98e0c4c04908fb90ff490f4e4a6
                                                            • Instruction ID: be66eec5abc5ba92dd7ab7ca0041de1e7cef394595d26c685275e25c64389d52
                                                            • Opcode Fuzzy Hash: 21cbf0f01b23769727fd0f028fc26fba2812b98e0c4c04908fb90ff490f4e4a6
                                                            • Instruction Fuzzy Hash: 66F05E30614344DBE734DBA19C59FEA77B9EB84310F549919E65AD31D0EB30A488CB35
                                                            APIs
                                                            • __Init_thread_footer.LIBCMT ref: 00D717F6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Init_thread_footer
                                                            • String ID: CALL
                                                            • API String ID: 1385522511-4196123274
                                                            • Opcode ID: 2f8225b665fcb83ab45fcbbd834a14e1634963ed7dceb3fd952d572fa7a629d6
                                                            • Instruction ID: d7e3b75abe14aa986efe09cf9259a5b06331354865c718b1025deafb2666d34a
                                                            • Opcode Fuzzy Hash: 2f8225b665fcb83ab45fcbbd834a14e1634963ed7dceb3fd952d572fa7a629d6
                                                            • Instruction Fuzzy Hash: 3A227974608241DFC724DF18C480A6ABBF1FF85314F188A1DF49A8B361E735E945CBA2
                                                            APIs
                                                            • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00D63908
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: IconNotifyShell_
                                                            • String ID:
                                                            • API String ID: 1144537725-0
                                                            • Opcode ID: ef9804ae3770cb5d6a97dde2241d21d987941ff64bb247ac683518195cd2ca91
                                                            • Instruction ID: f09fcab46b66c5c18a2ac7609a521493e1f78d8dde81aa24ae273989cd6c98d8
                                                            • Opcode Fuzzy Hash: ef9804ae3770cb5d6a97dde2241d21d987941ff64bb247ac683518195cd2ca91
                                                            • Instruction Fuzzy Hash: EB3191706047059FD720DF25D8847EBBBE8FB49708F04096EF59A93240E771AA48CB72
                                                            APIs
                                                            • timeGetTime.WINMM ref: 00D7F661
                                                              • Part of subcall function 00D6D730: GetInputState.USER32 ref: 00D6D807
                                                            • Sleep.KERNEL32(00000000), ref: 00DBF2DE
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: InputSleepStateTimetime
                                                            • String ID:
                                                            • API String ID: 4149333218-0
                                                            • Opcode ID: 350bedd9ab6b42b1a1a4c30ccb0ee85b31635b65c837328fa3375a4c47fc346a
                                                            • Instruction ID: 7960d69ab5fa7a1e3ea98959a6635fd3947688066fc62cf796b0804dbb003921
                                                            • Opcode Fuzzy Hash: 350bedd9ab6b42b1a1a4c30ccb0ee85b31635b65c837328fa3375a4c47fc346a
                                                            • Instruction Fuzzy Hash: 6BF082312803059FD310EF65D545BAAB7E4EF45760F00402AE85AC7360EB70A850CBB1
                                                            APIs
                                                              • Part of subcall function 00D64E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00D64EDD,?,00E31418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D64E9C
                                                              • Part of subcall function 00D64E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00D64EAE
                                                              • Part of subcall function 00D64E90: FreeLibrary.KERNEL32(00000000,?,?,00D64EDD,?,00E31418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D64EC0
                                                            • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00E31418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D64EFD
                                                              • Part of subcall function 00D64E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00DA3CDE,?,00E31418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D64E62
                                                              • Part of subcall function 00D64E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00D64E74
                                                              • Part of subcall function 00D64E59: FreeLibrary.KERNEL32(00000000,?,?,00DA3CDE,?,00E31418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D64E87
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Library$Load$AddressFreeProc
                                                            • String ID:
                                                            • API String ID: 2632591731-0
                                                            • Opcode ID: 34d6a04a7a45387e62debc7a0e5efadb1b3dc96376e8521c9ffc0880cead0f2d
                                                            • Instruction ID: 8d743c2682ece0b37c816e2373f7f2c095de1ea7de5aa08b8ac5b81086821bd7
                                                            • Opcode Fuzzy Hash: 34d6a04a7a45387e62debc7a0e5efadb1b3dc96376e8521c9ffc0880cead0f2d
                                                            • Instruction Fuzzy Hash: 4A11E332610305ABCB15FB64DC12FAD77A5EF50710F20842EF542A61C2EE71DA459BB0
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: __wsopen_s
                                                            • String ID:
                                                            • API String ID: 3347428461-0
                                                            • Opcode ID: 4705f1bbe589037f3bc721adb6e4b69704cd2f937665229f55e20db613aeeda2
                                                            • Instruction ID: be47c8f4448de06938a1896aa1889ba7cc048e97917f376abaddc04e346e1ef7
                                                            • Opcode Fuzzy Hash: 4705f1bbe589037f3bc721adb6e4b69704cd2f937665229f55e20db613aeeda2
                                                            • Instruction Fuzzy Hash: 3511487190420AAFCF05DF58E94099ABBF5EF49300F144069F808AB312DA31DA11DBA4
                                                            APIs
                                                              • Part of subcall function 00D94C7D: RtlAllocateHeap.NTDLL(00000008,00D61129,00000000,?,00D92E29,00000001,00000364,?,?,?,00D8F2DE,00D93863,00E31444,?,00D7FDF5,?), ref: 00D94CBE
                                                            • _free.LIBCMT ref: 00D9506C
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: AllocateHeap_free
                                                            • String ID:
                                                            • API String ID: 614378929-0
                                                            • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                            • Instruction ID: a23fafc7bd0ada18466fe7344915b08e56ad97e28e66d6801bfce1182830f7a1
                                                            • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                            • Instruction Fuzzy Hash: 3A014E722047056BE732CF55D84195AFBECFB85370F25062DE188832C0E730A805C7B4
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                            • Instruction ID: 38e6ad6e3c68e789033b67b651109aa675d1d9aa368a8a4f2e6270282e7c34a2
                                                            • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                            • Instruction Fuzzy Hash: EEF02832511A14A6DB313B698C06B5A339CDF52330F180B15F424D31E2EB70D8028FB5
                                                            APIs
                                                            • RtlAllocateHeap.NTDLL(00000008,00D61129,00000000,?,00D92E29,00000001,00000364,?,?,?,00D8F2DE,00D93863,00E31444,?,00D7FDF5,?), ref: 00D94CBE
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: AllocateHeap
                                                            • String ID:
                                                            • API String ID: 1279760036-0
                                                            • Opcode ID: e58f5b07a1ad9a64410d2f7bc0c5418fc6430c5e45689376d752116224ca0023
                                                            • Instruction ID: e54349469a7028268d728332297cf2737d17165b76363f42daad4ca7b65e9bd0
                                                            • Opcode Fuzzy Hash: e58f5b07a1ad9a64410d2f7bc0c5418fc6430c5e45689376d752116224ca0023
                                                            • Instruction Fuzzy Hash: B9F0E9316032246FDF217F629D09F5A3788FF917A1B194215B815E6282CF30D81286F0
                                                            APIs
                                                            • RtlAllocateHeap.NTDLL(00000000,?,00E31444,?,00D7FDF5,?,?,00D6A976,00000010,00E31440,00D613FC,?,00D613C6,?,00D61129), ref: 00D93852
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: AllocateHeap
                                                            • String ID:
                                                            • API String ID: 1279760036-0
                                                            • Opcode ID: 9e10b4fe7bc8626a0c3bd493fd2ce75d2ceff6c8df8bfecca89207e2746dd564
                                                            • Instruction ID: bbf840be25886c44b8b85b0959d5dbca23c5af19da24a85e6dd59a8ca0e7c146
                                                            • Opcode Fuzzy Hash: 9e10b4fe7bc8626a0c3bd493fd2ce75d2ceff6c8df8bfecca89207e2746dd564
                                                            • Instruction Fuzzy Hash: 99E0E53110132956DF2136A79C04B9A3649EF427B0F090065BC45D2980CB10DD0192F0
                                                            APIs
                                                            • FreeLibrary.KERNEL32(?,?,00E31418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D64F6D
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: FreeLibrary
                                                            • String ID:
                                                            • API String ID: 3664257935-0
                                                            • Opcode ID: adcc5db5662b87ba48265bb2a35aecde5131f27abd5c508768b9e74f7e465316
                                                            • Instruction ID: 5ed665e388375fbcec686859d02b5e794802c76400a5cb89ed9a96bb9780590d
                                                            • Opcode Fuzzy Hash: adcc5db5662b87ba48265bb2a35aecde5131f27abd5c508768b9e74f7e465316
                                                            • Instruction Fuzzy Hash: C3F0C071509751CFDB389F64D494826B7E5EF14329314897EE1DA82611C7319854DF60
                                                            APIs
                                                            • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00D6314E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: IconNotifyShell_
                                                            • String ID:
                                                            • API String ID: 1144537725-0
                                                            • Opcode ID: f1e0dfc21a4cb8977dc11cc96594336037fb83853400a61e30db0ee6f1957f69
                                                            • Instruction ID: 5b418f429eebc6deffde66d9677b3778cbcfab26fbfe059ca36b9afdf05b1329
                                                            • Opcode Fuzzy Hash: f1e0dfc21a4cb8977dc11cc96594336037fb83853400a61e30db0ee6f1957f69
                                                            • Instruction Fuzzy Hash: 34F037709143189FE7529B24DC497E97BFCA701708F0400E9A588A7291D774578CCF51
                                                            APIs
                                                            • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00D62DC4
                                                              • Part of subcall function 00D66B57: _wcslen.LIBCMT ref: 00D66B6A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: LongNamePath_wcslen
                                                            • String ID:
                                                            • API String ID: 541455249-0
                                                            • Opcode ID: 9e0211efe769dd7c20f90f46bed0b8c63b255dfa1fb317ee3cf7aa6ab2aded75
                                                            • Instruction ID: 6db1eee093bbb33b539b8faee9af0646f861358b64263aa33c96aa5d09fc780a
                                                            • Opcode Fuzzy Hash: 9e0211efe769dd7c20f90f46bed0b8c63b255dfa1fb317ee3cf7aa6ab2aded75
                                                            • Instruction Fuzzy Hash: D0E0CD766042245BC710965C9C05FEA77DDDFC8790F044071FD09D7248D960ED80C570
                                                            APIs
                                                              • Part of subcall function 00D63837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00D63908
                                                              • Part of subcall function 00D6D730: GetInputState.USER32 ref: 00D6D807
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00D62B6B
                                                              • Part of subcall function 00D630F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 00D6314E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                            • String ID:
                                                            • API String ID: 3667716007-0
                                                            • Opcode ID: bfd63ef3e0ca14fbd51039eaa9fd01aaa1b0de11d6d89fb695c6a65c22f714a1
                                                            • Instruction ID: 756d38941f80888e129cca2d0dbec997b29ae6eab874e6d7b835067b78ad1985
                                                            • Opcode Fuzzy Hash: bfd63ef3e0ca14fbd51039eaa9fd01aaa1b0de11d6d89fb695c6a65c22f714a1
                                                            • Instruction Fuzzy Hash: A2E0863170428807C608BB75A8565BDF759DBE1351F40157EF552932A2CE2449598272
                                                            APIs
                                                            • CreateFileW.KERNELBASE(00000000,00000000,?,00DA0704,?,?,00000000,?,00DA0704,00000000,0000000C), ref: 00DA03B7
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CreateFile
                                                            • String ID:
                                                            • API String ID: 823142352-0
                                                            • Opcode ID: 2dc810bf4f1873209705941e0370edb19e03709ffe2de1110366af641f521532
                                                            • Instruction ID: 02dc0884c0936e9cfeaaa91014256e88017dc7a2ad29934de08fdbdc36d337c5
                                                            • Opcode Fuzzy Hash: 2dc810bf4f1873209705941e0370edb19e03709ffe2de1110366af641f521532
                                                            • Instruction Fuzzy Hash: 34D06C3205020DBBDF028F84DD06EDA3BAAFB48714F018000BE1896120C732E831EB90
                                                            APIs
                                                            • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00D61CBC
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: InfoParametersSystem
                                                            • String ID:
                                                            • API String ID: 3098949447-0
                                                            • Opcode ID: ad5a9c7f1c7c39742aff745ccd800e175da59bfd1debd59e793d7244e5ef97a3
                                                            • Instruction ID: 47f5d011260f8b0e6147f02e9df6798c4ebf2e6c6354dd78d5e67281db6be202
                                                            • Opcode Fuzzy Hash: ad5a9c7f1c7c39742aff745ccd800e175da59bfd1debd59e793d7244e5ef97a3
                                                            • Instruction Fuzzy Hash: F2C09B3528030CAFF2144781BD4EF107B64A348B01F048005F749B56E3C3A11428D651
                                                            APIs
                                                              • Part of subcall function 00D79BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00D79BB2
                                                            • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00DF961A
                                                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00DF965B
                                                            • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00DF969F
                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00DF96C9
                                                            • SendMessageW.USER32 ref: 00DF96F2
                                                            • GetKeyState.USER32(00000011), ref: 00DF978B
                                                            • GetKeyState.USER32(00000009), ref: 00DF9798
                                                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00DF97AE
                                                            • GetKeyState.USER32(00000010), ref: 00DF97B8
                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00DF97E9
                                                            • SendMessageW.USER32 ref: 00DF9810
                                                            • SendMessageW.USER32(?,00001030,?,00DF7E95), ref: 00DF9918
                                                            • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00DF992E
                                                            • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00DF9941
                                                            • SetCapture.USER32(?), ref: 00DF994A
                                                            • ClientToScreen.USER32(?,?), ref: 00DF99AF
                                                            • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00DF99BC
                                                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00DF99D6
                                                            • ReleaseCapture.USER32 ref: 00DF99E1
                                                            • GetCursorPos.USER32(?), ref: 00DF9A19
                                                            • ScreenToClient.USER32(?,?), ref: 00DF9A26
                                                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 00DF9A80
                                                            • SendMessageW.USER32 ref: 00DF9AAE
                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00DF9AEB
                                                            • SendMessageW.USER32 ref: 00DF9B1A
                                                            • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00DF9B3B
                                                            • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00DF9B4A
                                                            • GetCursorPos.USER32(?), ref: 00DF9B68
                                                            • ScreenToClient.USER32(?,?), ref: 00DF9B75
                                                            • GetParent.USER32(?), ref: 00DF9B93
                                                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 00DF9BFA
                                                            • SendMessageW.USER32 ref: 00DF9C2B
                                                            • ClientToScreen.USER32(?,?), ref: 00DF9C84
                                                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00DF9CB4
                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00DF9CDE
                                                            • SendMessageW.USER32 ref: 00DF9D01
                                                            • ClientToScreen.USER32(?,?), ref: 00DF9D4E
                                                            • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00DF9D82
                                                              • Part of subcall function 00D79944: GetWindowLongW.USER32(?,000000EB), ref: 00D79952
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00DF9E05
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                            • String ID: @GUI_DRAGID$F$p#
                                                            • API String ID: 3429851547-638943876
                                                            • Opcode ID: 98c25505c5f09453e4ee1eeb5f5d59b65ef06b1371a3ed3d2744e725b940a641
                                                            • Instruction ID: 9f2b6a2bcd54aafeecfdd1a6ddb57d2ee8c58e14c1c760d02a86a0bfd0703206
                                                            • Opcode Fuzzy Hash: 98c25505c5f09453e4ee1eeb5f5d59b65ef06b1371a3ed3d2744e725b940a641
                                                            • Instruction Fuzzy Hash: 17427C30A04309AFD724CF28CC54BBABBE5EF88714F168619F699D72A1D731D864CB61
                                                            APIs
                                                            • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00DF48F3
                                                            • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00DF4908
                                                            • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00DF4927
                                                            • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00DF494B
                                                            • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00DF495C
                                                            • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00DF497B
                                                            • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00DF49AE
                                                            • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00DF49D4
                                                            • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00DF4A0F
                                                            • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00DF4A56
                                                            • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00DF4A7E
                                                            • IsMenu.USER32(?), ref: 00DF4A97
                                                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00DF4AF2
                                                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00DF4B20
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00DF4B94
                                                            • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00DF4BE3
                                                            • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00DF4C82
                                                            • wsprintfW.USER32 ref: 00DF4CAE
                                                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00DF4CC9
                                                            • GetWindowTextW.USER32(?,00000000,00000001), ref: 00DF4CF1
                                                            • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00DF4D13
                                                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00DF4D33
                                                            • GetWindowTextW.USER32(?,00000000,00000001), ref: 00DF4D5A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                            • String ID: %d/%02d/%02d
                                                            • API String ID: 4054740463-328681919
                                                            • Opcode ID: 981b8db9ceedc336c2c13bdceafe6c4d162f921da397372caf0b1174cc759968
                                                            • Instruction ID: 35936ae1fd54f5c5341adac8a19c6a3aec5f103a02dc60d0ac15e0cc0cc44b18
                                                            • Opcode Fuzzy Hash: 981b8db9ceedc336c2c13bdceafe6c4d162f921da397372caf0b1174cc759968
                                                            • Instruction Fuzzy Hash: 3012DF71600258ABEB248F28DC49FBF7BB8EF45314F158119FA59EA2A1DB74D940CB70
                                                            APIs
                                                            • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 00D7F998
                                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00DBF474
                                                            • IsIconic.USER32(00000000), ref: 00DBF47D
                                                            • ShowWindow.USER32(00000000,00000009), ref: 00DBF48A
                                                            • SetForegroundWindow.USER32(00000000), ref: 00DBF494
                                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00DBF4AA
                                                            • GetCurrentThreadId.KERNEL32 ref: 00DBF4B1
                                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00DBF4BD
                                                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 00DBF4CE
                                                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 00DBF4D6
                                                            • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 00DBF4DE
                                                            • SetForegroundWindow.USER32(00000000), ref: 00DBF4E1
                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DBF4F6
                                                            • keybd_event.USER32(00000012,00000000), ref: 00DBF501
                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DBF50B
                                                            • keybd_event.USER32(00000012,00000000), ref: 00DBF510
                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DBF519
                                                            • keybd_event.USER32(00000012,00000000), ref: 00DBF51E
                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DBF528
                                                            • keybd_event.USER32(00000012,00000000), ref: 00DBF52D
                                                            • SetForegroundWindow.USER32(00000000), ref: 00DBF530
                                                            • AttachThreadInput.USER32(?,000000FF,00000000), ref: 00DBF557
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                            • String ID: Shell_TrayWnd
                                                            • API String ID: 4125248594-2988720461
                                                            • Opcode ID: dca3f28c2c99d625418dfcef65d986976b810836eb0c6f27fc4b839f7b0a1363
                                                            • Instruction ID: 41582ca62285005653186c300daf493593ff2c33f6a89330ce817003bfd8636a
                                                            • Opcode Fuzzy Hash: dca3f28c2c99d625418dfcef65d986976b810836eb0c6f27fc4b839f7b0a1363
                                                            • Instruction Fuzzy Hash: 58315071A5031CBBEB206BB59D4AFBF7EACEB44B50F145065FA01E62D1C6B09D10EA70
                                                            APIs
                                                              • Part of subcall function 00DC16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00DC170D
                                                              • Part of subcall function 00DC16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00DC173A
                                                              • Part of subcall function 00DC16C3: GetLastError.KERNEL32 ref: 00DC174A
                                                            • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00DC1286
                                                            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00DC12A8
                                                            • CloseHandle.KERNEL32(?), ref: 00DC12B9
                                                            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00DC12D1
                                                            • GetProcessWindowStation.USER32 ref: 00DC12EA
                                                            • SetProcessWindowStation.USER32(00000000), ref: 00DC12F4
                                                            • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00DC1310
                                                              • Part of subcall function 00DC10BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00DC11FC), ref: 00DC10D4
                                                              • Part of subcall function 00DC10BF: CloseHandle.KERNEL32(?,?,00DC11FC), ref: 00DC10E9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                            • String ID: $default$winsta0$Z
                                                            • API String ID: 22674027-1808616255
                                                            • Opcode ID: 540970aadd4b7f5913d038573ae197d39e3bfc8d48677ed5900f042260ad3846
                                                            • Instruction ID: f74a1254ecef32eaf0cefdf56d5dea8779461d1e14e8926bcbfac96f96250d1b
                                                            • Opcode Fuzzy Hash: 540970aadd4b7f5913d038573ae197d39e3bfc8d48677ed5900f042260ad3846
                                                            • Instruction Fuzzy Hash: 8281867590431AABDF259FA4DD49FEE7BB9EF05700F188169F910E62A2D7308A54CB30
                                                            APIs
                                                              • Part of subcall function 00DC10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00DC1114
                                                              • Part of subcall function 00DC10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00DC0B9B,?,?,?), ref: 00DC1120
                                                              • Part of subcall function 00DC10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00DC0B9B,?,?,?), ref: 00DC112F
                                                              • Part of subcall function 00DC10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00DC0B9B,?,?,?), ref: 00DC1136
                                                              • Part of subcall function 00DC10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00DC114D
                                                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00DC0BCC
                                                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00DC0C00
                                                            • GetLengthSid.ADVAPI32(?), ref: 00DC0C17
                                                            • GetAce.ADVAPI32(?,00000000,?), ref: 00DC0C51
                                                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00DC0C6D
                                                            • GetLengthSid.ADVAPI32(?), ref: 00DC0C84
                                                            • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00DC0C8C
                                                            • HeapAlloc.KERNEL32(00000000), ref: 00DC0C93
                                                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00DC0CB4
                                                            • CopySid.ADVAPI32(00000000), ref: 00DC0CBB
                                                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00DC0CEA
                                                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00DC0D0C
                                                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00DC0D1E
                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00DC0D45
                                                            • HeapFree.KERNEL32(00000000), ref: 00DC0D4C
                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00DC0D55
                                                            • HeapFree.KERNEL32(00000000), ref: 00DC0D5C
                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00DC0D65
                                                            • HeapFree.KERNEL32(00000000), ref: 00DC0D6C
                                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 00DC0D78
                                                            • HeapFree.KERNEL32(00000000), ref: 00DC0D7F
                                                              • Part of subcall function 00DC1193: GetProcessHeap.KERNEL32(00000008,00DC0BB1,?,00000000,?,00DC0BB1,?), ref: 00DC11A1
                                                              • Part of subcall function 00DC1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00DC0BB1,?), ref: 00DC11A8
                                                              • Part of subcall function 00DC1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00DC0BB1,?), ref: 00DC11B7
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                            • String ID:
                                                            • API String ID: 4175595110-0
                                                            • Opcode ID: de431ea1996db8f8421d6baaab1b9d2c078b380e3fa643f99515a31b13ee51c2
                                                            • Instruction ID: 1b7e57e719bdd509786c8a67fcf4c800dcb3a9611348ebbda8577e4f2b0d986b
                                                            • Opcode Fuzzy Hash: de431ea1996db8f8421d6baaab1b9d2c078b380e3fa643f99515a31b13ee51c2
                                                            • Instruction Fuzzy Hash: 99714A76A0020AEBDF109FA4DD44FEEBBBCAF04700F088619E915E7291D771AA15CB70
                                                            APIs
                                                            • OpenClipboard.USER32(00DFCC08), ref: 00DDEB29
                                                            • IsClipboardFormatAvailable.USER32(0000000D), ref: 00DDEB37
                                                            • GetClipboardData.USER32(0000000D), ref: 00DDEB43
                                                            • CloseClipboard.USER32 ref: 00DDEB4F
                                                            • GlobalLock.KERNEL32(00000000), ref: 00DDEB87
                                                            • CloseClipboard.USER32 ref: 00DDEB91
                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00DDEBBC
                                                            • IsClipboardFormatAvailable.USER32(00000001), ref: 00DDEBC9
                                                            • GetClipboardData.USER32(00000001), ref: 00DDEBD1
                                                            • GlobalLock.KERNEL32(00000000), ref: 00DDEBE2
                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00DDEC22
                                                            • IsClipboardFormatAvailable.USER32(0000000F), ref: 00DDEC38
                                                            • GetClipboardData.USER32(0000000F), ref: 00DDEC44
                                                            • GlobalLock.KERNEL32(00000000), ref: 00DDEC55
                                                            • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00DDEC77
                                                            • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00DDEC94
                                                            • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00DDECD2
                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00DDECF3
                                                            • CountClipboardFormats.USER32 ref: 00DDED14
                                                            • CloseClipboard.USER32 ref: 00DDED59
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                            • String ID:
                                                            • API String ID: 420908878-0
                                                            • Opcode ID: dc2bed61d1e689090dd9290fc5a3f8e3d91c56f41ed992199e7b1c1b69d32bf6
                                                            • Instruction ID: c22691c8d75d51c79d5fc5f6ede00fde1c85d33a68f4ec73c7d168497ded6c3b
                                                            • Opcode Fuzzy Hash: dc2bed61d1e689090dd9290fc5a3f8e3d91c56f41ed992199e7b1c1b69d32bf6
                                                            • Instruction Fuzzy Hash: B3618A342043059FD300EF24D994F7AB7A8EB84704F18951AF496DB3A2DB71E909CBB2
                                                            APIs
                                                            • FindFirstFileW.KERNEL32(?,?), ref: 00DD69BE
                                                            • FindClose.KERNEL32(00000000), ref: 00DD6A12
                                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00DD6A4E
                                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00DD6A75
                                                              • Part of subcall function 00D69CB3: _wcslen.LIBCMT ref: 00D69CBD
                                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 00DD6AB2
                                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 00DD6ADF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                            • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                            • API String ID: 3830820486-3289030164
                                                            • Opcode ID: dfe5cbd6ea4f6e6bb9de4f2d068d218d983ad9ceacce85e1ab5e0bf21a14201a
                                                            • Instruction ID: 9aa620dcb0ef2d03f54238ae0fc3f6e7db0334a2f453206f3b5dcd4df663bf6c
                                                            • Opcode Fuzzy Hash: dfe5cbd6ea4f6e6bb9de4f2d068d218d983ad9ceacce85e1ab5e0bf21a14201a
                                                            • Instruction Fuzzy Hash: 33D13E71508344AFC310EBA4C991EABB7ECEF98704F04491EF589D6291EB74DA44CBB2
                                                            APIs
                                                            • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 00DD9663
                                                            • GetFileAttributesW.KERNEL32(?), ref: 00DD96A1
                                                            • SetFileAttributesW.KERNEL32(?,?), ref: 00DD96BB
                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 00DD96D3
                                                            • FindClose.KERNEL32(00000000), ref: 00DD96DE
                                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 00DD96FA
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00DD974A
                                                            • SetCurrentDirectoryW.KERNEL32(00E26B7C), ref: 00DD9768
                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00DD9772
                                                            • FindClose.KERNEL32(00000000), ref: 00DD977F
                                                            • FindClose.KERNEL32(00000000), ref: 00DD978F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                            • String ID: *.*
                                                            • API String ID: 1409584000-438819550
                                                            • Opcode ID: d21771a4fa8686af81e625c3ff9cbfcefa728cc9d82116fc9d493ff3ebcdfea9
                                                            • Instruction ID: 87839f41e27cfd010f588e6f5279e377c95b5c8097b5650e19fbd0c9f28bccbb
                                                            • Opcode Fuzzy Hash: d21771a4fa8686af81e625c3ff9cbfcefa728cc9d82116fc9d493ff3ebcdfea9
                                                            • Instruction Fuzzy Hash: 6B31BF3254021D7ADF14AFB4ED18AEEB7ACEF09321F188156F805E22A0DB31DA54CB34
                                                            APIs
                                                            • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 00DD97BE
                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 00DD9819
                                                            • FindClose.KERNEL32(00000000), ref: 00DD9824
                                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 00DD9840
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00DD9890
                                                            • SetCurrentDirectoryW.KERNEL32(00E26B7C), ref: 00DD98AE
                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00DD98B8
                                                            • FindClose.KERNEL32(00000000), ref: 00DD98C5
                                                            • FindClose.KERNEL32(00000000), ref: 00DD98D5
                                                              • Part of subcall function 00DCDAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00DCDB00
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                            • String ID: *.*
                                                            • API String ID: 2640511053-438819550
                                                            • Opcode ID: 75bd774fda1ebf5ba6656c58cf602bec779a43f43ca4d8a48d19fb6ef4e9b618
                                                            • Instruction ID: ae36b58b2dce06538684e6edf5fb88aabd7c71b4ca91b953a5aca6ae840a3f2f
                                                            • Opcode Fuzzy Hash: 75bd774fda1ebf5ba6656c58cf602bec779a43f43ca4d8a48d19fb6ef4e9b618
                                                            • Instruction Fuzzy Hash: CD31C33254021D6EDF10AFB4EC58AEEB7ACDF06720F188156E810E62A0DB32DA55DB74
                                                            APIs
                                                              • Part of subcall function 00DEC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00DEB6AE,?,?), ref: 00DEC9B5
                                                              • Part of subcall function 00DEC998: _wcslen.LIBCMT ref: 00DEC9F1
                                                              • Part of subcall function 00DEC998: _wcslen.LIBCMT ref: 00DECA68
                                                              • Part of subcall function 00DEC998: _wcslen.LIBCMT ref: 00DECA9E
                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00DEBF3E
                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 00DEBFA9
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00DEBFCD
                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00DEC02C
                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00DEC0E7
                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00DEC154
                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00DEC1E9
                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 00DEC23A
                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00DEC2E3
                                                            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00DEC382
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00DEC38F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                            • String ID:
                                                            • API String ID: 3102970594-0
                                                            • Opcode ID: 35648b8dcd9f3a2b1801c924b4d6fa122aef9de582e14577362c04a24f68b588
                                                            • Instruction ID: ae782786201ba4ee72a96fe4b49701c5e655f2b9b11a4e3c25a0dcc3769f43c5
                                                            • Opcode Fuzzy Hash: 35648b8dcd9f3a2b1801c924b4d6fa122aef9de582e14577362c04a24f68b588
                                                            • Instruction Fuzzy Hash: C7023C716142409FD714DF29C891E2ABBE5EF49318F18C49DF84ADB2A2DB31EC46CB61
                                                            APIs
                                                            • GetLocalTime.KERNEL32(?), ref: 00DD8257
                                                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 00DD8267
                                                            • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00DD8273
                                                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00DD8310
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00DD8324
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00DD8356
                                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00DD838C
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00DD8395
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CurrentDirectoryTime$File$Local$System
                                                            • String ID: *.*
                                                            • API String ID: 1464919966-438819550
                                                            • Opcode ID: 230dd494c15fb438ce1f3ba710be5779af0e2d7761b6f531194ece997e414862
                                                            • Instruction ID: 3f404b69fd9af07c212822292f70ad5a867e6454574f467f4721e52f3ae012e2
                                                            • Opcode Fuzzy Hash: 230dd494c15fb438ce1f3ba710be5779af0e2d7761b6f531194ece997e414862
                                                            • Instruction Fuzzy Hash: 856126B25043459FCB10EF64C8409AEB3E8FF89314F04895AE999D7251EB31E949CBB2
                                                            APIs
                                                              • Part of subcall function 00D63AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00D63A97,?,?,00D62E7F,?,?,?,00000000), ref: 00D63AC2
                                                              • Part of subcall function 00DCE199: GetFileAttributesW.KERNEL32(?,00DCCF95), ref: 00DCE19A
                                                            • FindFirstFileW.KERNEL32(?,?), ref: 00DCD122
                                                            • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00DCD1DD
                                                            • MoveFileW.KERNEL32(?,?), ref: 00DCD1F0
                                                            • DeleteFileW.KERNEL32(?,?,?,?), ref: 00DCD20D
                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00DCD237
                                                              • Part of subcall function 00DCD29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00DCD21C,?,?), ref: 00DCD2B2
                                                            • FindClose.KERNEL32(00000000,?,?,?), ref: 00DCD253
                                                            • FindClose.KERNEL32(00000000), ref: 00DCD264
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                            • String ID: \*.*
                                                            • API String ID: 1946585618-1173974218
                                                            • Opcode ID: 8b49ae97f6705a4b4752812f882592c190f42ca3462d7c5346afd049277b7ea0
                                                            • Instruction ID: 81bfd9523a9e637e749981fa8b6e8776cd85a3ad944ccaafa229e1cab941df67
                                                            • Opcode Fuzzy Hash: 8b49ae97f6705a4b4752812f882592c190f42ca3462d7c5346afd049277b7ea0
                                                            • Instruction Fuzzy Hash: F361193180120A9BCF05EBA4DE52EEDB7BAEF55300F644169E44177191EB309F09DB70
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                            • String ID:
                                                            • API String ID: 1737998785-0
                                                            • Opcode ID: fcdc64d10e3f6133a46615096d9f51a7bfac81d5b7217f12cc4342ca2273b211
                                                            • Instruction ID: c76b8d8119567484ae8ac52a83805e1a42b2c862847d57c58aa4bd242244cdf0
                                                            • Opcode Fuzzy Hash: fcdc64d10e3f6133a46615096d9f51a7bfac81d5b7217f12cc4342ca2273b211
                                                            • Instruction Fuzzy Hash: 29418D35214611AFE720EF15D888B29BBE5EF44318F18C09AE459CF762C775EC41CBA0
                                                            APIs
                                                              • Part of subcall function 00DC16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00DC170D
                                                              • Part of subcall function 00DC16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00DC173A
                                                              • Part of subcall function 00DC16C3: GetLastError.KERNEL32 ref: 00DC174A
                                                            • ExitWindowsEx.USER32(?,00000000), ref: 00DCE932
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                            • String ID: $ $@$SeShutdownPrivilege
                                                            • API String ID: 2234035333-3163812486
                                                            • Opcode ID: f3904c743e1687a48a61f7049bc9e4a62a398fb42b16ebe71f0d19b735d56152
                                                            • Instruction ID: e095a1fdf9210d37dd41e50d10acc7acce8313f5974596c7040fa107af8f77de
                                                            • Opcode Fuzzy Hash: f3904c743e1687a48a61f7049bc9e4a62a398fb42b16ebe71f0d19b735d56152
                                                            • Instruction Fuzzy Hash: CE01D6B2620326ABEB6427B49C86FBF735CE715750F194529FD02E31D2DDB09C408AB4
                                                            APIs
                                                            • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00DE1276
                                                            • WSAGetLastError.WSOCK32 ref: 00DE1283
                                                            • bind.WSOCK32(00000000,?,00000010), ref: 00DE12BA
                                                            • WSAGetLastError.WSOCK32 ref: 00DE12C5
                                                            • closesocket.WSOCK32(00000000), ref: 00DE12F4
                                                            • listen.WSOCK32(00000000,00000005), ref: 00DE1303
                                                            • WSAGetLastError.WSOCK32 ref: 00DE130D
                                                            • closesocket.WSOCK32(00000000), ref: 00DE133C
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$closesocket$bindlistensocket
                                                            • String ID:
                                                            • API String ID: 540024437-0
                                                            • Opcode ID: c74f75d11276f7bf9ce3aec90bf81b6eea374c56713d5dbed09702bff10b167b
                                                            • Instruction ID: 7225e4ee60554da5fb05842eb6391cc544aae81b6479fcbc4e3623a0f0999107
                                                            • Opcode Fuzzy Hash: c74f75d11276f7bf9ce3aec90bf81b6eea374c56713d5dbed09702bff10b167b
                                                            • Instruction Fuzzy Hash: 6C41AF356002409FD710EF65C989B69BBE5BF86318F188188E9568F3A2C771EC81CBB1
                                                            APIs
                                                            • _free.LIBCMT ref: 00D9B9D4
                                                            • _free.LIBCMT ref: 00D9B9F8
                                                            • _free.LIBCMT ref: 00D9BB7F
                                                            • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00E03700), ref: 00D9BB91
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00E3121C,000000FF,00000000,0000003F,00000000,?,?), ref: 00D9BC09
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00E31270,000000FF,?,0000003F,00000000,?), ref: 00D9BC36
                                                            • _free.LIBCMT ref: 00D9BD4B
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                            • String ID:
                                                            • API String ID: 314583886-0
                                                            • Opcode ID: 21e524f4c4463bb5bb1ce6e993883a428e20b26ff2bf8f1eb19f1cc526951067
                                                            • Instruction ID: bfb13036adae54a478d865b981ebb5301fe6bae38e5fcba8a89d44a25309860e
                                                            • Opcode Fuzzy Hash: 21e524f4c4463bb5bb1ce6e993883a428e20b26ff2bf8f1eb19f1cc526951067
                                                            • Instruction Fuzzy Hash: D7C11671904208AFCF20EF79AA45BAA7BA9EF41330F19419BE494D7291E7709E41CB70
                                                            APIs
                                                              • Part of subcall function 00D63AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00D63A97,?,?,00D62E7F,?,?,?,00000000), ref: 00D63AC2
                                                              • Part of subcall function 00DCE199: GetFileAttributesW.KERNEL32(?,00DCCF95), ref: 00DCE19A
                                                            • FindFirstFileW.KERNEL32(?,?), ref: 00DCD420
                                                            • DeleteFileW.KERNEL32(?,?,?,?), ref: 00DCD470
                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00DCD481
                                                            • FindClose.KERNEL32(00000000), ref: 00DCD498
                                                            • FindClose.KERNEL32(00000000), ref: 00DCD4A1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                            • String ID: \*.*
                                                            • API String ID: 2649000838-1173974218
                                                            • Opcode ID: 3f68b8e602306779176160ef466e3d8cab6376e33a56ddbbcc928ea5fb67a11f
                                                            • Instruction ID: 798e777002a3e157f2807eb225667ab23bc6343c0dc8b03bdcd1c8cb4ed807d9
                                                            • Opcode Fuzzy Hash: 3f68b8e602306779176160ef466e3d8cab6376e33a56ddbbcc928ea5fb67a11f
                                                            • Instruction Fuzzy Hash: 26316B7101C3459BC204EF64D9919AFB7A9EE92304F485A2EF4D593291EB30EA09DB72
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: __floor_pentium4
                                                            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                            • API String ID: 4168288129-2761157908
                                                            • Opcode ID: c6db9593f0650458eb352ebb271a1d49379858d4e87b1eaabac1c913f6f18394
                                                            • Instruction ID: da3486b13f66aa97f65f66f3510d502e3d730a1fdf3ebdbf8e1ad8ba7d487837
                                                            • Opcode Fuzzy Hash: c6db9593f0650458eb352ebb271a1d49379858d4e87b1eaabac1c913f6f18394
                                                            • Instruction Fuzzy Hash: 7DC22772E086288BDF65DF68DD407EAB7B5EB48305F1841EAD44DE7240E774AE818F60
                                                            APIs
                                                            • _wcslen.LIBCMT ref: 00DD64DC
                                                            • CoInitialize.OLE32(00000000), ref: 00DD6639
                                                            • CoCreateInstance.OLE32(00DFFCF8,00000000,00000001,00DFFB68,?), ref: 00DD6650
                                                            • CoUninitialize.OLE32 ref: 00DD68D4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                            • String ID: .lnk
                                                            • API String ID: 886957087-24824748
                                                            • Opcode ID: bb23e2b8b473b0c2776109f9bcc6cebd5bddfbc93e380c16f4d958fdaa925a43
                                                            • Instruction ID: 4714bae0005b92ec73ba6d39c5bcb615d43fb0280503ee6cf1d78938d8081d70
                                                            • Opcode Fuzzy Hash: bb23e2b8b473b0c2776109f9bcc6cebd5bddfbc93e380c16f4d958fdaa925a43
                                                            • Instruction Fuzzy Hash: 87D14671508341AFC304EF24C891A6BB7E9FF98704F04496DF5958B2A1EB71E949CBB2
                                                            APIs
                                                            • GetForegroundWindow.USER32(?,?,00000000), ref: 00DE22E8
                                                              • Part of subcall function 00DDE4EC: GetWindowRect.USER32(?,?), ref: 00DDE504
                                                            • GetDesktopWindow.USER32 ref: 00DE2312
                                                            • GetWindowRect.USER32(00000000), ref: 00DE2319
                                                            • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00DE2355
                                                            • GetCursorPos.USER32(?), ref: 00DE2381
                                                            • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00DE23DF
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                            • String ID:
                                                            • API String ID: 2387181109-0
                                                            • Opcode ID: 4dcc2f0d2f1bebefc80899c9138d3a15ee871d48f3a4b43be00808df1938d2ab
                                                            • Instruction ID: fca35175bd2cc8794bb07fb88a08503ca1ca3043a1c1eb890cde337c0dfb82cd
                                                            • Opcode Fuzzy Hash: 4dcc2f0d2f1bebefc80899c9138d3a15ee871d48f3a4b43be00808df1938d2ab
                                                            • Instruction Fuzzy Hash: 6B31BE72504355ABC720EF55C845B6BB7AAFB84314F00191DF985D7291DA34EA18CBA2
                                                            APIs
                                                              • Part of subcall function 00D69CB3: _wcslen.LIBCMT ref: 00D69CBD
                                                            • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00DD9B78
                                                            • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00DD9C8B
                                                              • Part of subcall function 00DD3874: GetInputState.USER32 ref: 00DD38CB
                                                              • Part of subcall function 00DD3874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00DD3966
                                                            • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00DD9BA8
                                                            • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00DD9C75
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                            • String ID: *.*
                                                            • API String ID: 1972594611-438819550
                                                            • Opcode ID: 97083e5410dfec36268a6b2997839b1abe8bced3cb7412570080ab6d68ad6438
                                                            • Instruction ID: 554ef5e2cd3105a5a906678db915477363d3cdb8b94a83bc7dfcc434b979b475
                                                            • Opcode Fuzzy Hash: 97083e5410dfec36268a6b2997839b1abe8bced3cb7412570080ab6d68ad6438
                                                            • Instruction Fuzzy Hash: 4E41717191420AAFCF14DFA8D995AEEBBB8EF05310F244156E805A72A1EB319E54CF70
                                                            APIs
                                                              • Part of subcall function 00D79BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00D79BB2
                                                            • DefDlgProcW.USER32(?,?,?,?,?), ref: 00D79A4E
                                                            • GetSysColor.USER32(0000000F), ref: 00D79B23
                                                            • SetBkColor.GDI32(?,00000000), ref: 00D79B36
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Color$LongProcWindow
                                                            • String ID:
                                                            • API String ID: 3131106179-0
                                                            • Opcode ID: a378af897f5706b29b750f78f394818eafca0da6312c83aed26b8afba613aeb7
                                                            • Instruction ID: 9e87e6f891c85f90c2598db5555e35d85a53aaa8fac6449f414b3c6e1493122d
                                                            • Opcode Fuzzy Hash: a378af897f5706b29b750f78f394818eafca0da6312c83aed26b8afba613aeb7
                                                            • Instruction Fuzzy Hash: 97A12A72109408FFE7289A3D8CA9EBBAA9DDBC2310F19C109F147D6695EA21DD01D376
                                                            APIs
                                                              • Part of subcall function 00DE304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00DE307A
                                                              • Part of subcall function 00DE304E: _wcslen.LIBCMT ref: 00DE309B
                                                            • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00DE185D
                                                            • WSAGetLastError.WSOCK32 ref: 00DE1884
                                                            • bind.WSOCK32(00000000,?,00000010), ref: 00DE18DB
                                                            • WSAGetLastError.WSOCK32 ref: 00DE18E6
                                                            • closesocket.WSOCK32(00000000), ref: 00DE1915
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                            • String ID:
                                                            • API String ID: 1601658205-0
                                                            • Opcode ID: e4a66275e81eb72bfceeb370254033925a2473ff6711a389fafc4f54b9442e56
                                                            • Instruction ID: ccc3101214a22b4ef41eecd315468e2bed5d20f4f6bed069ee319c0a4f989764
                                                            • Opcode Fuzzy Hash: e4a66275e81eb72bfceeb370254033925a2473ff6711a389fafc4f54b9442e56
                                                            • Instruction Fuzzy Hash: 3C519F75A00210AFDB10AF24C886F6A77A5EB48718F088098F95A9F3D3D671AD41CBB1
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                            • String ID:
                                                            • API String ID: 292994002-0
                                                            • Opcode ID: 4ba6455b2948b26ab651e97fbadb7c24f8aaf3572b7f70c54c6b0f5cfee4c461
                                                            • Instruction ID: 66cb4ed60154ab1d3a2b5b14840b37d44a5f105d94891395663a92f5a41a512d
                                                            • Opcode Fuzzy Hash: 4ba6455b2948b26ab651e97fbadb7c24f8aaf3572b7f70c54c6b0f5cfee4c461
                                                            • Instruction Fuzzy Hash: EE21B1357402489FD7208F1AC844B3ABBA5EF85324B1ED058E946CB351C771EC42CBB0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                            • API String ID: 0-1546025612
                                                            • Opcode ID: a10ed307f69f284cb9b10cdf2a92224a7daac8bdc3f10efff95933515112019d
                                                            • Instruction ID: c438292b5a6e1d2883239d709bfe849e73cfc95e8e43123506a759aa92b54f90
                                                            • Opcode Fuzzy Hash: a10ed307f69f284cb9b10cdf2a92224a7daac8bdc3f10efff95933515112019d
                                                            • Instruction Fuzzy Hash: 87A27071E0061ACBDF24CF58C8407ADB7B1BF55310F2886AAE855A7285EB74DD81DFA0
                                                            APIs
                                                            • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00DC82AA
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: lstrlen
                                                            • String ID: ($tb$|
                                                            • API String ID: 1659193697-1968160224
                                                            • Opcode ID: 5ebc0447c0b61c745423e19da026153189267112ed400986fa56801194d39226
                                                            • Instruction ID: 24bc3501c808614bbfcd181bc3ff19031dab4df74f21784977560d6eafb17ea3
                                                            • Opcode Fuzzy Hash: 5ebc0447c0b61c745423e19da026153189267112ed400986fa56801194d39226
                                                            • Instruction Fuzzy Hash: FA323375A006069FCB28CF59C481E6AB7F0FF48710B15C56EE49ADB3A1EB70E941CB64
                                                            APIs
                                                            • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00DCAAAC
                                                            • SetKeyboardState.USER32(00000080), ref: 00DCAAC8
                                                            • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00DCAB36
                                                            • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00DCAB88
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: KeyboardState$InputMessagePostSend
                                                            • String ID:
                                                            • API String ID: 432972143-0
                                                            • Opcode ID: f3a698e4be92245364d27744425f90003d3cc842eb3a4ea4692787e9c7a2552e
                                                            • Instruction ID: 3f0936ee28979cc6eadc00164d5cebb15e3e47ed230a14a5a539501525a6163b
                                                            • Opcode Fuzzy Hash: f3a698e4be92245364d27744425f90003d3cc842eb3a4ea4692787e9c7a2552e
                                                            • Instruction Fuzzy Hash: 6231F570A4024DAEEB258A6CCC05FFA7BA7AB44314F08421EF191971D1D7758D91C772
                                                            APIs
                                                            • InternetReadFile.WININET(?,?,00000400,?), ref: 00DDCE89
                                                            • GetLastError.KERNEL32(?,00000000), ref: 00DDCEEA
                                                            • SetEvent.KERNEL32(?,?,00000000), ref: 00DDCEFE
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ErrorEventFileInternetLastRead
                                                            • String ID:
                                                            • API String ID: 234945975-0
                                                            • Opcode ID: a79460f8160223c67f31bd83215b61ae772fcc7c7fdaf43124ebd3500988c6f9
                                                            • Instruction ID: ade3f297492a790af2f4095b7003b915c3145492103d0631d376a1008362ed9b
                                                            • Opcode Fuzzy Hash: a79460f8160223c67f31bd83215b61ae772fcc7c7fdaf43124ebd3500988c6f9
                                                            • Instruction Fuzzy Hash: F42189B1510306ABEB20DFA5CA49BABB7FCEF40354F14941AE546D2291E770EE04DB74
                                                            APIs
                                                            • FindFirstFileW.KERNEL32(?,?), ref: 00DD5CC1
                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 00DD5D17
                                                            • FindClose.KERNEL32(?), ref: 00DD5D5F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Find$File$CloseFirstNext
                                                            • String ID:
                                                            • API String ID: 3541575487-0
                                                            • Opcode ID: caa1c799cd5a3e1384feb4b9b51188d99691b5f9eaf3245df024b7bf517c818c
                                                            • Instruction ID: 753144be602215ae3d3837581360c9f7995a188d0d0c5937f9e65dbe355b954d
                                                            • Opcode Fuzzy Hash: caa1c799cd5a3e1384feb4b9b51188d99691b5f9eaf3245df024b7bf517c818c
                                                            • Instruction Fuzzy Hash: E9517634604B019FC714DF28D494AAAB7E5FF49314F18855EE99A8B3A2DB30E944CFB1
                                                            APIs
                                                            • IsDebuggerPresent.KERNEL32 ref: 00D9271A
                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00D92724
                                                            • UnhandledExceptionFilter.KERNEL32(?), ref: 00D92731
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                            • String ID:
                                                            • API String ID: 3906539128-0
                                                            • Opcode ID: 61b36d5d39377c6b5e6c6ff15bbc065606f06101bc0907638810f64b25718c8a
                                                            • Instruction ID: 7b13992b798775ee25adfd8ed0a424ea239c99c8d8084da77490fa681a6a807c
                                                            • Opcode Fuzzy Hash: 61b36d5d39377c6b5e6c6ff15bbc065606f06101bc0907638810f64b25718c8a
                                                            • Instruction Fuzzy Hash: 6B31C47491121CABCB21DF64DD88B9CBBB8EF08310F5041EAE41CA6260E7309F858F54
                                                            APIs
                                                            • SetErrorMode.KERNEL32(00000001), ref: 00DD51DA
                                                            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00DD5238
                                                            • SetErrorMode.KERNEL32(00000000), ref: 00DD52A1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ErrorMode$DiskFreeSpace
                                                            • String ID:
                                                            • API String ID: 1682464887-0
                                                            • Opcode ID: 2d10449e893364a4a4b6c783a22cb5cde75affc8d8b7b58d7bcab841a6036418
                                                            • Instruction ID: 37b175be30766f08e3c75a294401560851ec259183bb0bf72ad0000b8b17dc2f
                                                            • Opcode Fuzzy Hash: 2d10449e893364a4a4b6c783a22cb5cde75affc8d8b7b58d7bcab841a6036418
                                                            • Instruction Fuzzy Hash: 2A314175A10618DFDB00DF54D884EADBBB5FF49314F088099E845AB396DB31E85ACBA0
                                                            APIs
                                                              • Part of subcall function 00D7FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00D80668
                                                              • Part of subcall function 00D7FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00D80685
                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00DC170D
                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00DC173A
                                                            • GetLastError.KERNEL32 ref: 00DC174A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                            • String ID:
                                                            • API String ID: 577356006-0
                                                            • Opcode ID: bad11f016c05999b2c25c623145d9e39f8d61bd11fd783b11782b781ecc418bf
                                                            • Instruction ID: 55e65c4dc6d34ca747d16a8c747365569bf5bf29bf701b5f50d70821047708aa
                                                            • Opcode Fuzzy Hash: bad11f016c05999b2c25c623145d9e39f8d61bd11fd783b11782b781ecc418bf
                                                            • Instruction Fuzzy Hash: C6118FB2414309FFD7289F54DC86E6AB7B9EB45754B24C52EE05697281EB70BC41CA30
                                                            APIs
                                                            • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00DCD608
                                                            • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00DCD645
                                                            • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00DCD650
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CloseControlCreateDeviceFileHandle
                                                            • String ID:
                                                            • API String ID: 33631002-0
                                                            • Opcode ID: 52636c64bb770f3d167a68b957e5a2315c10f85fb67f2255bf1e3956746fa481
                                                            • Instruction ID: e12c7c8d7fc988960321b7a3f24cc9e10faa8402b678a6e0c2b2e9eb2df03239
                                                            • Opcode Fuzzy Hash: 52636c64bb770f3d167a68b957e5a2315c10f85fb67f2255bf1e3956746fa481
                                                            • Instruction Fuzzy Hash: 58117C71E01328BBDB108F989C44FAFBBBCEB45B50F108126F904E7290D2704A01CBA1
                                                            APIs
                                                            • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00DC168C
                                                            • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00DC16A1
                                                            • FreeSid.ADVAPI32(?), ref: 00DC16B1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: AllocateCheckFreeInitializeMembershipToken
                                                            • String ID:
                                                            • API String ID: 3429775523-0
                                                            • Opcode ID: 1989c23e670ecd7a0d01f53261385cecdf23e926d41249a82efd24941ec1204d
                                                            • Instruction ID: 7ffb3a60fa7da1173807431ac5cba0181d47028166c93acec78f5278cec28989
                                                            • Opcode Fuzzy Hash: 1989c23e670ecd7a0d01f53261385cecdf23e926d41249a82efd24941ec1204d
                                                            • Instruction Fuzzy Hash: 2CF0447195030DFBDB00CFE08D89EAEBBBCEB08200F008864E500E2281E730AA049A60
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: /
                                                            • API String ID: 0-2043925204
                                                            • Opcode ID: 89ff64c5230f5ec9e66cf857a4ec6dd618f3da40667d9cf350b3acd4a6089478
                                                            • Instruction ID: 866eb5c056fab0d7026b12ddcf1c63af35ce6ecc4a098f53e62a1693962d5b22
                                                            • Opcode Fuzzy Hash: 89ff64c5230f5ec9e66cf857a4ec6dd618f3da40667d9cf350b3acd4a6089478
                                                            • Instruction Fuzzy Hash: C0415972A00219AFCF209FB9CC88EBB77B8EB84354F548269F905D7181E6709D81CB70
                                                            APIs
                                                            • GetUserNameW.ADVAPI32(?,?), ref: 00DBD28C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: NameUser
                                                            • String ID: X64
                                                            • API String ID: 2645101109-893830106
                                                            • Opcode ID: 1f43bf6244cd951695c6174dc99026f1d36e94e2361f2bed168597c6479da128
                                                            • Instruction ID: b1f466379831952f41777682bdd99bc90febb12781010ad8cd46e9fd73a1dbb2
                                                            • Opcode Fuzzy Hash: 1f43bf6244cd951695c6174dc99026f1d36e94e2361f2bed168597c6479da128
                                                            • Instruction Fuzzy Hash: 4AD0C9B481111DEACB94CB90EC88DD9B37CBF04305F104155F146E2100EB3095498F20
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                            • Instruction ID: a3482202bcfe786ab4ed1731cbd10fefbe14b31a0232e5ba443e07b6ee5897ee
                                                            • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                            • Instruction Fuzzy Hash: 59021C71E11119DBDF14DFA9C8806ADFBF1FF48314F29816AE919E7380D731A9418BA4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Variable is not of type 'Object'.$p#
                                                            • API String ID: 0-1086706999
                                                            • Opcode ID: fcf5fee6954e27a7edf1d51c41bd302d238ea54207d4ee4b8eed76659735215e
                                                            • Instruction ID: b619836a4e23dfd910cb0f6f22710076e257a5de85f4cce7328d79c21420b0d0
                                                            • Opcode Fuzzy Hash: fcf5fee6954e27a7edf1d51c41bd302d238ea54207d4ee4b8eed76659735215e
                                                            • Instruction Fuzzy Hash: C5324770910218DBCF14DF94C885AFEBBB5FF05304F189059E886AB292DB75AE49CB71
                                                            APIs
                                                            • FindFirstFileW.KERNEL32(?,?), ref: 00DD6918
                                                            • FindClose.KERNEL32(00000000), ref: 00DD6961
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Find$CloseFileFirst
                                                            • String ID:
                                                            • API String ID: 2295610775-0
                                                            • Opcode ID: 191b37646ee90d7f33c927afcd5245c1877e3044d8df04abffc0b426553da0ff
                                                            • Instruction ID: b30147f8cf14360f7ff2f43fcad6475f2fb5acebd71355b83cc0ee1191dc226a
                                                            • Opcode Fuzzy Hash: 191b37646ee90d7f33c927afcd5245c1877e3044d8df04abffc0b426553da0ff
                                                            • Instruction Fuzzy Hash: 4E1190316142009FC710DF69D484A26BBE5FF89328F18C69AE4698F3A2C730EC05CBE1
                                                            APIs
                                                            • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00DE4891,?,?,00000035,?), ref: 00DD37E4
                                                            • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00DE4891,?,?,00000035,?), ref: 00DD37F4
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ErrorFormatLastMessage
                                                            • String ID:
                                                            • API String ID: 3479602957-0
                                                            • Opcode ID: 932eb3f59bfa63cc15a74f2d90107a21dca9b4d0e782c7c11e743dff885640f8
                                                            • Instruction ID: 16b358d0fcad72a13fa54d12abbe053b29e008c5a072935ff3df0166f6141eeb
                                                            • Opcode Fuzzy Hash: 932eb3f59bfa63cc15a74f2d90107a21dca9b4d0e782c7c11e743dff885640f8
                                                            • Instruction Fuzzy Hash: A6F055B06043293BE72013A68C4CFEB3AAEEFC4760F000122F508E2380C9608904C7B0
                                                            APIs
                                                            • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00DCB25D
                                                            • keybd_event.USER32(?,75A4C0D0,?,00000000), ref: 00DCB270
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: InputSendkeybd_event
                                                            • String ID:
                                                            • API String ID: 3536248340-0
                                                            • Opcode ID: bcf2b308388aa1004f71bb6adb67a45228c698f8c52957990fcd06aa70eeb5eb
                                                            • Instruction ID: 3a791d38801ce917fc543c4b4da5136be9dcd026ae838b56482e4fa40f36d75c
                                                            • Opcode Fuzzy Hash: bcf2b308388aa1004f71bb6adb67a45228c698f8c52957990fcd06aa70eeb5eb
                                                            • Instruction Fuzzy Hash: 47F01D7181428EABDB059FA0C806BBEBBB4FF04315F04940AF955A6291C379D615DFA4
                                                            APIs
                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00DC11FC), ref: 00DC10D4
                                                            • CloseHandle.KERNEL32(?,?,00DC11FC), ref: 00DC10E9
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: AdjustCloseHandlePrivilegesToken
                                                            • String ID:
                                                            • API String ID: 81990902-0
                                                            • Opcode ID: 37f0ca8ecaa4df98f7e7bcee97ef1dc09018dd50ec480a5fb412281931cf13d4
                                                            • Instruction ID: 6f96b5afbd7c1d15da70bc6ae38dea9093e6edbcb0e1ec4771f292c38ae19638
                                                            • Opcode Fuzzy Hash: 37f0ca8ecaa4df98f7e7bcee97ef1dc09018dd50ec480a5fb412281931cf13d4
                                                            • Instruction Fuzzy Hash: BBE04F32018710AEE7352B11FC05E7377E9EF04310B14C82EF4A5804B1EB626CA0EB30
                                                            APIs
                                                            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00D96766,?,?,00000008,?,?,00D9FEFE,00000000), ref: 00D96998
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ExceptionRaise
                                                            • String ID:
                                                            • API String ID: 3997070919-0
                                                            • Opcode ID: c71f8dcce732b241f68d0cad606e4edef130004442054d8c8f61cc11127bf823
                                                            • Instruction ID: 68c023fdef722f257016ab1e309a3de9209dd476d5f1b3366af539398ad09dea
                                                            • Opcode Fuzzy Hash: c71f8dcce732b241f68d0cad606e4edef130004442054d8c8f61cc11127bf823
                                                            • Instruction Fuzzy Hash: 6CB139316106089FDB19CF28C48AB657BE0FF45364F298658E8E9CF2E2C335E991CB50
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID: 0-3916222277
                                                            • Opcode ID: 684a21c352f7599b3ce7bd57874c49bd55545d2d35e40765cde82c0cb5cb5944
                                                            • Instruction ID: 4fc554390e93804f5464b0e9759718aa0b8fc3f1ab1368ae4c8b6fbdfe9df5e8
                                                            • Opcode Fuzzy Hash: 684a21c352f7599b3ce7bd57874c49bd55545d2d35e40765cde82c0cb5cb5944
                                                            • Instruction Fuzzy Hash: 27123E75900229DFCB24CF58C8817EEB7F5EF48714F14819AE849EB255EB349A81DFA0
                                                            APIs
                                                            • BlockInput.USER32(00000001), ref: 00DDEABD
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: BlockInput
                                                            • String ID:
                                                            • API String ID: 3456056419-0
                                                            • Opcode ID: 61a36423c83b62f7a76e107ace008feaa48fe7873b77582db9cb349de1d1ac71
                                                            • Instruction ID: 1407873bac92cc7f577876a085917876883a9301e23e9407f4afc9b1d67778cd
                                                            • Opcode Fuzzy Hash: 61a36423c83b62f7a76e107ace008feaa48fe7873b77582db9cb349de1d1ac71
                                                            • Instruction Fuzzy Hash: 75E01A312102059FC710EF59D804E9AB7E9EF98760F009417FC4ACB361DAB0E8408BB0
                                                            APIs
                                                            • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,00D803EE), ref: 00D809DA
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ExceptionFilterUnhandled
                                                            • String ID:
                                                            • API String ID: 3192549508-0
                                                            • Opcode ID: 4bcb9f6caf6d755b47346e5c6c7259b68c5da913bd75e3c8692cb97e43c2a251
                                                            • Instruction ID: e6b9c4d988fc289b3ef8545a3d2ac004f73613898a8f9421239e3dadb7821281
                                                            • Opcode Fuzzy Hash: 4bcb9f6caf6d755b47346e5c6c7259b68c5da913bd75e3c8692cb97e43c2a251
                                                            • Instruction Fuzzy Hash:
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 0
                                                            • API String ID: 0-4108050209
                                                            • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                            • Instruction ID: a262749e97b1df794153fd69402b0d9e44927cf8c67f0c355917633ccd970fee
                                                            • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                            • Instruction Fuzzy Hash: 3751ABB160C7055BDF38B628889EBBE27A9DB02340F7C0509D8CBC7282D611DE01E772
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 0&
                                                            • API String ID: 0-2523485602
                                                            • Opcode ID: 9425958e2224f2819348f6de47563f8e842300c1db1450a2341a6910bb1864e1
                                                            • Instruction ID: 26b3b4757858ce23b1bf4e48f7e1ff2587533c17fe09ea544a4f5486caaa620e
                                                            • Opcode Fuzzy Hash: 9425958e2224f2819348f6de47563f8e842300c1db1450a2341a6910bb1864e1
                                                            • Instruction Fuzzy Hash: 7221E7323206158BD728CF79C82367E77E5AB64320F18862EE4A7D37D0DE35A904CB90
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f1be5a27f9368ce4d425b1a8da83763b14936e227828820164e3d86b0c8abc04
                                                            • Instruction ID: 77dff64ef0d78c27f5169a3b6fb22d14ad4253d3263915ae5a8e22157a02b4eb
                                                            • Opcode Fuzzy Hash: f1be5a27f9368ce4d425b1a8da83763b14936e227828820164e3d86b0c8abc04
                                                            • Instruction Fuzzy Hash: 7F322422D79F014DDB639635CC26335A289AFB73C5F15D737E81AB59AAEB29C4C34100
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 271b791473b8358ca1f32099bd7feab8b7fa5891f44db2e210211be0d2e77b61
                                                            • Instruction ID: 8cc2f42f565db33ab84ad984578742502b37cc9f03e98b2ac6052042aace490f
                                                            • Opcode Fuzzy Hash: 271b791473b8358ca1f32099bd7feab8b7fa5891f44db2e210211be0d2e77b61
                                                            • Instruction Fuzzy Hash: 9232E031A20115CFDF39CA29C494AFD7BA1FB85300F2CA56BD49B9B291E634DD81DA70
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7c566641b4b271216b855bf1089ef4f64413c6b77c6cfb1b8be6b62909f78e3b
                                                            • Instruction ID: 048ce9a89af4b031c23263c31c72a9b592363e9d4e4845fd61d154746d3deff4
                                                            • Opcode Fuzzy Hash: 7c566641b4b271216b855bf1089ef4f64413c6b77c6cfb1b8be6b62909f78e3b
                                                            • Instruction Fuzzy Hash: CE22DFB0A00609DFDF14CFA8D881AAEB3F5FF45304F244529E856A7295EB36E915CB70
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d7027549a8886dd0201b1f0b0c365e1a5b8859b0876771ad6a344f53b89186cf
                                                            • Instruction ID: 93582e622a5bcd99cd799333f89d17e901b689c056a400d7be6c92eb63c937ad
                                                            • Opcode Fuzzy Hash: d7027549a8886dd0201b1f0b0c365e1a5b8859b0876771ad6a344f53b89186cf
                                                            • Instruction Fuzzy Hash: 3202C4B0A00205EFDB14DF64D891AAEB7B5FF44300F548169F85ADB291EB31EA15CBB1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 744913fd86842b01a7d9ddedd8e080effd1e0b8c62058a8e73b586b025940e20
                                                            • Instruction ID: de7c0431a93b90d786e89bd52a20c2faf1b9ce2346e651e243ded09c7b0b5354
                                                            • Opcode Fuzzy Hash: 744913fd86842b01a7d9ddedd8e080effd1e0b8c62058a8e73b586b025940e20
                                                            • Instruction Fuzzy Hash: 67B11321E2AF404DC723963A8871336B65CAFBB6D5F91D31BFC2674D62EB2686C74140
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                            • Instruction ID: 3937d143d776ee9ae1ff87dd0c8b036093c07bb75fe52ab361034adf2314130e
                                                            • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                            • Instruction Fuzzy Hash: 2391777B1080A34ADB2A563A857417EFFE95A923A131E079DE4F2CA1C5FE10C95ED730
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                            • Instruction ID: c99e0ff8edb7d3a90de177f7a1c127d48f6f2fa27a68dd897eec516fca4352b0
                                                            • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                            • Instruction Fuzzy Hash: 9191927A2090A34ADB2D567A847403EFFE95A923A231E079ED4F2CA1C1FE14D55E9730
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8964940d5bca2dceb5dd420da751d15488dc609cc8fe217884aeacbbe91b45a1
                                                            • Instruction ID: 2f60e9ac19e88465009dc18dcb8b1ea8f02ec613252927a011524e9ae312715c
                                                            • Opcode Fuzzy Hash: 8964940d5bca2dceb5dd420da751d15488dc609cc8fe217884aeacbbe91b45a1
                                                            • Instruction Fuzzy Hash: 67616971608709A6DA38BA288C95BBE6396DF51700F7C0919E886DB281DA11FE42D375
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 52e815ed6fa02eaad5f93cb8c7db0d1900579dc6ea23ce611e5e52378c8e4371
                                                            • Instruction ID: c64e193a23f3e21c33ce4f9bfe879507f520e0db1d6c4a98da70e4bb5dd73065
                                                            • Opcode Fuzzy Hash: 52e815ed6fa02eaad5f93cb8c7db0d1900579dc6ea23ce611e5e52378c8e4371
                                                            • Instruction Fuzzy Hash: 86619F7160C70AD7DE397A284855BBF6388EF42744F3C1959F883DB281E612ED429375
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                            • Instruction ID: 4af64c68e84c26dd7bd9fc1b82d95030969756a18ed7708d0b1b504a49642344
                                                            • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                            • Instruction Fuzzy Hash: 9B81963A6080A349DB2D623A853547EFFE55A923A131E079DD4F2CB1C1EE24C55EDB30
                                                            APIs
                                                            • DeleteObject.GDI32(00000000), ref: 00DE2B30
                                                            • DeleteObject.GDI32(00000000), ref: 00DE2B43
                                                            • DestroyWindow.USER32 ref: 00DE2B52
                                                            • GetDesktopWindow.USER32 ref: 00DE2B6D
                                                            • GetWindowRect.USER32(00000000), ref: 00DE2B74
                                                            • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00DE2CA3
                                                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00DE2CB1
                                                            • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00DE2CF8
                                                            • GetClientRect.USER32(00000000,?), ref: 00DE2D04
                                                            • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00DE2D40
                                                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00DE2D62
                                                            • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00DE2D75
                                                            • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00DE2D80
                                                            • GlobalLock.KERNEL32(00000000), ref: 00DE2D89
                                                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00DE2D98
                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00DE2DA1
                                                            • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00DE2DA8
                                                            • GlobalFree.KERNEL32(00000000), ref: 00DE2DB3
                                                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00DE2DC5
                                                            • OleLoadPicture.OLEAUT32(?,00000000,00000000,00DFFC38,00000000), ref: 00DE2DDB
                                                            • GlobalFree.KERNEL32(00000000), ref: 00DE2DEB
                                                            • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00DE2E11
                                                            • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00DE2E30
                                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00DE2E52
                                                            • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00DE303F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                            • String ID: $AutoIt v3$DISPLAY$static
                                                            • API String ID: 2211948467-2373415609
                                                            • Opcode ID: 85922c7d16a94a0267ce58b7b642d489ea3df113fbddc1dbdbc63d10d4c8fa2e
                                                            • Instruction ID: a88f30ca8c73fdc9a8c626141ee23926251b5a9292f1eb676dea028adbd8a35c
                                                            • Opcode Fuzzy Hash: 85922c7d16a94a0267ce58b7b642d489ea3df113fbddc1dbdbc63d10d4c8fa2e
                                                            • Instruction Fuzzy Hash: B5026771910208AFDB14EFA5CD89EBE7BB9EB48310F048158F915EB2A1DB70AD15CB70
                                                            APIs
                                                            • SetTextColor.GDI32(?,00000000), ref: 00DF712F
                                                            • GetSysColorBrush.USER32(0000000F), ref: 00DF7160
                                                            • GetSysColor.USER32(0000000F), ref: 00DF716C
                                                            • SetBkColor.GDI32(?,000000FF), ref: 00DF7186
                                                            • SelectObject.GDI32(?,?), ref: 00DF7195
                                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 00DF71C0
                                                            • GetSysColor.USER32(00000010), ref: 00DF71C8
                                                            • CreateSolidBrush.GDI32(00000000), ref: 00DF71CF
                                                            • FrameRect.USER32(?,?,00000000), ref: 00DF71DE
                                                            • DeleteObject.GDI32(00000000), ref: 00DF71E5
                                                            • InflateRect.USER32(?,000000FE,000000FE), ref: 00DF7230
                                                            • FillRect.USER32(?,?,?), ref: 00DF7262
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00DF7284
                                                              • Part of subcall function 00DF73E8: GetSysColor.USER32(00000012), ref: 00DF7421
                                                              • Part of subcall function 00DF73E8: SetTextColor.GDI32(?,?), ref: 00DF7425
                                                              • Part of subcall function 00DF73E8: GetSysColorBrush.USER32(0000000F), ref: 00DF743B
                                                              • Part of subcall function 00DF73E8: GetSysColor.USER32(0000000F), ref: 00DF7446
                                                              • Part of subcall function 00DF73E8: GetSysColor.USER32(00000011), ref: 00DF7463
                                                              • Part of subcall function 00DF73E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00DF7471
                                                              • Part of subcall function 00DF73E8: SelectObject.GDI32(?,00000000), ref: 00DF7482
                                                              • Part of subcall function 00DF73E8: SetBkColor.GDI32(?,00000000), ref: 00DF748B
                                                              • Part of subcall function 00DF73E8: SelectObject.GDI32(?,?), ref: 00DF7498
                                                              • Part of subcall function 00DF73E8: InflateRect.USER32(?,000000FF,000000FF), ref: 00DF74B7
                                                              • Part of subcall function 00DF73E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00DF74CE
                                                              • Part of subcall function 00DF73E8: GetWindowLongW.USER32(00000000,000000F0), ref: 00DF74DB
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                            • String ID:
                                                            • API String ID: 4124339563-0
                                                            • Opcode ID: 7c8e512165ffbb40174494ffb2eea1f93905efe56d3f1c44bfb34af784953ee1
                                                            • Instruction ID: 0743b7a6451df0246bceec4bb81b390178481084b8e9dd1da79d7317cfb47657
                                                            • Opcode Fuzzy Hash: 7c8e512165ffbb40174494ffb2eea1f93905efe56d3f1c44bfb34af784953ee1
                                                            • Instruction Fuzzy Hash: 85A1A371018309BFD7009F60DD48EBB7BA9FB49320F149A19FAA2D62E1D731E954CB61
                                                            APIs
                                                            • DestroyWindow.USER32(?,?), ref: 00D78E14
                                                            • SendMessageW.USER32(?,00001308,?,00000000), ref: 00DB6AC5
                                                            • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00DB6AFE
                                                            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00DB6F43
                                                              • Part of subcall function 00D78F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00D78BE8,?,00000000,?,?,?,?,00D78BBA,00000000,?), ref: 00D78FC5
                                                            • SendMessageW.USER32(?,00001053), ref: 00DB6F7F
                                                            • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00DB6F96
                                                            • ImageList_Destroy.COMCTL32(00000000,?), ref: 00DB6FAC
                                                            • ImageList_Destroy.COMCTL32(00000000,?), ref: 00DB6FB7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                            • String ID: 0
                                                            • API String ID: 2760611726-4108050209
                                                            • Opcode ID: 8c1d0667637aa38735fe91a7e98f35487216348081eee122a6a3c7db51bb1d49
                                                            • Instruction ID: eb6b84630596d7d60c18de694a69cb70e3692c6001b882320229549196b79289
                                                            • Opcode Fuzzy Hash: 8c1d0667637aa38735fe91a7e98f35487216348081eee122a6a3c7db51bb1d49
                                                            • Instruction Fuzzy Hash: 94128B30604205DFDB25CF24C958BBABBA5FF48300F188469F58ADB261DB36E856DB71
                                                            APIs
                                                            • DestroyWindow.USER32(00000000), ref: 00DE273E
                                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00DE286A
                                                            • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00DE28A9
                                                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00DE28B9
                                                            • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00DE2900
                                                            • GetClientRect.USER32(00000000,?), ref: 00DE290C
                                                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00DE2955
                                                            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00DE2964
                                                            • GetStockObject.GDI32(00000011), ref: 00DE2974
                                                            • SelectObject.GDI32(00000000,00000000), ref: 00DE2978
                                                            • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00DE2988
                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00DE2991
                                                            • DeleteDC.GDI32(00000000), ref: 00DE299A
                                                            • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00DE29C6
                                                            • SendMessageW.USER32(00000030,00000000,00000001), ref: 00DE29DD
                                                            • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00DE2A1D
                                                            • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00DE2A31
                                                            • SendMessageW.USER32(00000404,00000001,00000000), ref: 00DE2A42
                                                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00DE2A77
                                                            • GetStockObject.GDI32(00000011), ref: 00DE2A82
                                                            • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00DE2A8D
                                                            • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00DE2A97
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                            • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                            • API String ID: 2910397461-517079104
                                                            • Opcode ID: c727e0b20778131d48031356185074bff204687d725b11c7795d89414ca6b155
                                                            • Instruction ID: 01fb2f525bd26ff2d8d297124018bd3f33ca7cb0cf848f2a21668996a44ec6f0
                                                            • Opcode Fuzzy Hash: c727e0b20778131d48031356185074bff204687d725b11c7795d89414ca6b155
                                                            • Instruction Fuzzy Hash: B0B17D71A50309AFEB14DF69CD89FAE7BA9EB08710F008159F915E72A0D770ED50CBA0
                                                            APIs
                                                            • SetErrorMode.KERNEL32(00000001), ref: 00DD4AED
                                                            • GetDriveTypeW.KERNEL32(?,00DFCB68,?,\\.\,00DFCC08), ref: 00DD4BCA
                                                            • SetErrorMode.KERNEL32(00000000,00DFCB68,?,\\.\,00DFCC08), ref: 00DD4D36
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ErrorMode$DriveType
                                                            • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                            • API String ID: 2907320926-4222207086
                                                            • Opcode ID: dcef173b55470fcb65f4923c7853c9d9b2f80e2b5acee6501c4ccf2a10977fff
                                                            • Instruction ID: 02b872d4af2d2dca04386cc038283bd8816394f288b8e215eb054194cd19f148
                                                            • Opcode Fuzzy Hash: dcef173b55470fcb65f4923c7853c9d9b2f80e2b5acee6501c4ccf2a10977fff
                                                            • Instruction Fuzzy Hash: 8F61CE3065620ADBCB04EF28DA82D78B7B1EF44304B289517F846AB391DB32ED45DB71
                                                            APIs
                                                            • GetSysColor.USER32(00000012), ref: 00DF7421
                                                            • SetTextColor.GDI32(?,?), ref: 00DF7425
                                                            • GetSysColorBrush.USER32(0000000F), ref: 00DF743B
                                                            • GetSysColor.USER32(0000000F), ref: 00DF7446
                                                            • CreateSolidBrush.GDI32(?), ref: 00DF744B
                                                            • GetSysColor.USER32(00000011), ref: 00DF7463
                                                            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00DF7471
                                                            • SelectObject.GDI32(?,00000000), ref: 00DF7482
                                                            • SetBkColor.GDI32(?,00000000), ref: 00DF748B
                                                            • SelectObject.GDI32(?,?), ref: 00DF7498
                                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 00DF74B7
                                                            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00DF74CE
                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 00DF74DB
                                                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00DF752A
                                                            • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00DF7554
                                                            • InflateRect.USER32(?,000000FD,000000FD), ref: 00DF7572
                                                            • DrawFocusRect.USER32(?,?), ref: 00DF757D
                                                            • GetSysColor.USER32(00000011), ref: 00DF758E
                                                            • SetTextColor.GDI32(?,00000000), ref: 00DF7596
                                                            • DrawTextW.USER32(?,00DF70F5,000000FF,?,00000000), ref: 00DF75A8
                                                            • SelectObject.GDI32(?,?), ref: 00DF75BF
                                                            • DeleteObject.GDI32(?), ref: 00DF75CA
                                                            • SelectObject.GDI32(?,?), ref: 00DF75D0
                                                            • DeleteObject.GDI32(?), ref: 00DF75D5
                                                            • SetTextColor.GDI32(?,?), ref: 00DF75DB
                                                            • SetBkColor.GDI32(?,?), ref: 00DF75E5
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                            • String ID:
                                                            • API String ID: 1996641542-0
                                                            • Opcode ID: e8a337ad6ed200232d57d037fee27b2118e0a1f1404b4362540599b9783588be
                                                            • Instruction ID: 526805bd98377d2fbf2299bb13d9f926de5349b46bd612f5d52d688099dc00ae
                                                            • Opcode Fuzzy Hash: e8a337ad6ed200232d57d037fee27b2118e0a1f1404b4362540599b9783588be
                                                            • Instruction Fuzzy Hash: 03615A7290421CBFDB019FA4DD49EEEBFB9EB08320F159115FA15EB2A1D7709950CBA0
                                                            APIs
                                                            • GetCursorPos.USER32(?), ref: 00DF1128
                                                            • GetDesktopWindow.USER32 ref: 00DF113D
                                                            • GetWindowRect.USER32(00000000), ref: 00DF1144
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00DF1199
                                                            • DestroyWindow.USER32(?), ref: 00DF11B9
                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00DF11ED
                                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00DF120B
                                                            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00DF121D
                                                            • SendMessageW.USER32(00000000,00000421,?,?), ref: 00DF1232
                                                            • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00DF1245
                                                            • IsWindowVisible.USER32(00000000), ref: 00DF12A1
                                                            • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00DF12BC
                                                            • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00DF12D0
                                                            • GetWindowRect.USER32(00000000,?), ref: 00DF12E8
                                                            • MonitorFromPoint.USER32(?,?,00000002), ref: 00DF130E
                                                            • GetMonitorInfoW.USER32(00000000,?), ref: 00DF1328
                                                            • CopyRect.USER32(?,?), ref: 00DF133F
                                                            • SendMessageW.USER32(00000000,00000412,00000000), ref: 00DF13AA
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                            • String ID: ($0$tooltips_class32
                                                            • API String ID: 698492251-4156429822
                                                            • Opcode ID: d7a064b12fe7b35ee4ae7386233e6873b5f493295377a7e80733e046774d2b0f
                                                            • Instruction ID: c89b97e5c639c4e7d8ba975761185e1e6608a1188405f09a6b102868053ed609
                                                            • Opcode Fuzzy Hash: d7a064b12fe7b35ee4ae7386233e6873b5f493295377a7e80733e046774d2b0f
                                                            • Instruction Fuzzy Hash: 34B18A71608345EFD700DF64C985BAABBE4FF84354F048919FA99DB2A1CB71E844CBA1
                                                            APIs
                                                            • CharUpperBuffW.USER32(?,?), ref: 00DF02E5
                                                            • _wcslen.LIBCMT ref: 00DF031F
                                                            • _wcslen.LIBCMT ref: 00DF0389
                                                            • _wcslen.LIBCMT ref: 00DF03F1
                                                            • _wcslen.LIBCMT ref: 00DF0475
                                                            • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00DF04C5
                                                            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00DF0504
                                                              • Part of subcall function 00D7F9F2: _wcslen.LIBCMT ref: 00D7F9FD
                                                              • Part of subcall function 00DC223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00DC2258
                                                              • Part of subcall function 00DC223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00DC228A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$MessageSend$BuffCharUpper
                                                            • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                            • API String ID: 1103490817-719923060
                                                            • Opcode ID: 71c4c7b4073bdad76954860eaafdcd4e9e04f4dc0ea10775666cbc8c0dc701f7
                                                            • Instruction ID: 0a83c3fbfe40c2b86036a905cebac32a440677dfc2466374bc4f5f29b5c75e09
                                                            • Opcode Fuzzy Hash: 71c4c7b4073bdad76954860eaafdcd4e9e04f4dc0ea10775666cbc8c0dc701f7
                                                            • Instruction Fuzzy Hash: D2E18B312082058FC724DF24C55197ABBE6FFC8314B19895DF996AB2A2DB30ED45CBB1
                                                            APIs
                                                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00D78968
                                                            • GetSystemMetrics.USER32(00000007), ref: 00D78970
                                                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00D7899B
                                                            • GetSystemMetrics.USER32(00000008), ref: 00D789A3
                                                            • GetSystemMetrics.USER32(00000004), ref: 00D789C8
                                                            • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00D789E5
                                                            • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00D789F5
                                                            • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00D78A28
                                                            • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00D78A3C
                                                            • GetClientRect.USER32(00000000,000000FF), ref: 00D78A5A
                                                            • GetStockObject.GDI32(00000011), ref: 00D78A76
                                                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 00D78A81
                                                              • Part of subcall function 00D7912D: GetCursorPos.USER32(?), ref: 00D79141
                                                              • Part of subcall function 00D7912D: ScreenToClient.USER32(00000000,?), ref: 00D7915E
                                                              • Part of subcall function 00D7912D: GetAsyncKeyState.USER32(00000001), ref: 00D79183
                                                              • Part of subcall function 00D7912D: GetAsyncKeyState.USER32(00000002), ref: 00D7919D
                                                            • SetTimer.USER32(00000000,00000000,00000028,00D790FC), ref: 00D78AA8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                            • String ID: AutoIt v3 GUI
                                                            • API String ID: 1458621304-248962490
                                                            • Opcode ID: 622c8cd7e292717a57ccfe50bb67a56ca1ed8187a5157fdbd66fe5dbfbbc475a
                                                            • Instruction ID: c9509c3abcb2c1a3b1779c5c29b28be60d84fc4ee25b79fed1280c80a5ef09f1
                                                            • Opcode Fuzzy Hash: 622c8cd7e292717a57ccfe50bb67a56ca1ed8187a5157fdbd66fe5dbfbbc475a
                                                            • Instruction Fuzzy Hash: FEB16B71A00209DFDB14DF68C949BAA7BB5FB48314F148229FA16E7290DB34E950CF61
                                                            APIs
                                                              • Part of subcall function 00DC10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00DC1114
                                                              • Part of subcall function 00DC10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00DC0B9B,?,?,?), ref: 00DC1120
                                                              • Part of subcall function 00DC10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00DC0B9B,?,?,?), ref: 00DC112F
                                                              • Part of subcall function 00DC10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00DC0B9B,?,?,?), ref: 00DC1136
                                                              • Part of subcall function 00DC10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00DC114D
                                                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00DC0DF5
                                                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00DC0E29
                                                            • GetLengthSid.ADVAPI32(?), ref: 00DC0E40
                                                            • GetAce.ADVAPI32(?,00000000,?), ref: 00DC0E7A
                                                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00DC0E96
                                                            • GetLengthSid.ADVAPI32(?), ref: 00DC0EAD
                                                            • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00DC0EB5
                                                            • HeapAlloc.KERNEL32(00000000), ref: 00DC0EBC
                                                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00DC0EDD
                                                            • CopySid.ADVAPI32(00000000), ref: 00DC0EE4
                                                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00DC0F13
                                                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00DC0F35
                                                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00DC0F47
                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00DC0F6E
                                                            • HeapFree.KERNEL32(00000000), ref: 00DC0F75
                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00DC0F7E
                                                            • HeapFree.KERNEL32(00000000), ref: 00DC0F85
                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00DC0F8E
                                                            • HeapFree.KERNEL32(00000000), ref: 00DC0F95
                                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 00DC0FA1
                                                            • HeapFree.KERNEL32(00000000), ref: 00DC0FA8
                                                              • Part of subcall function 00DC1193: GetProcessHeap.KERNEL32(00000008,00DC0BB1,?,00000000,?,00DC0BB1,?), ref: 00DC11A1
                                                              • Part of subcall function 00DC1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00DC0BB1,?), ref: 00DC11A8
                                                              • Part of subcall function 00DC1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00DC0BB1,?), ref: 00DC11B7
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                            • String ID:
                                                            • API String ID: 4175595110-0
                                                            • Opcode ID: 3f5cf8d6d858166d42e75e391c42ba647e71d8d569030a79b28167cc61181380
                                                            • Instruction ID: c80887672215e3cad5a5e9c1f68c639f83aca10799b61b04c5ceaa1b57a631a8
                                                            • Opcode Fuzzy Hash: 3f5cf8d6d858166d42e75e391c42ba647e71d8d569030a79b28167cc61181380
                                                            • Instruction Fuzzy Hash: C8714A7290431AEBDF209FA4DD44FAEBBB8AF05300F188119F919E7291D7319A55CB70
                                                            APIs
                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00DEC4BD
                                                            • RegCreateKeyExW.ADVAPI32(?,?,00000000,00DFCC08,00000000,?,00000000,?,?), ref: 00DEC544
                                                            • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00DEC5A4
                                                            • _wcslen.LIBCMT ref: 00DEC5F4
                                                            • _wcslen.LIBCMT ref: 00DEC66F
                                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00DEC6B2
                                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00DEC7C1
                                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00DEC84D
                                                            • RegCloseKey.ADVAPI32(?), ref: 00DEC881
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00DEC88E
                                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00DEC960
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                            • API String ID: 9721498-966354055
                                                            • Opcode ID: fafe97afcb378d7f8e16fec7d555e4e3e2e5b3afaf27b006092225c64c8d1518
                                                            • Instruction ID: 208dbdbc1f85e4e664c09dd66a85f3426b6cf22a3e1eec14dcd7274ac08b0db4
                                                            • Opcode Fuzzy Hash: fafe97afcb378d7f8e16fec7d555e4e3e2e5b3afaf27b006092225c64c8d1518
                                                            • Instruction Fuzzy Hash: 6E127F356142419FD714EF15C881A2AB7E5FF88714F18889DF88A9B3A2DB31FD41CBA1
                                                            APIs
                                                            • CharUpperBuffW.USER32(?,?), ref: 00DF09C6
                                                            • _wcslen.LIBCMT ref: 00DF0A01
                                                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00DF0A54
                                                            • _wcslen.LIBCMT ref: 00DF0A8A
                                                            • _wcslen.LIBCMT ref: 00DF0B06
                                                            • _wcslen.LIBCMT ref: 00DF0B81
                                                              • Part of subcall function 00D7F9F2: _wcslen.LIBCMT ref: 00D7F9FD
                                                              • Part of subcall function 00DC2BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00DC2BFA
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$MessageSend$BuffCharUpper
                                                            • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                            • API String ID: 1103490817-4258414348
                                                            • Opcode ID: 863be8878470c55b3f4451ab8dcbaf65a548789171a6f78b74aa6aa36e167ae7
                                                            • Instruction ID: 0f956011d81b598f211183b9b19280f5b0c6f5cbcf470f3abd71448f91c4937f
                                                            • Opcode Fuzzy Hash: 863be8878470c55b3f4451ab8dcbaf65a548789171a6f78b74aa6aa36e167ae7
                                                            • Instruction Fuzzy Hash: DDE179352083059FC714DF24C45193ABBE2FF98318B1A895DF99AAB362D730ED45CBA1
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$BuffCharUpper
                                                            • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                            • API String ID: 1256254125-909552448
                                                            • Opcode ID: f5c9b6e694699937d150362b021dd64b63d5b9c201a10dcfa56bdd226467a3a9
                                                            • Instruction ID: 3affbd3d70b3c074418024d4afc0457fa3b7f527a4a47de8255e1ad2fb39a9db
                                                            • Opcode Fuzzy Hash: f5c9b6e694699937d150362b021dd64b63d5b9c201a10dcfa56bdd226467a3a9
                                                            • Instruction Fuzzy Hash: 0E711D326201AA4BCB20FE7EDD525BF33959F60754B292139FCA5A7244E631CD46C770
                                                            APIs
                                                            • _wcslen.LIBCMT ref: 00DF835A
                                                            • _wcslen.LIBCMT ref: 00DF836E
                                                            • _wcslen.LIBCMT ref: 00DF8391
                                                            • _wcslen.LIBCMT ref: 00DF83B4
                                                            • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00DF83F2
                                                            • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00DF5BF2), ref: 00DF844E
                                                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00DF8487
                                                            • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00DF84CA
                                                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00DF8501
                                                            • FreeLibrary.KERNEL32(?), ref: 00DF850D
                                                            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00DF851D
                                                            • DestroyIcon.USER32(?,?,?,?,?,00DF5BF2), ref: 00DF852C
                                                            • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00DF8549
                                                            • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00DF8555
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                            • String ID: .dll$.exe$.icl
                                                            • API String ID: 799131459-1154884017
                                                            • Opcode ID: 292bc4e8b5c17e4340c6f13aa4d5ea15ff7e25e8dfc9442566f3be6bf8045c28
                                                            • Instruction ID: db2f2b579cbae764a7e44f45f16ec526e0f582a0b2cefc8a25c2a35a9079c132
                                                            • Opcode Fuzzy Hash: 292bc4e8b5c17e4340c6f13aa4d5ea15ff7e25e8dfc9442566f3be6bf8045c28
                                                            • Instruction Fuzzy Hash: 0361DF7155031ABBEB14DF64CC41BBE77A8FB04721F10860AF915EA2D1DB74AA90DBB0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                            • API String ID: 0-1645009161
                                                            • Opcode ID: 4c270de8b53d444555b8efa526231090224d6fae13dea454f83be17e1392faf5
                                                            • Instruction ID: ea63d010b1d75c346c0a59edcdd7c557f41acb41edcccaa0e2af9ce03d3b46e2
                                                            • Opcode Fuzzy Hash: 4c270de8b53d444555b8efa526231090224d6fae13dea454f83be17e1392faf5
                                                            • Instruction Fuzzy Hash: 28810471A04209BFDB21AF60DC42FBE77A8EF15304F184025F904AB196EB71DA15DBB5
                                                            APIs
                                                            • CharLowerBuffW.USER32(?,?), ref: 00DD3EF8
                                                            • _wcslen.LIBCMT ref: 00DD3F03
                                                            • _wcslen.LIBCMT ref: 00DD3F5A
                                                            • _wcslen.LIBCMT ref: 00DD3F98
                                                            • GetDriveTypeW.KERNEL32(?), ref: 00DD3FD6
                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00DD401E
                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00DD4059
                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00DD4087
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                            • API String ID: 1839972693-4113822522
                                                            • Opcode ID: 3f5f489622bf153daff85dd251e167b8fb5ac42b54d632d6a08e5d92c369cf76
                                                            • Instruction ID: 408d31b44625c7e35db0e13dd9fb8793bc062517a294c6d665884916ad2ab43c
                                                            • Opcode Fuzzy Hash: 3f5f489622bf153daff85dd251e167b8fb5ac42b54d632d6a08e5d92c369cf76
                                                            • Instruction Fuzzy Hash: 77719D726042159FC710EF24C88186AB7F4EF94758F144A2EF89697351EB31ED45CBB2
                                                            APIs
                                                            • LoadIconW.USER32(00000063), ref: 00DC5A2E
                                                            • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00DC5A40
                                                            • SetWindowTextW.USER32(?,?), ref: 00DC5A57
                                                            • GetDlgItem.USER32(?,000003EA), ref: 00DC5A6C
                                                            • SetWindowTextW.USER32(00000000,?), ref: 00DC5A72
                                                            • GetDlgItem.USER32(?,000003E9), ref: 00DC5A82
                                                            • SetWindowTextW.USER32(00000000,?), ref: 00DC5A88
                                                            • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00DC5AA9
                                                            • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00DC5AC3
                                                            • GetWindowRect.USER32(?,?), ref: 00DC5ACC
                                                            • _wcslen.LIBCMT ref: 00DC5B33
                                                            • SetWindowTextW.USER32(?,?), ref: 00DC5B6F
                                                            • GetDesktopWindow.USER32 ref: 00DC5B75
                                                            • GetWindowRect.USER32(00000000), ref: 00DC5B7C
                                                            • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00DC5BD3
                                                            • GetClientRect.USER32(?,?), ref: 00DC5BE0
                                                            • PostMessageW.USER32(?,00000005,00000000,?), ref: 00DC5C05
                                                            • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00DC5C2F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                            • String ID:
                                                            • API String ID: 895679908-0
                                                            • Opcode ID: c93b84ba86f7763b7e5f4f9fb5d127e8b7c17216eb2e92c47909d2cb8b5a9806
                                                            • Instruction ID: ad394e5c1294bcd2cef47aab10fbfc3278b25c511c8411fb60ece16ff6725933
                                                            • Opcode Fuzzy Hash: c93b84ba86f7763b7e5f4f9fb5d127e8b7c17216eb2e92c47909d2cb8b5a9806
                                                            • Instruction Fuzzy Hash: 73715931900B0AAFDB209FA9DE45FAEBBF5EB48704F14451CE582E36A4D771B954CB20
                                                            APIs
                                                            • LoadCursorW.USER32(00000000,00007F89), ref: 00DDFE27
                                                            • LoadCursorW.USER32(00000000,00007F8A), ref: 00DDFE32
                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 00DDFE3D
                                                            • LoadCursorW.USER32(00000000,00007F03), ref: 00DDFE48
                                                            • LoadCursorW.USER32(00000000,00007F8B), ref: 00DDFE53
                                                            • LoadCursorW.USER32(00000000,00007F01), ref: 00DDFE5E
                                                            • LoadCursorW.USER32(00000000,00007F81), ref: 00DDFE69
                                                            • LoadCursorW.USER32(00000000,00007F88), ref: 00DDFE74
                                                            • LoadCursorW.USER32(00000000,00007F80), ref: 00DDFE7F
                                                            • LoadCursorW.USER32(00000000,00007F86), ref: 00DDFE8A
                                                            • LoadCursorW.USER32(00000000,00007F83), ref: 00DDFE95
                                                            • LoadCursorW.USER32(00000000,00007F85), ref: 00DDFEA0
                                                            • LoadCursorW.USER32(00000000,00007F82), ref: 00DDFEAB
                                                            • LoadCursorW.USER32(00000000,00007F84), ref: 00DDFEB6
                                                            • LoadCursorW.USER32(00000000,00007F04), ref: 00DDFEC1
                                                            • LoadCursorW.USER32(00000000,00007F02), ref: 00DDFECC
                                                            • GetCursorInfo.USER32(?), ref: 00DDFEDC
                                                            • GetLastError.KERNEL32 ref: 00DDFF1E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Cursor$Load$ErrorInfoLast
                                                            • String ID:
                                                            • API String ID: 3215588206-0
                                                            • Opcode ID: 8c409beb920e6ff2692d70eca75ca2a6f5a24b49cf27579f9979edd179b3ccc1
                                                            • Instruction ID: 5cc503d44314ebe2655953edc8351cde857edef60ef72e5474989770c387fd1d
                                                            • Opcode Fuzzy Hash: 8c409beb920e6ff2692d70eca75ca2a6f5a24b49cf27579f9979edd179b3ccc1
                                                            • Instruction Fuzzy Hash: DD4154B0D08319ABDB109FBA8C8586EBFE8FF04354B54452AE11DE7281DB78D905CEA1
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _wcslen
                                                            • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[
                                                            • API String ID: 176396367-1901692981
                                                            • Opcode ID: 278b3cb6c9d08189845b24f6913b6a175e14f60c7c3e676ed5473d585dd53364
                                                            • Instruction ID: 4f3285a5230b84bf56fcb400a8f5886a9e8125d5951799281cc9acdaef61e4d6
                                                            • Opcode Fuzzy Hash: 278b3cb6c9d08189845b24f6913b6a175e14f60c7c3e676ed5473d585dd53364
                                                            • Instruction Fuzzy Hash: FAE17132A04627ABCB189FA8C451BEDFBA5FF54710F58C11EE456B7240DB30AE459BB0
                                                            APIs
                                                            • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00D800C6
                                                              • Part of subcall function 00D800ED: InitializeCriticalSectionAndSpinCount.KERNEL32(00E3070C,00000FA0,A380C445,?,?,?,?,00DA23B3,000000FF), ref: 00D8011C
                                                              • Part of subcall function 00D800ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00DA23B3,000000FF), ref: 00D80127
                                                              • Part of subcall function 00D800ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00DA23B3,000000FF), ref: 00D80138
                                                              • Part of subcall function 00D800ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00D8014E
                                                              • Part of subcall function 00D800ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00D8015C
                                                              • Part of subcall function 00D800ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00D8016A
                                                              • Part of subcall function 00D800ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00D80195
                                                              • Part of subcall function 00D800ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00D801A0
                                                            • ___scrt_fastfail.LIBCMT ref: 00D800E7
                                                              • Part of subcall function 00D800A3: __onexit.LIBCMT ref: 00D800A9
                                                            Strings
                                                            • SleepConditionVariableCS, xrefs: 00D80154
                                                            • WakeAllConditionVariable, xrefs: 00D80162
                                                            • kernel32.dll, xrefs: 00D80133
                                                            • InitializeConditionVariable, xrefs: 00D80148
                                                            • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00D80122
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                            • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                            • API String ID: 66158676-1714406822
                                                            • Opcode ID: a5b3358d8c05f3d4ec92c02ab60e0b0f3673c5fa0800714b869c95306d97ad16
                                                            • Instruction ID: 637bca5ffcdd818b3fefdbe3d21d4241338e9b57de975ac461b923523753b59e
                                                            • Opcode Fuzzy Hash: a5b3358d8c05f3d4ec92c02ab60e0b0f3673c5fa0800714b869c95306d97ad16
                                                            • Instruction Fuzzy Hash: CE21F932A447196FE7607B64AD4DB3D3B98DF05BA1F05812AF905E6391DBA09808CBB0
                                                            APIs
                                                            • CharLowerBuffW.USER32(00000000,00000000,00DFCC08), ref: 00DD4527
                                                            • _wcslen.LIBCMT ref: 00DD453B
                                                            • _wcslen.LIBCMT ref: 00DD4599
                                                            • _wcslen.LIBCMT ref: 00DD45F4
                                                            • _wcslen.LIBCMT ref: 00DD463F
                                                            • _wcslen.LIBCMT ref: 00DD46A7
                                                              • Part of subcall function 00D7F9F2: _wcslen.LIBCMT ref: 00D7F9FD
                                                            • GetDriveTypeW.KERNEL32(?,00E26BF0,00000061), ref: 00DD4743
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$BuffCharDriveLowerType
                                                            • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                            • API String ID: 2055661098-1000479233
                                                            • Opcode ID: 2e3ac635946369f814edaa3f8200d408f2a001434b4024eb6062d9dbd9d6d909
                                                            • Instruction ID: aa904ac0851358dd6d7ec9b2e189e87975fc9abc5f43ffba8020506e054b4e30
                                                            • Opcode Fuzzy Hash: 2e3ac635946369f814edaa3f8200d408f2a001434b4024eb6062d9dbd9d6d909
                                                            • Instruction Fuzzy Hash: AFB1C0316083029FC710DF28D891AAAB7E5EFA5764F548A1EF49AD7391D730D844CBB2
                                                            APIs
                                                              • Part of subcall function 00D79BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00D79BB2
                                                            • DragQueryPoint.SHELL32(?,?), ref: 00DF9147
                                                              • Part of subcall function 00DF7674: ClientToScreen.USER32(?,?), ref: 00DF769A
                                                              • Part of subcall function 00DF7674: GetWindowRect.USER32(?,?), ref: 00DF7710
                                                              • Part of subcall function 00DF7674: PtInRect.USER32(?,?,00DF8B89), ref: 00DF7720
                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 00DF91B0
                                                            • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00DF91BB
                                                            • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00DF91DE
                                                            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00DF9225
                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 00DF923E
                                                            • SendMessageW.USER32(?,000000B1,?,?), ref: 00DF9255
                                                            • SendMessageW.USER32(?,000000B1,?,?), ref: 00DF9277
                                                            • DragFinish.SHELL32(?), ref: 00DF927E
                                                            • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00DF9371
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                            • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$p#
                                                            • API String ID: 221274066-136824727
                                                            • Opcode ID: 9c159e63fe215af89a3ccc9d18fe3cbda4ad1956e27f1a10001c5adf7987c5d8
                                                            • Instruction ID: 62ebe1bccc31c73358ca350a3fda1341d2efc1ff9b4ce6cb4446b0c9fda43f60
                                                            • Opcode Fuzzy Hash: 9c159e63fe215af89a3ccc9d18fe3cbda4ad1956e27f1a10001c5adf7987c5d8
                                                            • Instruction Fuzzy Hash: E4617971508305AFC701DF64DD95EAFBBE8EF88750F40492EF595922A0DB309A49CB72
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00DFCC08), ref: 00DE40BB
                                                            • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00DE40CD
                                                            • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,00DFCC08), ref: 00DE40F2
                                                            • FreeLibrary.KERNEL32(00000000,?,00DFCC08), ref: 00DE413E
                                                            • StringFromGUID2.OLE32(?,?,00000028,?,00DFCC08), ref: 00DE41A8
                                                            • SysFreeString.OLEAUT32(00000009), ref: 00DE4262
                                                            • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00DE42C8
                                                            • SysFreeString.OLEAUT32(?), ref: 00DE42F2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                            • String ID: GetModuleHandleExW$kernel32.dll
                                                            • API String ID: 354098117-199464113
                                                            • Opcode ID: 01757f499dd847a9a90fe28fed7f4ba0e089e82a6826c53452f0822dc5827340
                                                            • Instruction ID: f92d6145ce43ab47f042e7faf0f13ad9bb6232fa5eabd560da1fb4e38a67791e
                                                            • Opcode Fuzzy Hash: 01757f499dd847a9a90fe28fed7f4ba0e089e82a6826c53452f0822dc5827340
                                                            • Instruction Fuzzy Hash: 66125B75A00249EFDB14EF95C884EAEB7B9FF45314F288098F905AB251C771ED46CBA0
                                                            APIs
                                                            • GetMenuItemCount.USER32(00E31990), ref: 00DA2F8D
                                                            • GetMenuItemCount.USER32(00E31990), ref: 00DA303D
                                                            • GetCursorPos.USER32(?), ref: 00DA3081
                                                            • SetForegroundWindow.USER32(00000000), ref: 00DA308A
                                                            • TrackPopupMenuEx.USER32(00E31990,00000000,?,00000000,00000000,00000000), ref: 00DA309D
                                                            • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00DA30A9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                            • String ID: 0
                                                            • API String ID: 36266755-4108050209
                                                            • Opcode ID: ced299b761695cbecb5b7ae42c817c9d15bf9871d4c44ffd407de484d43e8bb1
                                                            • Instruction ID: 3d81d4efc01ab118d10f24efacf32b2d3a6ee6f764910bfaad6efa03894659b3
                                                            • Opcode Fuzzy Hash: ced299b761695cbecb5b7ae42c817c9d15bf9871d4c44ffd407de484d43e8bb1
                                                            • Instruction Fuzzy Hash: F6713930644209BFEB218F2ACD49FBABF65FF05324F244206F515AA2E0C7B1A954DB70
                                                            APIs
                                                            • DestroyWindow.USER32(00000000,?), ref: 00DF6DEB
                                                              • Part of subcall function 00D66B57: _wcslen.LIBCMT ref: 00D66B6A
                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00DF6E5F
                                                            • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00DF6E81
                                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00DF6E94
                                                            • DestroyWindow.USER32(?), ref: 00DF6EB5
                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00D60000,00000000), ref: 00DF6EE4
                                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00DF6EFD
                                                            • GetDesktopWindow.USER32 ref: 00DF6F16
                                                            • GetWindowRect.USER32(00000000), ref: 00DF6F1D
                                                            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00DF6F35
                                                            • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00DF6F4D
                                                              • Part of subcall function 00D79944: GetWindowLongW.USER32(?,000000EB), ref: 00D79952
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                            • String ID: 0$tooltips_class32
                                                            • API String ID: 2429346358-3619404913
                                                            • Opcode ID: 472a6ed8d5b1fc740e2d4907113854db1c3dbeced4eff40c9e9933a8b3852160
                                                            • Instruction ID: 6bd53b04b3f3498c20c1078e918c53e5f2bd9dfb8f54df8929e344bdacda794c
                                                            • Opcode Fuzzy Hash: 472a6ed8d5b1fc740e2d4907113854db1c3dbeced4eff40c9e9933a8b3852160
                                                            • Instruction Fuzzy Hash: 18716B71104348AFDB21CF18D848B7ABBE9EF89304F08841DFA99D7661D770E909CB21
                                                            APIs
                                                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00DDC4B0
                                                            • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00DDC4C3
                                                            • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00DDC4D7
                                                            • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00DDC4F0
                                                            • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00DDC533
                                                            • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00DDC549
                                                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00DDC554
                                                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00DDC584
                                                            • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00DDC5DC
                                                            • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00DDC5F0
                                                            • InternetCloseHandle.WININET(00000000), ref: 00DDC5FB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                            • String ID:
                                                            • API String ID: 3800310941-3916222277
                                                            • Opcode ID: 7b1860af370b9deb15ca69233e7903ddb2e98b7d944f322703f789ae9b689cd4
                                                            • Instruction ID: 8abd332c0467316df3dc6d9df5a76410e61b69b1a85f2c5cc39191051d4983a6
                                                            • Opcode Fuzzy Hash: 7b1860af370b9deb15ca69233e7903ddb2e98b7d944f322703f789ae9b689cd4
                                                            • Instruction Fuzzy Hash: 9F514AB151030ABFDB219FA0D988ABA7BBCEB08754F04941AF946D6710EB30E954DB70
                                                            APIs
                                                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00DF8592
                                                            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00DF85A2
                                                            • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00DF85AD
                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00DF85BA
                                                            • GlobalLock.KERNEL32(00000000), ref: 00DF85C8
                                                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00DF85D7
                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00DF85E0
                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00DF85E7
                                                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00DF85F8
                                                            • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,00DFFC38,?), ref: 00DF8611
                                                            • GlobalFree.KERNEL32(00000000), ref: 00DF8621
                                                            • GetObjectW.GDI32(?,00000018,?), ref: 00DF8641
                                                            • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00DF8671
                                                            • DeleteObject.GDI32(?), ref: 00DF8699
                                                            • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00DF86AF
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                            • String ID:
                                                            • API String ID: 3840717409-0
                                                            • Opcode ID: 5dd634c2daa64869a13ee8884a55787b7de0266c91e8e23ec4097fb66e82ef7b
                                                            • Instruction ID: 0e68526861c46b8753a54020a40a7aab95dadd923cbcc9c24c95cd03d288f0de
                                                            • Opcode Fuzzy Hash: 5dd634c2daa64869a13ee8884a55787b7de0266c91e8e23ec4097fb66e82ef7b
                                                            • Instruction Fuzzy Hash: B7411875600308AFDB119FA5CD48EBA7BB8EF89711F158058F905EB260DB309911DB30
                                                            APIs
                                                            • VariantInit.OLEAUT32(00000000), ref: 00DD1502
                                                            • VariantCopy.OLEAUT32(?,?), ref: 00DD150B
                                                            • VariantClear.OLEAUT32(?), ref: 00DD1517
                                                            • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00DD15FB
                                                            • VarR8FromDec.OLEAUT32(?,?), ref: 00DD1657
                                                            • VariantInit.OLEAUT32(?), ref: 00DD1708
                                                            • SysFreeString.OLEAUT32(?), ref: 00DD178C
                                                            • VariantClear.OLEAUT32(?), ref: 00DD17D8
                                                            • VariantClear.OLEAUT32(?), ref: 00DD17E7
                                                            • VariantInit.OLEAUT32(00000000), ref: 00DD1823
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                            • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                            • API String ID: 1234038744-3931177956
                                                            • Opcode ID: 7a8648b10fb707a7a4c21fb05a876cc87ee64fad0b9f92a2411b0f899c26eb06
                                                            • Instruction ID: 76f28d80c143b9beef26f92dac4cba7f610bd6476ab8df81b8a000d213231324
                                                            • Opcode Fuzzy Hash: 7a8648b10fb707a7a4c21fb05a876cc87ee64fad0b9f92a2411b0f899c26eb06
                                                            • Instruction Fuzzy Hash: 91D1EC79A00205FBDB109F65E884B79B7B5FF45700F14845BE886AB290DB38EC54DBB2
                                                            APIs
                                                              • Part of subcall function 00D69CB3: _wcslen.LIBCMT ref: 00D69CBD
                                                              • Part of subcall function 00DEC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00DEB6AE,?,?), ref: 00DEC9B5
                                                              • Part of subcall function 00DEC998: _wcslen.LIBCMT ref: 00DEC9F1
                                                              • Part of subcall function 00DEC998: _wcslen.LIBCMT ref: 00DECA68
                                                              • Part of subcall function 00DEC998: _wcslen.LIBCMT ref: 00DECA9E
                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00DEB6F4
                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00DEB772
                                                            • RegDeleteValueW.ADVAPI32(?,?), ref: 00DEB80A
                                                            • RegCloseKey.ADVAPI32(?), ref: 00DEB87E
                                                            • RegCloseKey.ADVAPI32(?), ref: 00DEB89C
                                                            • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00DEB8F2
                                                            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00DEB904
                                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00DEB922
                                                            • FreeLibrary.KERNEL32(00000000), ref: 00DEB983
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00DEB994
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                            • String ID: RegDeleteKeyExW$advapi32.dll
                                                            • API String ID: 146587525-4033151799
                                                            • Opcode ID: 3f83f2407ffbadb11e599485af3d74e34f2ef0fb192ecd9e723d9133935bba80
                                                            • Instruction ID: d3814fb581c0fb66817a8292fec35afd0f7ec6330a92f6b9ba608a2badcf37d3
                                                            • Opcode Fuzzy Hash: 3f83f2407ffbadb11e599485af3d74e34f2ef0fb192ecd9e723d9133935bba80
                                                            • Instruction Fuzzy Hash: 0CC17C30204241AFD714EF15C895F2ABBE5EF84318F18945DE49A8B7A2CB71EC46CFA1
                                                            APIs
                                                            • GetDC.USER32(00000000), ref: 00DE25D8
                                                            • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00DE25E8
                                                            • CreateCompatibleDC.GDI32(?), ref: 00DE25F4
                                                            • SelectObject.GDI32(00000000,?), ref: 00DE2601
                                                            • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00DE266D
                                                            • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00DE26AC
                                                            • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00DE26D0
                                                            • SelectObject.GDI32(?,?), ref: 00DE26D8
                                                            • DeleteObject.GDI32(?), ref: 00DE26E1
                                                            • DeleteDC.GDI32(?), ref: 00DE26E8
                                                            • ReleaseDC.USER32(00000000,?), ref: 00DE26F3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                            • String ID: (
                                                            • API String ID: 2598888154-3887548279
                                                            • Opcode ID: f349113060d1ad60a5a525a5df7eeeacc2f1bd0b00586509279929d5f0109aa1
                                                            • Instruction ID: eeb3559a9785d972f9aacbed4e453cba35e7efd6689640140ad91890ca1004d6
                                                            • Opcode Fuzzy Hash: f349113060d1ad60a5a525a5df7eeeacc2f1bd0b00586509279929d5f0109aa1
                                                            • Instruction Fuzzy Hash: 1E61E175D00219EFCB04DFA8D984AAEBBB9FF48310F208529E955A7350E770A951CF60
                                                            APIs
                                                            • ___free_lconv_mon.LIBCMT ref: 00D9DAA1
                                                              • Part of subcall function 00D9D63C: _free.LIBCMT ref: 00D9D659
                                                              • Part of subcall function 00D9D63C: _free.LIBCMT ref: 00D9D66B
                                                              • Part of subcall function 00D9D63C: _free.LIBCMT ref: 00D9D67D
                                                              • Part of subcall function 00D9D63C: _free.LIBCMT ref: 00D9D68F
                                                              • Part of subcall function 00D9D63C: _free.LIBCMT ref: 00D9D6A1
                                                              • Part of subcall function 00D9D63C: _free.LIBCMT ref: 00D9D6B3
                                                              • Part of subcall function 00D9D63C: _free.LIBCMT ref: 00D9D6C5
                                                              • Part of subcall function 00D9D63C: _free.LIBCMT ref: 00D9D6D7
                                                              • Part of subcall function 00D9D63C: _free.LIBCMT ref: 00D9D6E9
                                                              • Part of subcall function 00D9D63C: _free.LIBCMT ref: 00D9D6FB
                                                              • Part of subcall function 00D9D63C: _free.LIBCMT ref: 00D9D70D
                                                              • Part of subcall function 00D9D63C: _free.LIBCMT ref: 00D9D71F
                                                              • Part of subcall function 00D9D63C: _free.LIBCMT ref: 00D9D731
                                                            • _free.LIBCMT ref: 00D9DA96
                                                              • Part of subcall function 00D929C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00D9D7D1,00000000,00000000,00000000,00000000,?,00D9D7F8,00000000,00000007,00000000,?,00D9DBF5,00000000), ref: 00D929DE
                                                              • Part of subcall function 00D929C8: GetLastError.KERNEL32(00000000,?,00D9D7D1,00000000,00000000,00000000,00000000,?,00D9D7F8,00000000,00000007,00000000,?,00D9DBF5,00000000,00000000), ref: 00D929F0
                                                            • _free.LIBCMT ref: 00D9DAB8
                                                            • _free.LIBCMT ref: 00D9DACD
                                                            • _free.LIBCMT ref: 00D9DAD8
                                                            • _free.LIBCMT ref: 00D9DAFA
                                                            • _free.LIBCMT ref: 00D9DB0D
                                                            • _free.LIBCMT ref: 00D9DB1B
                                                            • _free.LIBCMT ref: 00D9DB26
                                                            • _free.LIBCMT ref: 00D9DB5E
                                                            • _free.LIBCMT ref: 00D9DB65
                                                            • _free.LIBCMT ref: 00D9DB82
                                                            • _free.LIBCMT ref: 00D9DB9A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                            • String ID:
                                                            • API String ID: 161543041-0
                                                            • Opcode ID: 16455680226a2b7a2b9d9f7fc65bf06a3a5f250af0d64971ee149d4eaaa721ac
                                                            • Instruction ID: 5547ebd2fee9bdae4512335e105d136a14c54f5afbd0f91fac30ac476aa96023
                                                            • Opcode Fuzzy Hash: 16455680226a2b7a2b9d9f7fc65bf06a3a5f250af0d64971ee149d4eaaa721ac
                                                            • Instruction Fuzzy Hash: 1C317A31644304AFEF21AA39E845B6AB7EAFF10324F694529E449D7191DF31EC90CB70
                                                            APIs
                                                            • GetClassNameW.USER32(?,?,00000100), ref: 00DC369C
                                                            • _wcslen.LIBCMT ref: 00DC36A7
                                                            • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00DC3797
                                                            • GetClassNameW.USER32(?,?,00000400), ref: 00DC380C
                                                            • GetDlgCtrlID.USER32(?), ref: 00DC385D
                                                            • GetWindowRect.USER32(?,?), ref: 00DC3882
                                                            • GetParent.USER32(?), ref: 00DC38A0
                                                            • ScreenToClient.USER32(00000000), ref: 00DC38A7
                                                            • GetClassNameW.USER32(?,?,00000100), ref: 00DC3921
                                                            • GetWindowTextW.USER32(?,?,00000400), ref: 00DC395D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                            • String ID: %s%u
                                                            • API String ID: 4010501982-679674701
                                                            • Opcode ID: 105ec893203dabfeb43bc80c027c7cb096fb468d3d1e71e98c4c1345567dcb64
                                                            • Instruction ID: d3915e97fa748be60140fe7d8fc91890d76e4e3b78ad848bcfff4ad57790828f
                                                            • Opcode Fuzzy Hash: 105ec893203dabfeb43bc80c027c7cb096fb468d3d1e71e98c4c1345567dcb64
                                                            • Instruction Fuzzy Hash: 85919A71204607AFDB19DE64C885FAAB7A8FF48350F04862DF999D3190DB30EA55CBB1
                                                            APIs
                                                            • GetClassNameW.USER32(?,?,00000400), ref: 00DC4994
                                                            • GetWindowTextW.USER32(?,?,00000400), ref: 00DC49DA
                                                            • _wcslen.LIBCMT ref: 00DC49EB
                                                            • CharUpperBuffW.USER32(?,00000000), ref: 00DC49F7
                                                            • _wcsstr.LIBVCRUNTIME ref: 00DC4A2C
                                                            • GetClassNameW.USER32(00000018,?,00000400), ref: 00DC4A64
                                                            • GetWindowTextW.USER32(?,?,00000400), ref: 00DC4A9D
                                                            • GetClassNameW.USER32(00000018,?,00000400), ref: 00DC4AE6
                                                            • GetClassNameW.USER32(?,?,00000400), ref: 00DC4B20
                                                            • GetWindowRect.USER32(?,?), ref: 00DC4B8B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                            • String ID: ThumbnailClass
                                                            • API String ID: 1311036022-1241985126
                                                            • Opcode ID: 616dd16a0de5f94b95eef5adf7c7da8d4f7e0756b434dac256a028c69edf86c2
                                                            • Instruction ID: 4b89df967bbdd6ce2b8b45ca53c83d04df0e7abd538384ebb395155e2c15d21a
                                                            • Opcode Fuzzy Hash: 616dd16a0de5f94b95eef5adf7c7da8d4f7e0756b434dac256a028c69edf86c2
                                                            • Instruction Fuzzy Hash: 13919B7110820A9BDB04DF14C9A5FAAB7A9EF84314F08846DFD859B1A6DB30ED45CBB1
                                                            APIs
                                                              • Part of subcall function 00D79BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00D79BB2
                                                            • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00DF8D5A
                                                            • GetFocus.USER32 ref: 00DF8D6A
                                                            • GetDlgCtrlID.USER32(00000000), ref: 00DF8D75
                                                            • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00DF8E1D
                                                            • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00DF8ECF
                                                            • GetMenuItemCount.USER32(?), ref: 00DF8EEC
                                                            • GetMenuItemID.USER32(?,00000000), ref: 00DF8EFC
                                                            • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00DF8F2E
                                                            • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00DF8F70
                                                            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00DF8FA1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                            • String ID: 0
                                                            • API String ID: 1026556194-4108050209
                                                            • Opcode ID: c13487af523531492a07d1d76c3d962693e9e116ed6d537e85b0a5270d20fa25
                                                            • Instruction ID: e0e6caf566a21df55a7942976e92e6b35ba096ace37aad150d5633d5d7f67644
                                                            • Opcode Fuzzy Hash: c13487af523531492a07d1d76c3d962693e9e116ed6d537e85b0a5270d20fa25
                                                            • Instruction Fuzzy Hash: D4817B71508309AFD710CF14C884ABBBBE9EF88314F198959FA85D7291DB31D904EB72
                                                            APIs
                                                            • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00DCDC20
                                                            • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00DCDC46
                                                            • _wcslen.LIBCMT ref: 00DCDC50
                                                            • _wcsstr.LIBVCRUNTIME ref: 00DCDCA0
                                                            • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00DCDCBC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                                            • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                            • API String ID: 1939486746-1459072770
                                                            • Opcode ID: 0a62f9749dc0afd71ef8a1fb609a921d3b98e01c49f6b964226ab0b5b7577585
                                                            • Instruction ID: 7a8bc422241472a24cab8102870455c78cf9278b4ce60e56c8862489c0154418
                                                            • Opcode Fuzzy Hash: 0a62f9749dc0afd71ef8a1fb609a921d3b98e01c49f6b964226ab0b5b7577585
                                                            • Instruction Fuzzy Hash: 70412F32A4030A7ADB24B7649C43FBF77ACEF41B20F148069F905A7182FA709910A7B4
                                                            APIs
                                                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00DECC64
                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00DECC8D
                                                            • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00DECD48
                                                              • Part of subcall function 00DECC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00DECCAA
                                                              • Part of subcall function 00DECC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00DECCBD
                                                              • Part of subcall function 00DECC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00DECCCF
                                                              • Part of subcall function 00DECC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00DECD05
                                                              • Part of subcall function 00DECC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00DECD28
                                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00DECCF3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                            • String ID: RegDeleteKeyExW$advapi32.dll
                                                            • API String ID: 2734957052-4033151799
                                                            • Opcode ID: a405c63e8e9efa3be281d6faf24bd98b94c2facd855fe80016d5ec2206835fa6
                                                            • Instruction ID: f8d6cb985f532d99ed84a2dd582e084ddfb94545bbc80b247b0795cdbee34088
                                                            • Opcode Fuzzy Hash: a405c63e8e9efa3be281d6faf24bd98b94c2facd855fe80016d5ec2206835fa6
                                                            • Instruction Fuzzy Hash: C4318D7191122DBBDB21AB56DC88EFFBB7CEF05740F045165B906E2240DB309A46DAB0
                                                            APIs
                                                            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00DD3D40
                                                            • _wcslen.LIBCMT ref: 00DD3D6D
                                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00DD3D9D
                                                            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00DD3DBE
                                                            • RemoveDirectoryW.KERNEL32(?), ref: 00DD3DCE
                                                            • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00DD3E55
                                                            • CloseHandle.KERNEL32(00000000), ref: 00DD3E60
                                                            • CloseHandle.KERNEL32(00000000), ref: 00DD3E6B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                            • String ID: :$\$\??\%s
                                                            • API String ID: 1149970189-3457252023
                                                            • Opcode ID: badd065d6d3db97bef20084a192715cfd26a7ed82dec3785769963d98be44cf1
                                                            • Instruction ID: c9bdb9e11b05a43ca08047f0fb13107465fa5a0ae705ed1f8c87d3e5e681c6c8
                                                            • Opcode Fuzzy Hash: badd065d6d3db97bef20084a192715cfd26a7ed82dec3785769963d98be44cf1
                                                            • Instruction Fuzzy Hash: 4131AF72910209ABDB209BA0DC49FEB37BDEF89740F1081B6F509D62A0EB709754CB35
                                                            APIs
                                                            • timeGetTime.WINMM ref: 00DCE6B4
                                                              • Part of subcall function 00D7E551: timeGetTime.WINMM(?,?,00DCE6D4), ref: 00D7E555
                                                            • Sleep.KERNEL32(0000000A), ref: 00DCE6E1
                                                            • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 00DCE705
                                                            • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00DCE727
                                                            • SetActiveWindow.USER32 ref: 00DCE746
                                                            • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00DCE754
                                                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 00DCE773
                                                            • Sleep.KERNEL32(000000FA), ref: 00DCE77E
                                                            • IsWindow.USER32 ref: 00DCE78A
                                                            • EndDialog.USER32(00000000), ref: 00DCE79B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                            • String ID: BUTTON
                                                            • API String ID: 1194449130-3405671355
                                                            • Opcode ID: 8ac6d06e86b4bead9d27b9d8af8f154bece759473fbb714121e59784106be0a5
                                                            • Instruction ID: 5551bb5fcb96836b1e62993d977ad95c5f5734b9a08aba44bb74800fcc1c4477
                                                            • Opcode Fuzzy Hash: 8ac6d06e86b4bead9d27b9d8af8f154bece759473fbb714121e59784106be0a5
                                                            • Instruction Fuzzy Hash: 79218EB121070AAFEB005F62ED8EF353F69EB54348B14A42CF545D22B1DB71AC28DA34
                                                            APIs
                                                              • Part of subcall function 00D69CB3: _wcslen.LIBCMT ref: 00D69CBD
                                                            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00DCEA5D
                                                            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00DCEA73
                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00DCEA84
                                                            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00DCEA96
                                                            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00DCEAA7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: SendString$_wcslen
                                                            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                            • API String ID: 2420728520-1007645807
                                                            • Opcode ID: fc0b4d1d9e8821963e9c94102877b01432890db9f64d8ca1e66fbb826393cb2e
                                                            • Instruction ID: cfcdb16fbd67fa10d51ea4ee22b0a743d978586031756ac7fb9dc0aedf3bc479
                                                            • Opcode Fuzzy Hash: fc0b4d1d9e8821963e9c94102877b01432890db9f64d8ca1e66fbb826393cb2e
                                                            • Instruction Fuzzy Hash: A4117371A903697ED720A7A6EC4AEFF6B7CEBD2B00F4415297401E30D1EEB05945C9B0
                                                            APIs
                                                            • GetDlgItem.USER32(?,00000001), ref: 00DC5CE2
                                                            • GetWindowRect.USER32(00000000,?), ref: 00DC5CFB
                                                            • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00DC5D59
                                                            • GetDlgItem.USER32(?,00000002), ref: 00DC5D69
                                                            • GetWindowRect.USER32(00000000,?), ref: 00DC5D7B
                                                            • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00DC5DCF
                                                            • GetDlgItem.USER32(?,000003E9), ref: 00DC5DDD
                                                            • GetWindowRect.USER32(00000000,?), ref: 00DC5DEF
                                                            • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00DC5E31
                                                            • GetDlgItem.USER32(?,000003EA), ref: 00DC5E44
                                                            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00DC5E5A
                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00DC5E67
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Window$ItemMoveRect$Invalidate
                                                            • String ID:
                                                            • API String ID: 3096461208-0
                                                            • Opcode ID: 209fdec8acdaa71433cfbb57840a5cb80f1913ea04b26a44f1dcd3887469c3cc
                                                            • Instruction ID: 69cf33864abb1b736457a97f53707715ac980eaeed6dca4a70852b62a2257c58
                                                            • Opcode Fuzzy Hash: 209fdec8acdaa71433cfbb57840a5cb80f1913ea04b26a44f1dcd3887469c3cc
                                                            • Instruction Fuzzy Hash: C4510071A1070AAFDF14DF68DD89FAE7BB9AB48300F148129F516E7294D770AD50CB60
                                                            APIs
                                                              • Part of subcall function 00D78F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00D78BE8,?,00000000,?,?,?,?,00D78BBA,00000000,?), ref: 00D78FC5
                                                            • DestroyWindow.USER32(?), ref: 00D78C81
                                                            • KillTimer.USER32(00000000,?,?,?,?,00D78BBA,00000000,?), ref: 00D78D1B
                                                            • DestroyAcceleratorTable.USER32(00000000), ref: 00DB6973
                                                            • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00D78BBA,00000000,?), ref: 00DB69A1
                                                            • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00D78BBA,00000000,?), ref: 00DB69B8
                                                            • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00D78BBA,00000000), ref: 00DB69D4
                                                            • DeleteObject.GDI32(00000000), ref: 00DB69E6
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                            • String ID:
                                                            • API String ID: 641708696-0
                                                            • Opcode ID: d0cf0f233482757c976ef53f180755785c41655893465abc45787b77597b063c
                                                            • Instruction ID: a33e724d2c838ba6406f7cefc96539d39c4ea93720689ff21bccdaf993c5d745
                                                            • Opcode Fuzzy Hash: d0cf0f233482757c976ef53f180755785c41655893465abc45787b77597b063c
                                                            • Instruction Fuzzy Hash: 79618A30501708DFCB269F15CA4CB65BBF1FB40312F18856CE086A66A0DB35E994EFB0
                                                            APIs
                                                              • Part of subcall function 00D79944: GetWindowLongW.USER32(?,000000EB), ref: 00D79952
                                                            • GetSysColor.USER32(0000000F), ref: 00D79862
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ColorLongWindow
                                                            • String ID:
                                                            • API String ID: 259745315-0
                                                            • Opcode ID: 0bbacaf4522cd446eb55ad2388f11d62fd2c40cb4ab8e75cefbf22ddfc4ae5a4
                                                            • Instruction ID: 7eabe929ab5ea927fd3415c83ef7156da75ec3a387fc1d6620572e3a2d9beb7c
                                                            • Opcode Fuzzy Hash: 0bbacaf4522cd446eb55ad2388f11d62fd2c40cb4ab8e75cefbf22ddfc4ae5a4
                                                            • Instruction Fuzzy Hash: 6841B132104704AFDB209F389C94BB97BA5AB47330F188646F9A6872E1E7319D52DB31
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,00DAF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00DC9717
                                                            • LoadStringW.USER32(00000000,?,00DAF7F8,00000001), ref: 00DC9720
                                                              • Part of subcall function 00D69CB3: _wcslen.LIBCMT ref: 00D69CBD
                                                            • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00DAF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00DC9742
                                                            • LoadStringW.USER32(00000000,?,00DAF7F8,00000001), ref: 00DC9745
                                                            • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00DC9866
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: HandleLoadModuleString$Message_wcslen
                                                            • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                            • API String ID: 747408836-2268648507
                                                            • Opcode ID: d49a3275ac14174308b722d1ff368657d6fcb1b9a874a9b57b71f9c3dd323cde
                                                            • Instruction ID: dba451495fef269ad4a662b862a4b6040198cc931eda07df56201a259f475f40
                                                            • Opcode Fuzzy Hash: d49a3275ac14174308b722d1ff368657d6fcb1b9a874a9b57b71f9c3dd323cde
                                                            • Instruction Fuzzy Hash: 24412A72800219ABCB04EBA0DE96EEEB778EF55340F604129B60573192EB356F48CA71
                                                            APIs
                                                              • Part of subcall function 00D66B57: _wcslen.LIBCMT ref: 00D66B6A
                                                            • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00DC07A2
                                                            • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00DC07BE
                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00DC07DA
                                                            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00DC0804
                                                            • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00DC082C
                                                            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00DC0837
                                                            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00DC083C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                            • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                            • API String ID: 323675364-22481851
                                                            • Opcode ID: 5d639438f1097bb8e58aa3f407779ea77442ccd3289edb202598e817d9dd8645
                                                            • Instruction ID: 50b7bd4c6e4eadb853245be51ba237fad722f431b857a9a3688014608b512653
                                                            • Opcode Fuzzy Hash: 5d639438f1097bb8e58aa3f407779ea77442ccd3289edb202598e817d9dd8645
                                                            • Instruction Fuzzy Hash: 2041E272810229ABDB15EBA4DC95DEDB778EF54750B148129E911B32A1EB30AE44CBB0
                                                            APIs
                                                            • VariantInit.OLEAUT32(?), ref: 00DE3C5C
                                                            • CoInitialize.OLE32(00000000), ref: 00DE3C8A
                                                            • CoUninitialize.OLE32 ref: 00DE3C94
                                                            • _wcslen.LIBCMT ref: 00DE3D2D
                                                            • GetRunningObjectTable.OLE32(00000000,?), ref: 00DE3DB1
                                                            • SetErrorMode.KERNEL32(00000001,00000029), ref: 00DE3ED5
                                                            • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00DE3F0E
                                                            • CoGetObject.OLE32(?,00000000,00DFFB98,?), ref: 00DE3F2D
                                                            • SetErrorMode.KERNEL32(00000000), ref: 00DE3F40
                                                            • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00DE3FC4
                                                            • VariantClear.OLEAUT32(?), ref: 00DE3FD8
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                            • String ID:
                                                            • API String ID: 429561992-0
                                                            • Opcode ID: ddc9ce9c17f1e34329f0d53ac01dcc0d6224fd698a6ca0b40dc436a082f06603
                                                            • Instruction ID: 0ca0e216d7cff785e4027ee397bb398480a99dcefb7bd8561f64600fce21e902
                                                            • Opcode Fuzzy Hash: ddc9ce9c17f1e34329f0d53ac01dcc0d6224fd698a6ca0b40dc436a082f06603
                                                            • Instruction Fuzzy Hash: 08C123716083459FC700EF69C88892BBBE9FF89748F14495DF98A9B210D731EE05CB62
                                                            APIs
                                                            • CoInitialize.OLE32(00000000), ref: 00DD7AF3
                                                            • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00DD7B8F
                                                            • SHGetDesktopFolder.SHELL32(?), ref: 00DD7BA3
                                                            • CoCreateInstance.OLE32(00DFFD08,00000000,00000001,00E26E6C,?), ref: 00DD7BEF
                                                            • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00DD7C74
                                                            • CoTaskMemFree.OLE32(?,?), ref: 00DD7CCC
                                                            • SHBrowseForFolderW.SHELL32(?), ref: 00DD7D57
                                                            • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00DD7D7A
                                                            • CoTaskMemFree.OLE32(00000000), ref: 00DD7D81
                                                            • CoTaskMemFree.OLE32(00000000), ref: 00DD7DD6
                                                            • CoUninitialize.OLE32 ref: 00DD7DDC
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                            • String ID:
                                                            • API String ID: 2762341140-0
                                                            • Opcode ID: 798701278e2fa903b8b6465c177b90a81678905cafc28236bcb4656c0289114d
                                                            • Instruction ID: c65ba4ac5cb23552136d68eaf9ba115bab4f7a57b2a82aa166ae35c32002cfac
                                                            • Opcode Fuzzy Hash: 798701278e2fa903b8b6465c177b90a81678905cafc28236bcb4656c0289114d
                                                            • Instruction Fuzzy Hash: BFC1EA75A04209AFCB14DFA4C894DAEBBF9FF48314B158499E81ADB361D730ED45CBA0
                                                            APIs
                                                            • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00DF5504
                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00DF5515
                                                            • CharNextW.USER32(00000158), ref: 00DF5544
                                                            • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00DF5585
                                                            • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00DF559B
                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00DF55AC
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$CharNext
                                                            • String ID:
                                                            • API String ID: 1350042424-0
                                                            • Opcode ID: c83792e324c75cfbf9ab911ac923115c85d7bad49b1e997d5de6754038ee2917
                                                            • Instruction ID: df14ef4da18dc393431fbd3538e5981dccf7f618cb80bab4f402e6016a1522ef
                                                            • Opcode Fuzzy Hash: c83792e324c75cfbf9ab911ac923115c85d7bad49b1e997d5de6754038ee2917
                                                            • Instruction Fuzzy Hash: C4618C3090460CEBDF109F54EC84AFE7BB9EB0A725F15C149FB65A62A4D7708A81DB70
                                                            APIs
                                                            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00DBFAAF
                                                            • SafeArrayAllocData.OLEAUT32(?), ref: 00DBFB08
                                                            • VariantInit.OLEAUT32(?), ref: 00DBFB1A
                                                            • SafeArrayAccessData.OLEAUT32(?,?), ref: 00DBFB3A
                                                            • VariantCopy.OLEAUT32(?,?), ref: 00DBFB8D
                                                            • SafeArrayUnaccessData.OLEAUT32(?), ref: 00DBFBA1
                                                            • VariantClear.OLEAUT32(?), ref: 00DBFBB6
                                                            • SafeArrayDestroyData.OLEAUT32(?), ref: 00DBFBC3
                                                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00DBFBCC
                                                            • VariantClear.OLEAUT32(?), ref: 00DBFBDE
                                                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00DBFBE9
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                            • String ID:
                                                            • API String ID: 2706829360-0
                                                            • Opcode ID: 43c75d5b7311d3836585fcfbbe48952bd799c9162df42bc4b02ce831c4c78b99
                                                            • Instruction ID: 62fccb9318b848a52b8ed7ae43432e1408866296e312998450f3c87fd3a139a0
                                                            • Opcode Fuzzy Hash: 43c75d5b7311d3836585fcfbbe48952bd799c9162df42bc4b02ce831c4c78b99
                                                            • Instruction Fuzzy Hash: 57412B35A10219EFCB14DFA8DC549EEBBB9EF48344F00C469E956E7261DB30A945CBB0
                                                            APIs
                                                            • GetKeyboardState.USER32(?), ref: 00DC9CA1
                                                            • GetAsyncKeyState.USER32(000000A0), ref: 00DC9D22
                                                            • GetKeyState.USER32(000000A0), ref: 00DC9D3D
                                                            • GetAsyncKeyState.USER32(000000A1), ref: 00DC9D57
                                                            • GetKeyState.USER32(000000A1), ref: 00DC9D6C
                                                            • GetAsyncKeyState.USER32(00000011), ref: 00DC9D84
                                                            • GetKeyState.USER32(00000011), ref: 00DC9D96
                                                            • GetAsyncKeyState.USER32(00000012), ref: 00DC9DAE
                                                            • GetKeyState.USER32(00000012), ref: 00DC9DC0
                                                            • GetAsyncKeyState.USER32(0000005B), ref: 00DC9DD8
                                                            • GetKeyState.USER32(0000005B), ref: 00DC9DEA
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: State$Async$Keyboard
                                                            • String ID:
                                                            • API String ID: 541375521-0
                                                            • Opcode ID: 32930e8c2ade20b171612a5ddc303c4741dd82f340685d754f527cc3571cec93
                                                            • Instruction ID: 25920d2d550a6b8f64aff226fb9a738d9c2f7073057a736989f1484e62062319
                                                            • Opcode Fuzzy Hash: 32930e8c2ade20b171612a5ddc303c4741dd82f340685d754f527cc3571cec93
                                                            • Instruction Fuzzy Hash: 3A41D8745047CB69FF308660952CBB5FEA06B21344F0C805ED6C7676C2DBA499D8C7B2
                                                            APIs
                                                            • WSAStartup.WSOCK32(00000101,?), ref: 00DE05BC
                                                            • inet_addr.WSOCK32(?), ref: 00DE061C
                                                            • gethostbyname.WSOCK32(?), ref: 00DE0628
                                                            • IcmpCreateFile.IPHLPAPI ref: 00DE0636
                                                            • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00DE06C6
                                                            • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00DE06E5
                                                            • IcmpCloseHandle.IPHLPAPI(?), ref: 00DE07B9
                                                            • WSACleanup.WSOCK32 ref: 00DE07BF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                            • String ID: Ping
                                                            • API String ID: 1028309954-2246546115
                                                            • Opcode ID: 94bcc5c363ca81030b67097baf2c38bd380b0028584da6f55e2238d3ccfd3793
                                                            • Instruction ID: db32e3560ebba31ffc5e54ef1bca413b2e8f7be257a8062ca471c5f5a4a6299b
                                                            • Opcode Fuzzy Hash: 94bcc5c363ca81030b67097baf2c38bd380b0028584da6f55e2238d3ccfd3793
                                                            • Instruction Fuzzy Hash: 36917E356042819FD720EF16C589F1ABBE0EF44318F188599E4A98B7A2D770ED85CFA1
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$BuffCharLower
                                                            • String ID: cdecl$none$stdcall$winapi
                                                            • API String ID: 707087890-567219261
                                                            • Opcode ID: be2115735cbcc622e312ef89ccb842282bebcb5bf92af923c4ec14df7881fd3c
                                                            • Instruction ID: 5a8fe636d55e13ab1fb56a5ccd81340c1f475d9214b82dea3a36f8c12361ab2e
                                                            • Opcode Fuzzy Hash: be2115735cbcc622e312ef89ccb842282bebcb5bf92af923c4ec14df7881fd3c
                                                            • Instruction Fuzzy Hash: D751C131A005569BCB24EF6DC9419BEB3A5FF64724B244229F46AE72C4DB31DD40E7B0
                                                            APIs
                                                            • CoInitialize.OLE32 ref: 00DE3774
                                                            • CoUninitialize.OLE32 ref: 00DE377F
                                                            • CoCreateInstance.OLE32(?,00000000,00000017,00DFFB78,?), ref: 00DE37D9
                                                            • IIDFromString.OLE32(?,?), ref: 00DE384C
                                                            • VariantInit.OLEAUT32(?), ref: 00DE38E4
                                                            • VariantClear.OLEAUT32(?), ref: 00DE3936
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                            • API String ID: 636576611-1287834457
                                                            • Opcode ID: c3747a3910145f2d3734c54e70141452c616fe6156ecde2f8b89b529c0d485c0
                                                            • Instruction ID: 651da0208f7d4f79ee51601933708e7449a0dedc5d7fb4157af9da04e18fc4b0
                                                            • Opcode Fuzzy Hash: c3747a3910145f2d3734c54e70141452c616fe6156ecde2f8b89b529c0d485c0
                                                            • Instruction Fuzzy Hash: B461AC71608341AFD310EF56D888B6ABBE8EF48714F04480DF9859B291D770EE48CBB2
                                                            APIs
                                                              • Part of subcall function 00D79BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00D79BB2
                                                              • Part of subcall function 00D7912D: GetCursorPos.USER32(?), ref: 00D79141
                                                              • Part of subcall function 00D7912D: ScreenToClient.USER32(00000000,?), ref: 00D7915E
                                                              • Part of subcall function 00D7912D: GetAsyncKeyState.USER32(00000001), ref: 00D79183
                                                              • Part of subcall function 00D7912D: GetAsyncKeyState.USER32(00000002), ref: 00D7919D
                                                            • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00DF8B6B
                                                            • ImageList_EndDrag.COMCTL32 ref: 00DF8B71
                                                            • ReleaseCapture.USER32 ref: 00DF8B77
                                                            • SetWindowTextW.USER32(?,00000000), ref: 00DF8C12
                                                            • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00DF8C25
                                                            • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00DF8CFF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                            • String ID: @GUI_DRAGFILE$@GUI_DROPID$p#
                                                            • API String ID: 1924731296-655930031
                                                            • Opcode ID: 99168079855505aeb08af4a5df023470da5cf0729c377ac60d8cb8f3c690cd1f
                                                            • Instruction ID: 14cbd355b2210ef81524079137ffd222f9bd74d050e9e7c646999cc3b5a80098
                                                            • Opcode Fuzzy Hash: 99168079855505aeb08af4a5df023470da5cf0729c377ac60d8cb8f3c690cd1f
                                                            • Instruction Fuzzy Hash: 72518C71204308AFD700DF14DD5ABBA7BE4EB88710F45452DFA96A72A1DB709918CB72
                                                            APIs
                                                            • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00DD33CF
                                                              • Part of subcall function 00D69CB3: _wcslen.LIBCMT ref: 00D69CBD
                                                            • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00DD33F0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: LoadString$_wcslen
                                                            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                            • API String ID: 4099089115-3080491070
                                                            • Opcode ID: 834a9c0a877386aaf0f760665a5cf14d33d63fb2fbc44ccfb1ea9d4cc2e0eb74
                                                            • Instruction ID: 64a7daded59c2d986e268fa531e16c21d1fd714cc976cb7935e55186e4a119a0
                                                            • Opcode Fuzzy Hash: 834a9c0a877386aaf0f760665a5cf14d33d63fb2fbc44ccfb1ea9d4cc2e0eb74
                                                            • Instruction Fuzzy Hash: 79518A7290020AABDF14EBA0DE56EEEB778EF14340F244166F505721A2EB316F58DB71
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$BuffCharUpper
                                                            • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                            • API String ID: 1256254125-769500911
                                                            • Opcode ID: 3f44512fa59a468ff7d36b0b7de46a0a6a88c87fe4dbbb5438efe037a2af10d2
                                                            • Instruction ID: 6770b7cb38451f63026b68bf0eacd791a296a3413b2e206b70468030b2893033
                                                            • Opcode Fuzzy Hash: 3f44512fa59a468ff7d36b0b7de46a0a6a88c87fe4dbbb5438efe037a2af10d2
                                                            • Instruction Fuzzy Hash: 98419932A401279BCB206E7DC992BBE77A5AB60774F29422FE465DB284E731CD41C770
                                                            APIs
                                                            • SetErrorMode.KERNEL32(00000001), ref: 00DD53A0
                                                            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00DD5416
                                                            • GetLastError.KERNEL32 ref: 00DD5420
                                                            • SetErrorMode.KERNEL32(00000000,READY), ref: 00DD54A7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Error$Mode$DiskFreeLastSpace
                                                            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                            • API String ID: 4194297153-14809454
                                                            • Opcode ID: 77977dedb239c0594b836344c7e5c790ca5f943fdd1c7818ef56656221d6d252
                                                            • Instruction ID: 6d0b02f4055e628327a5ca82151cfc12fa943712e73b9d9532a138807c2f85c4
                                                            • Opcode Fuzzy Hash: 77977dedb239c0594b836344c7e5c790ca5f943fdd1c7818ef56656221d6d252
                                                            • Instruction Fuzzy Hash: F631A535A006089FC710DF68E585EAABBB4EF45305F18806AE406DB396D771DD86CBB2
                                                            APIs
                                                            • CreateMenu.USER32 ref: 00DF3C79
                                                            • SetMenu.USER32(?,00000000), ref: 00DF3C88
                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00DF3D10
                                                            • IsMenu.USER32(?), ref: 00DF3D24
                                                            • CreatePopupMenu.USER32 ref: 00DF3D2E
                                                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00DF3D5B
                                                            • DrawMenuBar.USER32 ref: 00DF3D63
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                            • String ID: 0$F
                                                            • API String ID: 161812096-3044882817
                                                            • Opcode ID: 14340c50b1f162b50e72bde0a2545232c33a7f596691a09ecfb3e3fe3bc72f69
                                                            • Instruction ID: fff3946d6e2fc53a1bcb64375db11d29b87a50b5ea749cde90769cb7ec4d4362
                                                            • Opcode Fuzzy Hash: 14340c50b1f162b50e72bde0a2545232c33a7f596691a09ecfb3e3fe3bc72f69
                                                            • Instruction Fuzzy Hash: AD416C75A0130DEFDB14DF64E844AAA7BB5FF49350F168028EA46A7360D730AA15CF60
                                                            APIs
                                                              • Part of subcall function 00D69CB3: _wcslen.LIBCMT ref: 00D69CBD
                                                              • Part of subcall function 00DC3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00DC3CCA
                                                            • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00DC1F64
                                                            • GetDlgCtrlID.USER32 ref: 00DC1F6F
                                                            • GetParent.USER32 ref: 00DC1F8B
                                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00DC1F8E
                                                            • GetDlgCtrlID.USER32(?), ref: 00DC1F97
                                                            • GetParent.USER32(?), ref: 00DC1FAB
                                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00DC1FAE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                            • String ID: ComboBox$ListBox
                                                            • API String ID: 711023334-1403004172
                                                            • Opcode ID: b9e5ded7176f29fabc332a6a69b7de4fa6bb77716720c711b1ec586ebacbfa17
                                                            • Instruction ID: 0f7737b9336ace76d387ecb19db8f86c82cab56d8eb740ad5309bc474f97f3eb
                                                            • Opcode Fuzzy Hash: b9e5ded7176f29fabc332a6a69b7de4fa6bb77716720c711b1ec586ebacbfa17
                                                            • Instruction Fuzzy Hash: 1F21C575900218BBCF04AFA0DD55EFEBBB8EF16310B105119F951A72A1CB749924DB70
                                                            APIs
                                                              • Part of subcall function 00D69CB3: _wcslen.LIBCMT ref: 00D69CBD
                                                              • Part of subcall function 00DC3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00DC3CCA
                                                            • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 00DC2043
                                                            • GetDlgCtrlID.USER32 ref: 00DC204E
                                                            • GetParent.USER32 ref: 00DC206A
                                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00DC206D
                                                            • GetDlgCtrlID.USER32(?), ref: 00DC2076
                                                            • GetParent.USER32(?), ref: 00DC208A
                                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00DC208D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                            • String ID: ComboBox$ListBox
                                                            • API String ID: 711023334-1403004172
                                                            • Opcode ID: fc3a4079cfa84114ed173a2bc9b7c11b3cfad736433558753817e11f9620372a
                                                            • Instruction ID: 91719fe82fc9e39b048fec01100853a92bb27a78a4789731279ac469d156bae3
                                                            • Opcode Fuzzy Hash: fc3a4079cfa84114ed173a2bc9b7c11b3cfad736433558753817e11f9620372a
                                                            • Instruction Fuzzy Hash: F521C6B5900218BBCF10AFA0DD45EFEBBB8EF15340F10541AF951E72A1DA758925DB70
                                                            APIs
                                                            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00DF3A9D
                                                            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00DF3AA0
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00DF3AC7
                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00DF3AEA
                                                            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00DF3B62
                                                            • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00DF3BAC
                                                            • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00DF3BC7
                                                            • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00DF3BE2
                                                            • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00DF3BF6
                                                            • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00DF3C13
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$LongWindow
                                                            • String ID:
                                                            • API String ID: 312131281-0
                                                            • Opcode ID: b77cdeebc84cdb537b76af5b13fb08b49e14215a3f6ce2a630f53ab870addd58
                                                            • Instruction ID: 6ccb8c60ccb40823321a4a017ee780db429c4bb378af47a94c1eae491d483422
                                                            • Opcode Fuzzy Hash: b77cdeebc84cdb537b76af5b13fb08b49e14215a3f6ce2a630f53ab870addd58
                                                            • Instruction Fuzzy Hash: CD616875A00248AFDB10DFA8CC85EFE77B8EB49700F158199FA15E72A1C770AE45DB60
                                                            APIs
                                                            • GetCurrentThreadId.KERNEL32 ref: 00DCB151
                                                            • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00DCA1E1,?,00000001), ref: 00DCB165
                                                            • GetWindowThreadProcessId.USER32(00000000), ref: 00DCB16C
                                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00DCA1E1,?,00000001), ref: 00DCB17B
                                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 00DCB18D
                                                            • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00DCA1E1,?,00000001), ref: 00DCB1A6
                                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00DCA1E1,?,00000001), ref: 00DCB1B8
                                                            • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00DCA1E1,?,00000001), ref: 00DCB1FD
                                                            • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00DCA1E1,?,00000001), ref: 00DCB212
                                                            • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00DCA1E1,?,00000001), ref: 00DCB21D
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                            • String ID:
                                                            • API String ID: 2156557900-0
                                                            • Opcode ID: 959f4b93c9c0ccb7749e9f736237b2864e8f171a2372a78d43b32db207ec445a
                                                            • Instruction ID: fa07e2313d500718cda2b00308c61a2e979b979863afcc75457941cdbc6aec8d
                                                            • Opcode Fuzzy Hash: 959f4b93c9c0ccb7749e9f736237b2864e8f171a2372a78d43b32db207ec445a
                                                            • Instruction Fuzzy Hash: 4D317F71510309AFDB249F25DD4AF79BBAAAB51321F18900AF901E72A0D7B4DE44CF74
                                                            APIs
                                                            • _free.LIBCMT ref: 00D92C94
                                                              • Part of subcall function 00D929C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00D9D7D1,00000000,00000000,00000000,00000000,?,00D9D7F8,00000000,00000007,00000000,?,00D9DBF5,00000000), ref: 00D929DE
                                                              • Part of subcall function 00D929C8: GetLastError.KERNEL32(00000000,?,00D9D7D1,00000000,00000000,00000000,00000000,?,00D9D7F8,00000000,00000007,00000000,?,00D9DBF5,00000000,00000000), ref: 00D929F0
                                                            • _free.LIBCMT ref: 00D92CA0
                                                            • _free.LIBCMT ref: 00D92CAB
                                                            • _free.LIBCMT ref: 00D92CB6
                                                            • _free.LIBCMT ref: 00D92CC1
                                                            • _free.LIBCMT ref: 00D92CCC
                                                            • _free.LIBCMT ref: 00D92CD7
                                                            • _free.LIBCMT ref: 00D92CE2
                                                            • _free.LIBCMT ref: 00D92CED
                                                            • _free.LIBCMT ref: 00D92CFB
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _free$ErrorFreeHeapLast
                                                            • String ID:
                                                            • API String ID: 776569668-0
                                                            • Opcode ID: 624406e7b5ca8c20a8a2b55fcd84adc195d6a64a7d7d4b0f92a079c5fb27e7c4
                                                            • Instruction ID: 55165ccbf5287b6433abb1cc6a4a71c0502c33a80a65b136c743e3f0888b3a03
                                                            • Opcode Fuzzy Hash: 624406e7b5ca8c20a8a2b55fcd84adc195d6a64a7d7d4b0f92a079c5fb27e7c4
                                                            • Instruction Fuzzy Hash: A4112D76550108BFCF02EF94D982CAD3BA9FF05350F9545A5FA489B222DB31EA509FB0
                                                            APIs
                                                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00DD7FAD
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00DD7FC1
                                                            • GetFileAttributesW.KERNEL32(?), ref: 00DD7FEB
                                                            • SetFileAttributesW.KERNEL32(?,00000000), ref: 00DD8005
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00DD8017
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00DD8060
                                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00DD80B0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CurrentDirectory$AttributesFile
                                                            • String ID: *.*
                                                            • API String ID: 769691225-438819550
                                                            • Opcode ID: 269a73285f3a409e2f1e399bea9c1c5680b9ad953d67db67b1222694ccfbedea
                                                            • Instruction ID: 462a3476e7bbfaae918d2e179c5246efd2746ac8ae27feab0af636c14e726e03
                                                            • Opcode Fuzzy Hash: 269a73285f3a409e2f1e399bea9c1c5680b9ad953d67db67b1222694ccfbedea
                                                            • Instruction Fuzzy Hash: 9A818E725082469BCB20EF54C844ABAB3E8EF88314F18489FF885D7350EB34DD499B72
                                                            APIs
                                                            • SetWindowLongW.USER32(?,000000EB), ref: 00D65C7A
                                                              • Part of subcall function 00D65D0A: GetClientRect.USER32(?,?), ref: 00D65D30
                                                              • Part of subcall function 00D65D0A: GetWindowRect.USER32(?,?), ref: 00D65D71
                                                              • Part of subcall function 00D65D0A: ScreenToClient.USER32(?,?), ref: 00D65D99
                                                            • GetDC.USER32 ref: 00DA46F5
                                                            • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00DA4708
                                                            • SelectObject.GDI32(00000000,00000000), ref: 00DA4716
                                                            • SelectObject.GDI32(00000000,00000000), ref: 00DA472B
                                                            • ReleaseDC.USER32(?,00000000), ref: 00DA4733
                                                            • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00DA47C4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                            • String ID: U
                                                            • API String ID: 4009187628-3372436214
                                                            • Opcode ID: bf4d5d99d5e21087e3911260a26d0af0742cbd650ab0bfc2f961ee5f8d01a14c
                                                            • Instruction ID: 159987cbbd6a215d5d7bfcfdd76ea36dfde149566beaa25749d4f9a7372445af
                                                            • Opcode Fuzzy Hash: bf4d5d99d5e21087e3911260a26d0af0742cbd650ab0bfc2f961ee5f8d01a14c
                                                            • Instruction Fuzzy Hash: 4271C231400249DFCF218F64D984AFA7BB5FF86360F1C4269E9555A26AC7B1C891DFB0
                                                            APIs
                                                            • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00DD35E4
                                                              • Part of subcall function 00D69CB3: _wcslen.LIBCMT ref: 00D69CBD
                                                            • LoadStringW.USER32(00E32390,?,00000FFF,?), ref: 00DD360A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: LoadString$_wcslen
                                                            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                            • API String ID: 4099089115-2391861430
                                                            • Opcode ID: cf7286540f8d38f6e510f5fd7ca2222bd1ab70f965ccc89e418f897172003f19
                                                            • Instruction ID: 8b47e3d75a3d37ddf9ea05d32f5fc85d18f20694fd1fdcf88d12a8a16fa07d3b
                                                            • Opcode Fuzzy Hash: cf7286540f8d38f6e510f5fd7ca2222bd1ab70f965ccc89e418f897172003f19
                                                            • Instruction Fuzzy Hash: 5D515F72800219BBDF14EBA0DD56EEDBB78EF14300F145165F105721A1EB315A99DF71
                                                            APIs
                                                            • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00DDC272
                                                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00DDC29A
                                                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00DDC2CA
                                                            • GetLastError.KERNEL32 ref: 00DDC322
                                                            • SetEvent.KERNEL32(?), ref: 00DDC336
                                                            • InternetCloseHandle.WININET(00000000), ref: 00DDC341
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                            • String ID:
                                                            • API String ID: 3113390036-3916222277
                                                            • Opcode ID: 15caa7ba0f470a5eec99f9d11fdd248997dd81ace2d436af329e526d1d44f712
                                                            • Instruction ID: 298cd9b06b6143815408f3fe6de40b19b6723a2672023e3f425cd2eccdb5da3b
                                                            • Opcode Fuzzy Hash: 15caa7ba0f470a5eec99f9d11fdd248997dd81ace2d436af329e526d1d44f712
                                                            • Instruction Fuzzy Hash: 6C315AB1620309AFDB21AF658988ABB7AFCEB49744F14951AF486D2310DB30ED04DB70
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00DA3AAF,?,?,Bad directive syntax error,00DFCC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00DC98BC
                                                            • LoadStringW.USER32(00000000,?,00DA3AAF,?), ref: 00DC98C3
                                                              • Part of subcall function 00D69CB3: _wcslen.LIBCMT ref: 00D69CBD
                                                            • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00DC9987
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: HandleLoadMessageModuleString_wcslen
                                                            • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                            • API String ID: 858772685-4153970271
                                                            • Opcode ID: 5f32b81942301c8116885e34a0c1d5e88ee632a8000feed5e811f7be6f56d0b9
                                                            • Instruction ID: de42a2ce04d36a6171f00891d34757a77913243f96c61f3d60de8836d1ca64cf
                                                            • Opcode Fuzzy Hash: 5f32b81942301c8116885e34a0c1d5e88ee632a8000feed5e811f7be6f56d0b9
                                                            • Instruction Fuzzy Hash: 3A214D3280021EABCF15AF90CC1AEEEB779FF18700F045469F515661A2EB719628DB71
                                                            APIs
                                                            • GetParent.USER32 ref: 00DC20AB
                                                            • GetClassNameW.USER32(00000000,?,00000100), ref: 00DC20C0
                                                            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00DC214D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ClassMessageNameParentSend
                                                            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                            • API String ID: 1290815626-3381328864
                                                            • Opcode ID: faa11994eab5dd0bd06599f24e9bda4ca8cade61a082942b39f6cb7effcdcd5b
                                                            • Instruction ID: 55f71347ae4d9583223b98abc1063b5b085254850ef6408a4095bf4d567e3202
                                                            • Opcode Fuzzy Hash: faa11994eab5dd0bd06599f24e9bda4ca8cade61a082942b39f6cb7effcdcd5b
                                                            • Instruction Fuzzy Hash: 801106776C8717B9FA153620EC07EB6379CDF04728B24502AFB04FA0E1EE71A8115A34
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3cd456a7b9136683d797e4afa8fe8a421064628b25f06de2a6a300a5fb02b5ef
                                                            • Instruction ID: 2f153a27619bd9a86bcdfe5bf05382aba105690c555a22ef20f17ebb4aab1e51
                                                            • Opcode Fuzzy Hash: 3cd456a7b9136683d797e4afa8fe8a421064628b25f06de2a6a300a5fb02b5ef
                                                            • Instruction Fuzzy Hash: 50C1DD74A04349AFDF11EFADC855BADBBB0AF4A310F084199F869A7392C7319941CB71
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                            • String ID:
                                                            • API String ID: 1282221369-0
                                                            • Opcode ID: 48439915d973f27c4ad11a08f6397cf8187da77137ef26f6b55e6f7435689532
                                                            • Instruction ID: 12fcfcb381fed1ad6f043c517526b7bfe96a5a0434d5637731235e9f4929ab32
                                                            • Opcode Fuzzy Hash: 48439915d973f27c4ad11a08f6397cf8187da77137ef26f6b55e6f7435689532
                                                            • Instruction Fuzzy Hash: 71612371A16304BFDF21EFB49895A7A7BE6EF05360F08416DF949A7282E7319D0187B0
                                                            APIs
                                                            • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00DF5186
                                                            • ShowWindow.USER32(?,00000000), ref: 00DF51C7
                                                            • ShowWindow.USER32(?,00000005,?,00000000), ref: 00DF51CD
                                                            • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00DF51D1
                                                              • Part of subcall function 00DF6FBA: DeleteObject.GDI32(00000000), ref: 00DF6FE6
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00DF520D
                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00DF521A
                                                            • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00DF524D
                                                            • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00DF5287
                                                            • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00DF5296
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                            • String ID:
                                                            • API String ID: 3210457359-0
                                                            • Opcode ID: 30fb7edba381e961fadf8caf96a4f3989189abcb34e5cbc8038f015714a53767
                                                            • Instruction ID: d56151da2ea7139de75ab14b79db872020475719fd643e945e101f7cfbc9a5d8
                                                            • Opcode Fuzzy Hash: 30fb7edba381e961fadf8caf96a4f3989189abcb34e5cbc8038f015714a53767
                                                            • Instruction Fuzzy Hash: 3F518030A50A0DBEEF209F24EC49BB87B65EF05325F19C211F7199A2E4C375A990DB74
                                                            APIs
                                                            • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00DB6890
                                                            • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00DB68A9
                                                            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00DB68B9
                                                            • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00DB68D1
                                                            • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00DB68F2
                                                            • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00D78874,00000000,00000000,00000000,000000FF,00000000), ref: 00DB6901
                                                            • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00DB691E
                                                            • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00D78874,00000000,00000000,00000000,000000FF,00000000), ref: 00DB692D
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                            • String ID:
                                                            • API String ID: 1268354404-0
                                                            • Opcode ID: defab03e701e0f5dc5a11cb6793a7eec16cbfdfe16460fc4f635d5c3bac7e5dd
                                                            • Instruction ID: 978ad52841d158124cc775476987467ac274f1d5bd75a5e87599f64c48aad084
                                                            • Opcode Fuzzy Hash: defab03e701e0f5dc5a11cb6793a7eec16cbfdfe16460fc4f635d5c3bac7e5dd
                                                            • Instruction Fuzzy Hash: DF516970600309EFDB20CF25CC59FAA7BB5EB48750F148528F95AD72A0EB74E950EB60
                                                            APIs
                                                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00DDC182
                                                            • GetLastError.KERNEL32 ref: 00DDC195
                                                            • SetEvent.KERNEL32(?), ref: 00DDC1A9
                                                              • Part of subcall function 00DDC253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00DDC272
                                                              • Part of subcall function 00DDC253: GetLastError.KERNEL32 ref: 00DDC322
                                                              • Part of subcall function 00DDC253: SetEvent.KERNEL32(?), ref: 00DDC336
                                                              • Part of subcall function 00DDC253: InternetCloseHandle.WININET(00000000), ref: 00DDC341
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                            • String ID:
                                                            • API String ID: 337547030-0
                                                            • Opcode ID: b289b3c67875bd86670c639cee188b3e655ca0746161ddd7819bb2a249849718
                                                            • Instruction ID: dbe499d18e0598a1476aba40c1c57b5ebd21c97f3f2b21eaa4021c55a8bbcea5
                                                            • Opcode Fuzzy Hash: b289b3c67875bd86670c639cee188b3e655ca0746161ddd7819bb2a249849718
                                                            • Instruction Fuzzy Hash: 1D315871220706AFDB219FA59D44A76BBE9FF18300F14A41EF95AC6720D731E824DBB4
                                                            APIs
                                                              • Part of subcall function 00DC3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00DC3A57
                                                              • Part of subcall function 00DC3A3D: GetCurrentThreadId.KERNEL32 ref: 00DC3A5E
                                                              • Part of subcall function 00DC3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00DC25B3), ref: 00DC3A65
                                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00DC25BD
                                                            • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00DC25DB
                                                            • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00DC25DF
                                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00DC25E9
                                                            • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00DC2601
                                                            • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00DC2605
                                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00DC260F
                                                            • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00DC2623
                                                            • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00DC2627
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                            • String ID:
                                                            • API String ID: 2014098862-0
                                                            • Opcode ID: db3113a297e3a4a6240102e00e01277139288d9602fa3bc8be713fe727e2b425
                                                            • Instruction ID: 35339398163cfbf75857de23f7889f784923a65c117bee9715d3858488fd37a3
                                                            • Opcode Fuzzy Hash: db3113a297e3a4a6240102e00e01277139288d9602fa3bc8be713fe727e2b425
                                                            • Instruction Fuzzy Hash: B701B1303A4314BBFB1067689C8AF693E59DF5AB12F105005F358EF1E1C9E26464CA79
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00DC1449,?,?,00000000), ref: 00DC180C
                                                            • HeapAlloc.KERNEL32(00000000,?,00DC1449,?,?,00000000), ref: 00DC1813
                                                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00DC1449,?,?,00000000), ref: 00DC1828
                                                            • GetCurrentProcess.KERNEL32(?,00000000,?,00DC1449,?,?,00000000), ref: 00DC1830
                                                            • DuplicateHandle.KERNEL32(00000000,?,00DC1449,?,?,00000000), ref: 00DC1833
                                                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00DC1449,?,?,00000000), ref: 00DC1843
                                                            • GetCurrentProcess.KERNEL32(00DC1449,00000000,?,00DC1449,?,?,00000000), ref: 00DC184B
                                                            • DuplicateHandle.KERNEL32(00000000,?,00DC1449,?,?,00000000), ref: 00DC184E
                                                            • CreateThread.KERNEL32(00000000,00000000,00DC1874,00000000,00000000,00000000), ref: 00DC1868
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                            • String ID:
                                                            • API String ID: 1957940570-0
                                                            • Opcode ID: 5a88023305acc400efaced2bb316e5a4e68aec9b15eb7eb54f80e44003a1b9f3
                                                            • Instruction ID: db044664d33bf6df44df7ed1137416d1b34a5c06630ee0d29be1e59aaebb0c53
                                                            • Opcode Fuzzy Hash: 5a88023305acc400efaced2bb316e5a4e68aec9b15eb7eb54f80e44003a1b9f3
                                                            • Instruction Fuzzy Hash: BB01BF75250308BFE710AB65DD4DF673BACEB89B11F009411FA05DB291C6709824DB70
                                                            APIs
                                                              • Part of subcall function 00DCD4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00DCD501
                                                              • Part of subcall function 00DCD4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00DCD50F
                                                              • Part of subcall function 00DCD4DC: CloseHandle.KERNELBASE(00000000), ref: 00DCD5DC
                                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00DEA16D
                                                            • GetLastError.KERNEL32 ref: 00DEA180
                                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00DEA1B3
                                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 00DEA268
                                                            • GetLastError.KERNEL32(00000000), ref: 00DEA273
                                                            • CloseHandle.KERNEL32(00000000), ref: 00DEA2C4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                            • String ID: SeDebugPrivilege
                                                            • API String ID: 2533919879-2896544425
                                                            • Opcode ID: 6d242514f7f1d852a20f9a9bd01e6065bd183d6fd077f954dd41ca497b04158d
                                                            • Instruction ID: 8395336ed380da2f62d42ca25a8b089bc10d2228833e316a49f9ed3cd608e05a
                                                            • Opcode Fuzzy Hash: 6d242514f7f1d852a20f9a9bd01e6065bd183d6fd077f954dd41ca497b04158d
                                                            • Instruction Fuzzy Hash: E0617C302082829FD710EF19C494F25BBE1AF44318F19849CE5669B7A3C776FC45CBA6
                                                            APIs
                                                            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00DF3925
                                                            • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00DF393A
                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00DF3954
                                                            • _wcslen.LIBCMT ref: 00DF3999
                                                            • SendMessageW.USER32(?,00001057,00000000,?), ref: 00DF39C6
                                                            • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00DF39F4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Window_wcslen
                                                            • String ID: SysListView32
                                                            • API String ID: 2147712094-78025650
                                                            • Opcode ID: fbed67b02245e2431ddfde45fd883d84d619a6ee4080cf24d5607aa2b7ccfce0
                                                            • Instruction ID: 380d506fe568de2ce5031bf84cafadd46c75af6ea3b88557f69c27aceddd50af
                                                            • Opcode Fuzzy Hash: fbed67b02245e2431ddfde45fd883d84d619a6ee4080cf24d5607aa2b7ccfce0
                                                            • Instruction Fuzzy Hash: 1141D631A0031CABDF219F64CC45BFA77A9EF08350F164126FA48E7291D3B0D990CBA0
                                                            APIs
                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00DCBCFD
                                                            • IsMenu.USER32(00000000), ref: 00DCBD1D
                                                            • CreatePopupMenu.USER32 ref: 00DCBD53
                                                            • GetMenuItemCount.USER32(00F452B0), ref: 00DCBDA4
                                                            • InsertMenuItemW.USER32(00F452B0,?,00000001,00000030), ref: 00DCBDCC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                            • String ID: 0$2
                                                            • API String ID: 93392585-3793063076
                                                            • Opcode ID: bff77172ca65090e45ddb2aa0179e11c2862dd9e0814f197bc033f5ab97e2e10
                                                            • Instruction ID: c5f4f252e1c8ab30902941181a941d8a0314281634177eb474f85f784191f07b
                                                            • Opcode Fuzzy Hash: bff77172ca65090e45ddb2aa0179e11c2862dd9e0814f197bc033f5ab97e2e10
                                                            • Instruction Fuzzy Hash: 4F517B7060020A9BDF10DFA8D986FAEBBE8AF45324F18825EE44397290E770D945CB71
                                                            APIs
                                                            • LoadIconW.USER32(00000000,00007F03), ref: 00DCC913
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: IconLoad
                                                            • String ID: blank$info$question$stop$warning
                                                            • API String ID: 2457776203-404129466
                                                            • Opcode ID: fb3f3cfb02e2c54cf6baf45a003f9d190bb9ad2e4f6d9599c64178619d8a4a17
                                                            • Instruction ID: ab729dbb24b9ff2edd86eda84076abee0b1ffa739769cf2c6ee2989d55bb98b2
                                                            • Opcode Fuzzy Hash: fb3f3cfb02e2c54cf6baf45a003f9d190bb9ad2e4f6d9599c64178619d8a4a17
                                                            • Instruction Fuzzy Hash: BE112B31699317BAE704AB14AC82EAB27ACDF15359B24202FF608A7282DB709D005774
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                            • String ID: 0.0.0.0
                                                            • API String ID: 642191829-3771769585
                                                            • Opcode ID: b74effc770786fe5ededecf466aa6d8a13b9fef17d403cc0e3117a83aff2c9aa
                                                            • Instruction ID: b57f8cae125122f1b411a36d6e1ad60d673f3c645dc1b8b3be5151945f7fa9d1
                                                            • Opcode Fuzzy Hash: b74effc770786fe5ededecf466aa6d8a13b9fef17d403cc0e3117a83aff2c9aa
                                                            • Instruction Fuzzy Hash: 9811D27190421AAFCB24BB209C0AEEA77ADDB15710F05017EF589E7191EF708A85CBB0
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$LocalTime
                                                            • String ID:
                                                            • API String ID: 952045576-0
                                                            • Opcode ID: 1170a4b9e2229205df91629395b7b5794dddb7950ce40ca31c8a0a3fa8f776a2
                                                            • Instruction ID: f55acb6de7d01afe3d08fe3756fa839e7a93bddf870274e03aeb7094b5ac676d
                                                            • Opcode Fuzzy Hash: 1170a4b9e2229205df91629395b7b5794dddb7950ce40ca31c8a0a3fa8f776a2
                                                            • Instruction Fuzzy Hash: AB41A165C1021976CB21FBB4888AACFB7ACEF45310F508566F518E3162FB34E255C7B9
                                                            APIs
                                                            • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00DB682C,00000004,00000000,00000000), ref: 00D7F953
                                                            • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00DB682C,00000004,00000000,00000000), ref: 00DBF3D1
                                                            • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00DB682C,00000004,00000000,00000000), ref: 00DBF454
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ShowWindow
                                                            • String ID:
                                                            • API String ID: 1268545403-0
                                                            • Opcode ID: 19e303c87a26862534ab4ec6845c960ab77a6b3d95babf2291a7dc80d764bd04
                                                            • Instruction ID: 08879c655d72d11729f1ca72010ce9da610b47eef783d655b047f5e4c7fd46ee
                                                            • Opcode Fuzzy Hash: 19e303c87a26862534ab4ec6845c960ab77a6b3d95babf2291a7dc80d764bd04
                                                            • Instruction Fuzzy Hash: 0341B631518784FAC7399B298D8877E7A91AB55314F18D43CE29F96661E7319880CF31
                                                            APIs
                                                            • DeleteObject.GDI32(00000000), ref: 00DF2D1B
                                                            • GetDC.USER32(00000000), ref: 00DF2D23
                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00DF2D2E
                                                            • ReleaseDC.USER32(00000000,00000000), ref: 00DF2D3A
                                                            • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00DF2D76
                                                            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00DF2D87
                                                            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00DF5A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00DF2DC2
                                                            • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00DF2DE1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                            • String ID:
                                                            • API String ID: 3864802216-0
                                                            • Opcode ID: ae696a6e2acb65ee249990ac706ed5e181679e2c023a10c2e0b4083db53a3f0e
                                                            • Instruction ID: 2f81449017b2b729d2cf15e263abeda47ec5516e31f7ffef7596cb1becb454d2
                                                            • Opcode Fuzzy Hash: ae696a6e2acb65ee249990ac706ed5e181679e2c023a10c2e0b4083db53a3f0e
                                                            • Instruction Fuzzy Hash: 0E316B72211618BBEB118F50CD8AFFB3BA9EF09715F088055FE08DA2A1D6759C51CBB4
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _memcmp
                                                            • String ID:
                                                            • API String ID: 2931989736-0
                                                            • Opcode ID: e396d92be4e0099b11ce6a8f75dde6ba856fc3504969ef2b6c1f77f96fcc0cf3
                                                            • Instruction ID: 105a01d8932454da81ac9465d977c0a88e4bb2dca106c5a9418e17844e8fc92e
                                                            • Opcode Fuzzy Hash: e396d92be4e0099b11ce6a8f75dde6ba856fc3504969ef2b6c1f77f96fcc0cf3
                                                            • Instruction Fuzzy Hash: 3521C965680A1A7BD614A720AD82FFB335CEF21384F484028FE059B585F721FD9982B9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: NULL Pointer assignment$Not an Object type
                                                            • API String ID: 0-572801152
                                                            • Opcode ID: 3fb721364a88490a922541310c80b84ea30e435890bc95b0b491b9d19c7df993
                                                            • Instruction ID: ea8915cdbd37c0c86ef8ed9393b3afad416dacca0d2890fe630de1efa9dd2555
                                                            • Opcode Fuzzy Hash: 3fb721364a88490a922541310c80b84ea30e435890bc95b0b491b9d19c7df993
                                                            • Instruction Fuzzy Hash: 1DD1A071A0074A9FDF10DF99D880BAEB7B5BF48388F188069E915AB285D770DD45CBB0
                                                            APIs
                                                            • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,00DA17FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 00DA15CE
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00DA17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00DA1651
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00DA17FB,?,00DA17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00DA16E4
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00DA17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00DA16FB
                                                              • Part of subcall function 00D93820: RtlAllocateHeap.NTDLL(00000000,?,00E31444,?,00D7FDF5,?,?,00D6A976,00000010,00E31440,00D613FC,?,00D613C6,?,00D61129), ref: 00D93852
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00DA17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00DA1777
                                                            • __freea.LIBCMT ref: 00DA17A2
                                                            • __freea.LIBCMT ref: 00DA17AE
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                            • String ID:
                                                            • API String ID: 2829977744-0
                                                            • Opcode ID: edc1e968236dd8e03741376479dd0aaf1cc5d95451844b976a733371c0656cc3
                                                            • Instruction ID: bd27e89e7a38f330ed719eecf2bb232376724feeeac6972979aa364185c3dcef
                                                            • Opcode Fuzzy Hash: edc1e968236dd8e03741376479dd0aaf1cc5d95451844b976a733371c0656cc3
                                                            • Instruction Fuzzy Hash: 8891A179E042169ADF249F64C881AEE7BB5EF4A310F1C5659E802E7181E735DC44CB70
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Variant$ClearInit
                                                            • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                            • API String ID: 2610073882-625585964
                                                            • Opcode ID: 370a9ea4a2d45253fc9ac269970dad3284f2b5996b3db05229368c90163b434f
                                                            • Instruction ID: fefd4ace91f69131ad92bceba285263697ad9f0db2226309b5e2a49413f56412
                                                            • Opcode Fuzzy Hash: 370a9ea4a2d45253fc9ac269970dad3284f2b5996b3db05229368c90163b434f
                                                            • Instruction Fuzzy Hash: 6F91A071A00259ABDF20EFA6D844FAEBBB8EF86714F148559F505AB280D7709941CFF0
                                                            APIs
                                                            • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 00DD125C
                                                            • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00DD1284
                                                            • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 00DD12A8
                                                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00DD12D8
                                                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00DD135F
                                                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00DD13C4
                                                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00DD1430
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                            • String ID:
                                                            • API String ID: 2550207440-0
                                                            • Opcode ID: 02d092c081baa13578d509f34a611f1f49585063b0bf73be31f81166d67943cb
                                                            • Instruction ID: 76e880457fd75fa4580be1e6e029b88f17365b813201545445c08042c65f1b2a
                                                            • Opcode Fuzzy Hash: 02d092c081baa13578d509f34a611f1f49585063b0bf73be31f81166d67943cb
                                                            • Instruction Fuzzy Hash: A391BF79A00208AFDB109F98C885BBE7BB5FF45314F14802AE940E7391D775A945CBB4
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ObjectSelect$BeginCreatePath
                                                            • String ID:
                                                            • API String ID: 3225163088-0
                                                            • Opcode ID: 5770346c43ae62b03802de3438400479d1f77d04af7367ff7e9c7e1f67c6a1ef
                                                            • Instruction ID: 0a9538ac93a1e503a7957d4ddf21a22722d7784e044c30cdaac04912b5857b73
                                                            • Opcode Fuzzy Hash: 5770346c43ae62b03802de3438400479d1f77d04af7367ff7e9c7e1f67c6a1ef
                                                            • Instruction Fuzzy Hash: A6911572D04219EFCB10CFA9C894AEEBBB8FF89320F148559E515B7251E774A942CB70
                                                            APIs
                                                            • VariantInit.OLEAUT32(?), ref: 00DE396B
                                                            • CharUpperBuffW.USER32(?,?), ref: 00DE3A7A
                                                            • _wcslen.LIBCMT ref: 00DE3A8A
                                                            • VariantClear.OLEAUT32(?), ref: 00DE3C1F
                                                              • Part of subcall function 00DD0CDF: VariantInit.OLEAUT32(00000000), ref: 00DD0D1F
                                                              • Part of subcall function 00DD0CDF: VariantCopy.OLEAUT32(?,?), ref: 00DD0D28
                                                              • Part of subcall function 00DD0CDF: VariantClear.OLEAUT32(?), ref: 00DD0D34
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                            • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                            • API String ID: 4137639002-1221869570
                                                            • Opcode ID: c07513c3ea7aa5902263dc088e1e7ede471072b780c764fefa2cbd3a1c83571b
                                                            • Instruction ID: d472e8d898dd52d2d9d63d01c2fe25204c1bd91650c90e2592c60a0c56497ffe
                                                            • Opcode Fuzzy Hash: c07513c3ea7aa5902263dc088e1e7ede471072b780c764fefa2cbd3a1c83571b
                                                            • Instruction Fuzzy Hash: BE9167746083459FC714EF29C48596AB7E4FF88314F14886EF88A9B351DB31EE45CBA2
                                                            APIs
                                                              • Part of subcall function 00DC000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DBFF41,80070057,?,?,?,00DC035E), ref: 00DC002B
                                                              • Part of subcall function 00DC000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DBFF41,80070057,?,?), ref: 00DC0046
                                                              • Part of subcall function 00DC000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DBFF41,80070057,?,?), ref: 00DC0054
                                                              • Part of subcall function 00DC000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DBFF41,80070057,?), ref: 00DC0064
                                                            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00DE4C51
                                                            • _wcslen.LIBCMT ref: 00DE4D59
                                                            • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00DE4DCF
                                                            • CoTaskMemFree.OLE32(?), ref: 00DE4DDA
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                            • String ID: NULL Pointer assignment
                                                            • API String ID: 614568839-2785691316
                                                            • Opcode ID: 22d10836a35e325d787aa798320bfb5997f3b98e164a03f756b4f41599795363
                                                            • Instruction ID: 9939086fa9fa7690bd0d95e3fcf5eabefa243f682bd8d594c99e97a02a27791c
                                                            • Opcode Fuzzy Hash: 22d10836a35e325d787aa798320bfb5997f3b98e164a03f756b4f41599795363
                                                            • Instruction Fuzzy Hash: F391F471D00259ABDF14EFA5C891AEEB7B9FF08314F10816AE915A7251EB709A44CFB0
                                                            APIs
                                                            • GetMenu.USER32(?), ref: 00DF2183
                                                            • GetMenuItemCount.USER32(00000000), ref: 00DF21B5
                                                            • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00DF21DD
                                                            • _wcslen.LIBCMT ref: 00DF2213
                                                            • GetMenuItemID.USER32(?,?), ref: 00DF224D
                                                            • GetSubMenu.USER32(?,?), ref: 00DF225B
                                                              • Part of subcall function 00DC3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00DC3A57
                                                              • Part of subcall function 00DC3A3D: GetCurrentThreadId.KERNEL32 ref: 00DC3A5E
                                                              • Part of subcall function 00DC3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00DC25B3), ref: 00DC3A65
                                                            • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00DF22E3
                                                              • Part of subcall function 00DCE97B: Sleep.KERNEL32 ref: 00DCE9F3
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                            • String ID:
                                                            • API String ID: 4196846111-0
                                                            • Opcode ID: 16f1775ac7bb055d1dc430c070606c2ae9f8fa6e066d897d93374b637494efc1
                                                            • Instruction ID: e14399f53fe3a344aeecda6979e7f685f789ccf88c5eadd331a4d1f69fbca4ee
                                                            • Opcode Fuzzy Hash: 16f1775ac7bb055d1dc430c070606c2ae9f8fa6e066d897d93374b637494efc1
                                                            • Instruction Fuzzy Hash: 09714C75A00209AFCB14DFA4C885ABEB7F5EF88310F15C459E956EB351DB34EA418BB0
                                                            APIs
                                                            • IsWindow.USER32(00F451E8), ref: 00DF7F37
                                                            • IsWindowEnabled.USER32(00F451E8), ref: 00DF7F43
                                                            • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00DF801E
                                                            • SendMessageW.USER32(00F451E8,000000B0,?,?), ref: 00DF8051
                                                            • IsDlgButtonChecked.USER32(?,?), ref: 00DF8089
                                                            • GetWindowLongW.USER32(00F451E8,000000EC), ref: 00DF80AB
                                                            • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00DF80C3
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                            • String ID:
                                                            • API String ID: 4072528602-0
                                                            • Opcode ID: ce5c8ba558632cf8c3f1adfe74efba2fa8696866ad34b514ce3068c8a903178e
                                                            • Instruction ID: 48b45e94605aec96fbf0c29a9681a409dbaae1942800c800a1f4a632df02c908
                                                            • Opcode Fuzzy Hash: ce5c8ba558632cf8c3f1adfe74efba2fa8696866ad34b514ce3068c8a903178e
                                                            • Instruction Fuzzy Hash: 8D71903460824DAFEB219F54CC84FFABBB5EF09300F198499EA4597261CB31A855DB31
                                                            APIs
                                                            • GetParent.USER32(?), ref: 00DCAEF9
                                                            • GetKeyboardState.USER32(?), ref: 00DCAF0E
                                                            • SetKeyboardState.USER32(?), ref: 00DCAF6F
                                                            • PostMessageW.USER32(?,00000101,00000010,?), ref: 00DCAF9D
                                                            • PostMessageW.USER32(?,00000101,00000011,?), ref: 00DCAFBC
                                                            • PostMessageW.USER32(?,00000101,00000012,?), ref: 00DCAFFD
                                                            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00DCB020
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessagePost$KeyboardState$Parent
                                                            • String ID:
                                                            • API String ID: 87235514-0
                                                            • Opcode ID: b673fc309805388d5392f47d54602d0d90bb83d44f62ab21c3c05b27f2e32db3
                                                            • Instruction ID: 2f64e53aa6c7a87bbcaff7f316e74d7d5d6384ed178c685b4c877e40db3ac391
                                                            • Opcode Fuzzy Hash: b673fc309805388d5392f47d54602d0d90bb83d44f62ab21c3c05b27f2e32db3
                                                            • Instruction Fuzzy Hash: BC51B4A06047DA3DFB3642388846FBABEA95F06318F0C858EF1D5864D2C3A4DC84D771
                                                            APIs
                                                            • GetParent.USER32(00000000), ref: 00DCAD19
                                                            • GetKeyboardState.USER32(?), ref: 00DCAD2E
                                                            • SetKeyboardState.USER32(?), ref: 00DCAD8F
                                                            • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00DCADBB
                                                            • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00DCADD8
                                                            • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00DCAE17
                                                            • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00DCAE38
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessagePost$KeyboardState$Parent
                                                            • String ID:
                                                            • API String ID: 87235514-0
                                                            • Opcode ID: 4b3f0b167518c2ebbdf2c8be6f3fef6490efda896fe9c4e89779ca0e0365f586
                                                            • Instruction ID: 99a1bb4647b8bd05d008f5b10aafaa4b5dad0a9ae446c1f852dcb7e16069d38d
                                                            • Opcode Fuzzy Hash: 4b3f0b167518c2ebbdf2c8be6f3fef6490efda896fe9c4e89779ca0e0365f586
                                                            • Instruction Fuzzy Hash: 7651A3A16047DA3DFB3642288855F7ABE985B46308F0C858DF1D687882D294EC94D7B2
                                                            APIs
                                                            • GetConsoleCP.KERNEL32(00DA3CD6,?,?,?,?,?,?,?,?,00D95BA3,?,?,00DA3CD6,?,?), ref: 00D95470
                                                            • __fassign.LIBCMT ref: 00D954EB
                                                            • __fassign.LIBCMT ref: 00D95506
                                                            • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00DA3CD6,00000005,00000000,00000000), ref: 00D9552C
                                                            • WriteFile.KERNEL32(?,00DA3CD6,00000000,00D95BA3,00000000,?,?,?,?,?,?,?,?,?,00D95BA3,?), ref: 00D9554B
                                                            • WriteFile.KERNEL32(?,?,00000001,00D95BA3,00000000,?,?,?,?,?,?,?,?,?,00D95BA3,?), ref: 00D95584
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                            • String ID:
                                                            • API String ID: 1324828854-0
                                                            • Opcode ID: 28f6bd4db6d594330263a08a43e70ad9d28409cd9f9dc1ddff209b3096b51584
                                                            • Instruction ID: a4af79da0e4610c4a08b5d58a791f2dfaada343a615b125154e0d8d1bf13e8f2
                                                            • Opcode Fuzzy Hash: 28f6bd4db6d594330263a08a43e70ad9d28409cd9f9dc1ddff209b3096b51584
                                                            • Instruction Fuzzy Hash: 0B51B170A00609AFDF11DFA8E845AEEBBF9EF09300F15412AE555E7292D730DA51CB70
                                                            APIs
                                                            • _ValidateLocalCookies.LIBCMT ref: 00D82D4B
                                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 00D82D53
                                                            • _ValidateLocalCookies.LIBCMT ref: 00D82DE1
                                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 00D82E0C
                                                            • _ValidateLocalCookies.LIBCMT ref: 00D82E61
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                            • String ID: csm
                                                            • API String ID: 1170836740-1018135373
                                                            • Opcode ID: 2dd67da5e72623629adccf4312b5a3ed843fd4cf5a1a604b4dd3ba8201a14cb0
                                                            • Instruction ID: 1cb76cda08f92137eaa88a9d9bc638068862e2dfde65d0a51fceba51d9d5ff5e
                                                            • Opcode Fuzzy Hash: 2dd67da5e72623629adccf4312b5a3ed843fd4cf5a1a604b4dd3ba8201a14cb0
                                                            • Instruction Fuzzy Hash: 73419234A00209ABCF10EF68C845AAEBFB5FF45324F188155E8186B392D735DA45CBF0
                                                            APIs
                                                              • Part of subcall function 00DE304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00DE307A
                                                              • Part of subcall function 00DE304E: _wcslen.LIBCMT ref: 00DE309B
                                                            • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00DE1112
                                                            • WSAGetLastError.WSOCK32 ref: 00DE1121
                                                            • WSAGetLastError.WSOCK32 ref: 00DE11C9
                                                            • closesocket.WSOCK32(00000000), ref: 00DE11F9
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                            • String ID:
                                                            • API String ID: 2675159561-0
                                                            • Opcode ID: 203ae2f86900ffcfcdf902d0771f13c9a269fe97b5a94828efca7f8ce213d23c
                                                            • Instruction ID: 557fba98f3ac9315b8fbf6f1193e8435c662f5aa9d494f9cc6a2d840cc967b1f
                                                            • Opcode Fuzzy Hash: 203ae2f86900ffcfcdf902d0771f13c9a269fe97b5a94828efca7f8ce213d23c
                                                            • Instruction Fuzzy Hash: 3041C035600348AFDB10AF55C884BAABBA9EF85364F188059FD56DB291C770ED81CBB1
                                                            APIs
                                                              • Part of subcall function 00DCDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00DCCF22,?), ref: 00DCDDFD
                                                              • Part of subcall function 00DCDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00DCCF22,?), ref: 00DCDE16
                                                            • lstrcmpiW.KERNEL32(?,?), ref: 00DCCF45
                                                            • MoveFileW.KERNEL32(?,?), ref: 00DCCF7F
                                                            • _wcslen.LIBCMT ref: 00DCD005
                                                            • _wcslen.LIBCMT ref: 00DCD01B
                                                            • SHFileOperationW.SHELL32(?), ref: 00DCD061
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                            • String ID: \*.*
                                                            • API String ID: 3164238972-1173974218
                                                            • Opcode ID: 3206ff69354a871da2b2fac406131a9de4331aec533770f34f49cc8f101febd1
                                                            • Instruction ID: 9f503b1b3bf33527e3c1c13c02bcacf4955f0274f81084b410b1e3db0a6a0a11
                                                            • Opcode Fuzzy Hash: 3206ff69354a871da2b2fac406131a9de4331aec533770f34f49cc8f101febd1
                                                            • Instruction Fuzzy Hash: 9A4153718062195FDF12EBA4C981FDDB7B9EF48380F1410EEE609EB141EA34A645CB70
                                                            APIs
                                                            • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00DF2E1C
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00DF2E4F
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00DF2E84
                                                            • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00DF2EB6
                                                            • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00DF2EE0
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00DF2EF1
                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00DF2F0B
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: LongWindow$MessageSend
                                                            • String ID:
                                                            • API String ID: 2178440468-0
                                                            • Opcode ID: 889bb94aff43f379b2126d9454b21fe37f4215536ac784f133169db637076f79
                                                            • Instruction ID: 55279f44b8b9d4942320b9b6c4da2f12b0e31f829c82d62542b255312b86d2fd
                                                            • Opcode Fuzzy Hash: 889bb94aff43f379b2126d9454b21fe37f4215536ac784f133169db637076f79
                                                            • Instruction Fuzzy Hash: 853118306542489FDB208F19DD84F753BE0EB89710F2A81A4FA00DF2B1C771A854DB21
                                                            APIs
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00DC7769
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00DC778F
                                                            • SysAllocString.OLEAUT32(00000000), ref: 00DC7792
                                                            • SysAllocString.OLEAUT32(?), ref: 00DC77B0
                                                            • SysFreeString.OLEAUT32(?), ref: 00DC77B9
                                                            • StringFromGUID2.OLE32(?,?,00000028), ref: 00DC77DE
                                                            • SysAllocString.OLEAUT32(?), ref: 00DC77EC
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                            • String ID:
                                                            • API String ID: 3761583154-0
                                                            • Opcode ID: 8e8f8bfb4467d556ada4e0e9e7fb1c05968e352e79d0b5ba0852e832316e44a3
                                                            • Instruction ID: b692f19d4983df85a974a5417b2d5f2a64706ab5794f6caccd434cc1938af53d
                                                            • Opcode Fuzzy Hash: 8e8f8bfb4467d556ada4e0e9e7fb1c05968e352e79d0b5ba0852e832316e44a3
                                                            • Instruction Fuzzy Hash: 4821817660421EAFDB10DFA8CD88DBB77ACEB097647048029F915DB290D670EC55CBB4
                                                            APIs
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00DC7842
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00DC7868
                                                            • SysAllocString.OLEAUT32(00000000), ref: 00DC786B
                                                            • SysAllocString.OLEAUT32 ref: 00DC788C
                                                            • SysFreeString.OLEAUT32 ref: 00DC7895
                                                            • StringFromGUID2.OLE32(?,?,00000028), ref: 00DC78AF
                                                            • SysAllocString.OLEAUT32(?), ref: 00DC78BD
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                            • String ID:
                                                            • API String ID: 3761583154-0
                                                            • Opcode ID: a40c62bb2621b8c126d28c4f2370dd96dc5b0df258c6a65ae0baf7cad921cd61
                                                            • Instruction ID: cf5317125fd6296450aedb049fedc2ffa9000ba1bb63d30b02294a9c1f8ed344
                                                            • Opcode Fuzzy Hash: a40c62bb2621b8c126d28c4f2370dd96dc5b0df258c6a65ae0baf7cad921cd61
                                                            • Instruction Fuzzy Hash: 3E213035608209AFDF109FA8DC89EBA77ECEF097607148129FA15CB2A1D674EC41DB74
                                                            APIs
                                                            • GetStdHandle.KERNEL32(0000000C), ref: 00DD04F2
                                                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00DD052E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CreateHandlePipe
                                                            • String ID: nul
                                                            • API String ID: 1424370930-2873401336
                                                            • Opcode ID: 54d430e7f63ad95ba83a41a0501a6d32c7d8e52a79a1e67b551a92277fdc2e34
                                                            • Instruction ID: 876a7e22cca330ff7294206c69ddd54dfb9f8adf2b0586b32879451ca14f334e
                                                            • Opcode Fuzzy Hash: 54d430e7f63ad95ba83a41a0501a6d32c7d8e52a79a1e67b551a92277fdc2e34
                                                            • Instruction Fuzzy Hash: 88215E75900305EBDB209F29E845BAA7BB4AF84724F244A1AECA1D73E0D770D950DF30
                                                            APIs
                                                            • GetStdHandle.KERNEL32(000000F6), ref: 00DD05C6
                                                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00DD0601
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CreateHandlePipe
                                                            • String ID: nul
                                                            • API String ID: 1424370930-2873401336
                                                            • Opcode ID: c5e14fbe1d4a0b6a7c44168355499dadac1ab15a1bb09a5e26aba60c1cfd03f9
                                                            • Instruction ID: aebe1d9b3452d76c1dc3269f04c8b296f29cdffec5057ed82744c846789454db
                                                            • Opcode Fuzzy Hash: c5e14fbe1d4a0b6a7c44168355499dadac1ab15a1bb09a5e26aba60c1cfd03f9
                                                            • Instruction Fuzzy Hash: 99214C755003059BDB209F799C04BAA7BE8AFD5720F244A1AE9A1E73E0D7B0D960CB70
                                                            APIs
                                                              • Part of subcall function 00D6600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00D6604C
                                                              • Part of subcall function 00D6600E: GetStockObject.GDI32(00000011), ref: 00D66060
                                                              • Part of subcall function 00D6600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00D6606A
                                                            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00DF4112
                                                            • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00DF411F
                                                            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00DF412A
                                                            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00DF4139
                                                            • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00DF4145
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$CreateObjectStockWindow
                                                            • String ID: Msctls_Progress32
                                                            • API String ID: 1025951953-3636473452
                                                            • Opcode ID: 94053c00e723ae806abd640742ba77adaadb647574c938b2a3223e13630a4f5b
                                                            • Instruction ID: d2aa371c17d1d7a4aa902d1acc4a385bd0743521f8364fcb22e32b429783ff43
                                                            • Opcode Fuzzy Hash: 94053c00e723ae806abd640742ba77adaadb647574c938b2a3223e13630a4f5b
                                                            • Instruction Fuzzy Hash: A4115EB215021DBEEB119E64CC85EE77F5DEF08798F018111BB58A6150CA729C61DBB4
                                                            APIs
                                                              • Part of subcall function 00D9D7A3: _free.LIBCMT ref: 00D9D7CC
                                                            • _free.LIBCMT ref: 00D9D82D
                                                              • Part of subcall function 00D929C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00D9D7D1,00000000,00000000,00000000,00000000,?,00D9D7F8,00000000,00000007,00000000,?,00D9DBF5,00000000), ref: 00D929DE
                                                              • Part of subcall function 00D929C8: GetLastError.KERNEL32(00000000,?,00D9D7D1,00000000,00000000,00000000,00000000,?,00D9D7F8,00000000,00000007,00000000,?,00D9DBF5,00000000,00000000), ref: 00D929F0
                                                            • _free.LIBCMT ref: 00D9D838
                                                            • _free.LIBCMT ref: 00D9D843
                                                            • _free.LIBCMT ref: 00D9D897
                                                            • _free.LIBCMT ref: 00D9D8A2
                                                            • _free.LIBCMT ref: 00D9D8AD
                                                            • _free.LIBCMT ref: 00D9D8B8
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _free$ErrorFreeHeapLast
                                                            • String ID:
                                                            • API String ID: 776569668-0
                                                            • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                            • Instruction ID: 6c59b59f9390ac36b4187d04fa3cf26522fbecc75e42a4a06644d9f0b9bf10f3
                                                            • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                            • Instruction Fuzzy Hash: B811C671981B04BADF21BFF0CC46FDB7B9EEF05700F404825B29EA6592DB75A5058AB0
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00DCDA74
                                                            • LoadStringW.USER32(00000000), ref: 00DCDA7B
                                                            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00DCDA91
                                                            • LoadStringW.USER32(00000000), ref: 00DCDA98
                                                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00DCDADC
                                                            Strings
                                                            • %s (%d) : ==> %s: %s %s, xrefs: 00DCDAB9
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: HandleLoadModuleString$Message
                                                            • String ID: %s (%d) : ==> %s: %s %s
                                                            • API String ID: 4072794657-3128320259
                                                            • Opcode ID: 0e56de32976b8afee206644eb23f82d64de3c4d6b46562503446cf5cf25356bb
                                                            • Instruction ID: 7cd1624b8a40aeacd4a84f86559289ea72b21a4de7de000458c516ab2d4fbc58
                                                            • Opcode Fuzzy Hash: 0e56de32976b8afee206644eb23f82d64de3c4d6b46562503446cf5cf25356bb
                                                            • Instruction Fuzzy Hash: 0F0162F251030C7FE710ABA09E89EF7726CE708701F4055A5B746E2141E6749E948F74
                                                            APIs
                                                            • InterlockedExchange.KERNEL32(00F3DB78,00F3DB78), ref: 00DD097B
                                                            • EnterCriticalSection.KERNEL32(00F3DB58,00000000), ref: 00DD098D
                                                            • TerminateThread.KERNEL32(?,000001F6), ref: 00DD099B
                                                            • WaitForSingleObject.KERNEL32(?,000003E8), ref: 00DD09A9
                                                            • CloseHandle.KERNEL32(?), ref: 00DD09B8
                                                            • InterlockedExchange.KERNEL32(00F3DB78,000001F6), ref: 00DD09C8
                                                            • LeaveCriticalSection.KERNEL32(00F3DB58), ref: 00DD09CF
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                            • String ID:
                                                            • API String ID: 3495660284-0
                                                            • Opcode ID: 16be84103a1365a823fe03bb95aae61be522b430c034322d5ceb23bfe5dba0fc
                                                            • Instruction ID: 2c48fd448baf18b8502d1e56865d00d987021bca0620153d169b3167a8156117
                                                            • Opcode Fuzzy Hash: 16be84103a1365a823fe03bb95aae61be522b430c034322d5ceb23bfe5dba0fc
                                                            • Instruction Fuzzy Hash: A9F01932552A06ABD7415BA4EF88BE6BA29FF41702F486026F202D09A0C7749475DFB4
                                                            APIs
                                                            • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00DE1DC0
                                                            • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00DE1DE1
                                                            • WSAGetLastError.WSOCK32 ref: 00DE1DF2
                                                            • htons.WSOCK32(?,?,?,?,?), ref: 00DE1EDB
                                                            • inet_ntoa.WSOCK32(?), ref: 00DE1E8C
                                                              • Part of subcall function 00DC39E8: _strlen.LIBCMT ref: 00DC39F2
                                                              • Part of subcall function 00DE3224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,00DDEC0C), ref: 00DE3240
                                                            • _strlen.LIBCMT ref: 00DE1F35
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                            • String ID:
                                                            • API String ID: 3203458085-0
                                                            • Opcode ID: 3ac5d402e052175886306a2dc48a0413deea81056dbfad93fad9dcff5dfd3a1d
                                                            • Instruction ID: b0b6fbdafe077d2b6e8ecf0be603609a45b4303e4e854ce815893c16a00b1a5c
                                                            • Opcode Fuzzy Hash: 3ac5d402e052175886306a2dc48a0413deea81056dbfad93fad9dcff5dfd3a1d
                                                            • Instruction Fuzzy Hash: 76B1A235204340AFC324EF25C895E6ABBA5EF84318F58854CF45A9B2E2DB71ED45CBB1
                                                            APIs
                                                            • GetClientRect.USER32(?,?), ref: 00D65D30
                                                            • GetWindowRect.USER32(?,?), ref: 00D65D71
                                                            • ScreenToClient.USER32(?,?), ref: 00D65D99
                                                            • GetClientRect.USER32(?,?), ref: 00D65ED7
                                                            • GetWindowRect.USER32(?,?), ref: 00D65EF8
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Rect$Client$Window$Screen
                                                            • String ID:
                                                            • API String ID: 1296646539-0
                                                            • Opcode ID: 61a37a653bb7ba872e115c1562ec23ae16647e64f63619f3f2c94ff588330986
                                                            • Instruction ID: 11d049f61964c36515257da09012193f1146cd9740f8372176944f9d5cb75b7a
                                                            • Opcode Fuzzy Hash: 61a37a653bb7ba872e115c1562ec23ae16647e64f63619f3f2c94ff588330986
                                                            • Instruction Fuzzy Hash: 22B16834A0074ADBDB10CFA8D4807EAB7F1FF58310F18951AE8A9D7254DB74EA91DB60
                                                            APIs
                                                            • __allrem.LIBCMT ref: 00D900BA
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00D900D6
                                                            • __allrem.LIBCMT ref: 00D900ED
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00D9010B
                                                            • __allrem.LIBCMT ref: 00D90122
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00D90140
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                            • String ID:
                                                            • API String ID: 1992179935-0
                                                            • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                            • Instruction ID: 682431afb4f878b545160fa1a49323b39636821d200dd2110168b052d03cd7cd
                                                            • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                            • Instruction Fuzzy Hash: 9081E476A00706AFEB24AF68DC41B6B77E9EF41724F28453AF551E7281E770D9048BB0
                                                            APIs
                                                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00D882D9,00D882D9,?,?,?,00D9644F,00000001,00000001,8BE85006), ref: 00D96258
                                                            • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00D9644F,00000001,00000001,8BE85006,?,?,?), ref: 00D962DE
                                                            • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00D963D8
                                                            • __freea.LIBCMT ref: 00D963E5
                                                              • Part of subcall function 00D93820: RtlAllocateHeap.NTDLL(00000000,?,00E31444,?,00D7FDF5,?,?,00D6A976,00000010,00E31440,00D613FC,?,00D613C6,?,00D61129), ref: 00D93852
                                                            • __freea.LIBCMT ref: 00D963EE
                                                            • __freea.LIBCMT ref: 00D96413
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                            • String ID:
                                                            • API String ID: 1414292761-0
                                                            • Opcode ID: c29484d08b376cb9d1544d1f9c2250af82b8b52d8cff302819329a810d9acb1c
                                                            • Instruction ID: cbdf3a13c60b5df0f2eb261b2017703ad00fdc3a01c95f41384926dc0b4168aa
                                                            • Opcode Fuzzy Hash: c29484d08b376cb9d1544d1f9c2250af82b8b52d8cff302819329a810d9acb1c
                                                            • Instruction Fuzzy Hash: D251AC72A10216ABEF269F64CC81EBF7BAAEB44750F1D4629F805D6190EB34DC50C7B0
                                                            APIs
                                                              • Part of subcall function 00D69CB3: _wcslen.LIBCMT ref: 00D69CBD
                                                              • Part of subcall function 00DEC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00DEB6AE,?,?), ref: 00DEC9B5
                                                              • Part of subcall function 00DEC998: _wcslen.LIBCMT ref: 00DEC9F1
                                                              • Part of subcall function 00DEC998: _wcslen.LIBCMT ref: 00DECA68
                                                              • Part of subcall function 00DEC998: _wcslen.LIBCMT ref: 00DECA9E
                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00DEBCCA
                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00DEBD25
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00DEBD6A
                                                            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00DEBD99
                                                            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00DEBDF3
                                                            • RegCloseKey.ADVAPI32(?), ref: 00DEBDFF
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                            • String ID:
                                                            • API String ID: 1120388591-0
                                                            • Opcode ID: 2c8fb14f0be1cc4b1eb6ad724013925b35ec0ade57a1a845cec85af918d9172a
                                                            • Instruction ID: 1b016da5a2b921b4fdb8985fa680b26d404ce497c20ec1b3004ce3db86c1743b
                                                            • Opcode Fuzzy Hash: 2c8fb14f0be1cc4b1eb6ad724013925b35ec0ade57a1a845cec85af918d9172a
                                                            • Instruction Fuzzy Hash: D0816F30118241AFD714EF24C895E2ABBE5FF84318F14855DF59A8B2A2DB31ED45CBB2
                                                            APIs
                                                            • VariantInit.OLEAUT32(00000035), ref: 00DBF7B9
                                                            • SysAllocString.OLEAUT32(00000001), ref: 00DBF860
                                                            • VariantCopy.OLEAUT32(00DBFA64,00000000), ref: 00DBF889
                                                            • VariantClear.OLEAUT32(00DBFA64), ref: 00DBF8AD
                                                            • VariantCopy.OLEAUT32(00DBFA64,00000000), ref: 00DBF8B1
                                                            • VariantClear.OLEAUT32(?), ref: 00DBF8BB
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Variant$ClearCopy$AllocInitString
                                                            • String ID:
                                                            • API String ID: 3859894641-0
                                                            • Opcode ID: 142aa4c7614394dc6a746e338e3734536c99bb108111f1764213722a16d9a25f
                                                            • Instruction ID: 08ae368159545bcbe422ab8cf785211c2cbed0f3bd824bc4ba202637dcadddc9
                                                            • Opcode Fuzzy Hash: 142aa4c7614394dc6a746e338e3734536c99bb108111f1764213722a16d9a25f
                                                            • Instruction Fuzzy Hash: 3D51C136610310FACF24AB65DC95BADB3A8EF45710B249467E907DF291EB709C40CBB6
                                                            APIs
                                                              • Part of subcall function 00D67620: _wcslen.LIBCMT ref: 00D67625
                                                              • Part of subcall function 00D66B57: _wcslen.LIBCMT ref: 00D66B6A
                                                            • GetOpenFileNameW.COMDLG32(00000058), ref: 00DD94E5
                                                            • _wcslen.LIBCMT ref: 00DD9506
                                                            • _wcslen.LIBCMT ref: 00DD952D
                                                            • GetSaveFileNameW.COMDLG32(00000058), ref: 00DD9585
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$FileName$OpenSave
                                                            • String ID: X
                                                            • API String ID: 83654149-3081909835
                                                            • Opcode ID: 2f67968cae828fc0ddfc96c2ce9120cca6dc53095d60eb1103fbae8fcb83fb66
                                                            • Instruction ID: ce944d4f1191dad10e1acd449b57bfa46a0d33a9aea004dee28c7869ce5b3fa9
                                                            • Opcode Fuzzy Hash: 2f67968cae828fc0ddfc96c2ce9120cca6dc53095d60eb1103fbae8fcb83fb66
                                                            • Instruction Fuzzy Hash: 12E15F715043409FD724EF24C891A6AB7E4FF85314F18856EE8899B3A2DB31DD45CBB1
                                                            APIs
                                                              • Part of subcall function 00D79BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00D79BB2
                                                            • BeginPaint.USER32(?,?,?), ref: 00D79241
                                                            • GetWindowRect.USER32(?,?), ref: 00D792A5
                                                            • ScreenToClient.USER32(?,?), ref: 00D792C2
                                                            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00D792D3
                                                            • EndPaint.USER32(?,?,?,?,?), ref: 00D79321
                                                            • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00DB71EA
                                                              • Part of subcall function 00D79339: BeginPath.GDI32(00000000), ref: 00D79357
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                            • String ID:
                                                            • API String ID: 3050599898-0
                                                            • Opcode ID: 418e9526582617fae52507f7de6f2976e5eb2cf3cabf7212f5f1fe8480c617ca
                                                            • Instruction ID: 78f2a641d9cc6bfd55ca97995eaa8a3f178a89b2392be657df0f5546c55f8fad
                                                            • Opcode Fuzzy Hash: 418e9526582617fae52507f7de6f2976e5eb2cf3cabf7212f5f1fe8480c617ca
                                                            • Instruction Fuzzy Hash: 0F41A031104304EFD710DF25C898FBABBA8EB85360F144269F999D72A1D7319849DB71
                                                            APIs
                                                            • InterlockedExchange.KERNEL32(?,000001F5), ref: 00DD080C
                                                            • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00DD0847
                                                            • EnterCriticalSection.KERNEL32(?), ref: 00DD0863
                                                            • LeaveCriticalSection.KERNEL32(?), ref: 00DD08DC
                                                            • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00DD08F3
                                                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 00DD0921
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                            • String ID:
                                                            • API String ID: 3368777196-0
                                                            • Opcode ID: 081ce05281e5d4705ee5759b50d62df8e3206b87cc39d6a3982eb5914bb7c931
                                                            • Instruction ID: 6f70f0495147cd0514fbbb828b9119e00c1f23c413a83bbf5dd74d3f57c201e3
                                                            • Opcode Fuzzy Hash: 081ce05281e5d4705ee5759b50d62df8e3206b87cc39d6a3982eb5914bb7c931
                                                            • Instruction Fuzzy Hash: BC414A71900205EBDF15AF54DC85A6A7BB8FF44310F1480A5FD04EA296D730DE65DBB4
                                                            APIs
                                                            • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,00DBF3AB,00000000,?,?,00000000,?,00DB682C,00000004,00000000,00000000), ref: 00DF824C
                                                            • EnableWindow.USER32(?,00000000), ref: 00DF8272
                                                            • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00DF82D1
                                                            • ShowWindow.USER32(?,00000004), ref: 00DF82E5
                                                            • EnableWindow.USER32(?,00000001), ref: 00DF830B
                                                            • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00DF832F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Window$Show$Enable$MessageSend
                                                            • String ID:
                                                            • API String ID: 642888154-0
                                                            • Opcode ID: ec426072b94b0540b4cc73003e3a24b31443292ba7cda6e65c799a5b51cd974c
                                                            • Instruction ID: 9f7e03bf0f597814e47a8c932f8d0477d7089ca15896e35a3f534e82076d5172
                                                            • Opcode Fuzzy Hash: ec426072b94b0540b4cc73003e3a24b31443292ba7cda6e65c799a5b51cd974c
                                                            • Instruction Fuzzy Hash: 4F41D430A0164CEFDB11CF15D899BF87BE0FB46714F1D81A9E6089B272CB31A845DB66
                                                            APIs
                                                            • IsWindowVisible.USER32(?), ref: 00DC4C95
                                                            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00DC4CB2
                                                            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00DC4CEA
                                                            • _wcslen.LIBCMT ref: 00DC4D08
                                                            • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00DC4D10
                                                            • _wcsstr.LIBVCRUNTIME ref: 00DC4D1A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                            • String ID:
                                                            • API String ID: 72514467-0
                                                            • Opcode ID: b2b120e9f5b3ccfa9b8b62263b65979af1b4be502e4dfe38705e547093b5f3e1
                                                            • Instruction ID: 407f3b4dc6d6a39c1b10fbdff6db373104a4d1be75752492df9a8014a84de243
                                                            • Opcode Fuzzy Hash: b2b120e9f5b3ccfa9b8b62263b65979af1b4be502e4dfe38705e547093b5f3e1
                                                            • Instruction Fuzzy Hash: 0D21F9326042057BEB256B399D59F7B7BACDF45750F14802DF80ACB1A1EA61DC10D7B0
                                                            APIs
                                                              • Part of subcall function 00D63AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00D63A97,?,?,00D62E7F,?,?,?,00000000), ref: 00D63AC2
                                                            • _wcslen.LIBCMT ref: 00DD587B
                                                            • CoInitialize.OLE32(00000000), ref: 00DD5995
                                                            • CoCreateInstance.OLE32(00DFFCF8,00000000,00000001,00DFFB68,?), ref: 00DD59AE
                                                            • CoUninitialize.OLE32 ref: 00DD59CC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                            • String ID: .lnk
                                                            • API String ID: 3172280962-24824748
                                                            • Opcode ID: 616bb7e1a6c71eb022e620e6e62fd309dd1763cecf4327fc07edc0d5df656d75
                                                            • Instruction ID: 4482c02dc036825d6776b5bb7975909d7e3813227be13663d90addf2d330e033
                                                            • Opcode Fuzzy Hash: 616bb7e1a6c71eb022e620e6e62fd309dd1763cecf4327fc07edc0d5df656d75
                                                            • Instruction Fuzzy Hash: 93D16470604701DFC714DF24D490A2ABBE1EF89724F15889EF88A9B361DB31EC45CBA2
                                                            APIs
                                                              • Part of subcall function 00DC0FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00DC0FCA
                                                              • Part of subcall function 00DC0FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00DC0FD6
                                                              • Part of subcall function 00DC0FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00DC0FE5
                                                              • Part of subcall function 00DC0FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00DC0FEC
                                                              • Part of subcall function 00DC0FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00DC1002
                                                            • GetLengthSid.ADVAPI32(?,00000000,00DC1335), ref: 00DC17AE
                                                            • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00DC17BA
                                                            • HeapAlloc.KERNEL32(00000000), ref: 00DC17C1
                                                            • CopySid.ADVAPI32(00000000,00000000,?), ref: 00DC17DA
                                                            • GetProcessHeap.KERNEL32(00000000,00000000,00DC1335), ref: 00DC17EE
                                                            • HeapFree.KERNEL32(00000000), ref: 00DC17F5
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                            • String ID:
                                                            • API String ID: 3008561057-0
                                                            • Opcode ID: f52b450e90278177097f961febf81d5f3be6067ff9099da2d624322230e7c915
                                                            • Instruction ID: addc25ac371c5ef4a89b5e8aeca7ca3fa53498e155d40aea8c799d7972960fea
                                                            • Opcode Fuzzy Hash: f52b450e90278177097f961febf81d5f3be6067ff9099da2d624322230e7c915
                                                            • Instruction Fuzzy Hash: AB11A63661031AEFDB108BA4DD48FAE7BA8EF42315F14801CF481E7292C736A965CB70
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00DC14FF
                                                            • OpenProcessToken.ADVAPI32(00000000), ref: 00DC1506
                                                            • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00DC1515
                                                            • CloseHandle.KERNEL32(00000004), ref: 00DC1520
                                                            • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00DC154F
                                                            • DestroyEnvironmentBlock.USERENV(00000000), ref: 00DC1563
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                            • String ID:
                                                            • API String ID: 1413079979-0
                                                            • Opcode ID: 5e1dfa7b51fb2b5f22c0c9cb5a98c383ad73589e943e03442e8b9117135767c9
                                                            • Instruction ID: bf6d951f86045888c132772ad0bc4b62b691b6d65d61d9b367322d557a48a6fa
                                                            • Opcode Fuzzy Hash: 5e1dfa7b51fb2b5f22c0c9cb5a98c383ad73589e943e03442e8b9117135767c9
                                                            • Instruction Fuzzy Hash: 3611477651020EABDB118F98DE49FEE7BA9EF49744F088018FA05A2160C371CE65EB70
                                                            APIs
                                                            • GetLastError.KERNEL32(?,?,00D83379,00D82FE5), ref: 00D83390
                                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00D8339E
                                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00D833B7
                                                            • SetLastError.KERNEL32(00000000,?,00D83379,00D82FE5), ref: 00D83409
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ErrorLastValue___vcrt_
                                                            • String ID:
                                                            • API String ID: 3852720340-0
                                                            • Opcode ID: fa0a9210407b8a64213140d4d45b5238a0db355f073374f70659098f0fe1734d
                                                            • Instruction ID: d8d8743ec55d2240230f1b5d5b760debd9dbed0f7889b89b991650d1f9309e35
                                                            • Opcode Fuzzy Hash: fa0a9210407b8a64213140d4d45b5238a0db355f073374f70659098f0fe1734d
                                                            • Instruction Fuzzy Hash: A0012432208311BEAB2437BDFC86E2A2A94EB05B793300229F418902F0EF114E0697B4
                                                            APIs
                                                            • GetLastError.KERNEL32(?,?,00D95686,00DA3CD6,?,00000000,?,00D95B6A,?,?,?,?,?,00D8E6D1,?,00E28A48), ref: 00D92D78
                                                            • _free.LIBCMT ref: 00D92DAB
                                                            • _free.LIBCMT ref: 00D92DD3
                                                            • SetLastError.KERNEL32(00000000,?,?,?,?,00D8E6D1,?,00E28A48,00000010,00D64F4A,?,?,00000000,00DA3CD6), ref: 00D92DE0
                                                            • SetLastError.KERNEL32(00000000,?,?,?,?,00D8E6D1,?,00E28A48,00000010,00D64F4A,?,?,00000000,00DA3CD6), ref: 00D92DEC
                                                            • _abort.LIBCMT ref: 00D92DF2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$_free$_abort
                                                            • String ID:
                                                            • API String ID: 3160817290-0
                                                            • Opcode ID: 50f23d243221a091d6181a925516aa896c3ce09afe135c9f9fe1ae2e671dfc61
                                                            • Instruction ID: ce82a10cd5f6194f758f39f7d7c2af7d658b9cf190059317fc8dc6ca6cf617d0
                                                            • Opcode Fuzzy Hash: 50f23d243221a091d6181a925516aa896c3ce09afe135c9f9fe1ae2e671dfc61
                                                            • Instruction Fuzzy Hash: 94F0A4355456003BCF227735BC0AE3E25A9EFC17B1F294519F828E2292EF24881281F0
                                                            APIs
                                                              • Part of subcall function 00D79639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00D79693
                                                              • Part of subcall function 00D79639: SelectObject.GDI32(?,00000000), ref: 00D796A2
                                                              • Part of subcall function 00D79639: BeginPath.GDI32(?), ref: 00D796B9
                                                              • Part of subcall function 00D79639: SelectObject.GDI32(?,00000000), ref: 00D796E2
                                                            • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00DF8A4E
                                                            • LineTo.GDI32(?,00000003,00000000), ref: 00DF8A62
                                                            • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00DF8A70
                                                            • LineTo.GDI32(?,00000000,00000003), ref: 00DF8A80
                                                            • EndPath.GDI32(?), ref: 00DF8A90
                                                            • StrokePath.GDI32(?), ref: 00DF8AA0
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                            • String ID:
                                                            • API String ID: 43455801-0
                                                            • Opcode ID: 52b4b22010cd5ae5d8ae9b57113807f7fe7c45140f0af7bec2309772e28a096f
                                                            • Instruction ID: e38c7763e22360fc04a8e970bcb4f00d73840788fc041c59b68d823c9890562b
                                                            • Opcode Fuzzy Hash: 52b4b22010cd5ae5d8ae9b57113807f7fe7c45140f0af7bec2309772e28a096f
                                                            • Instruction Fuzzy Hash: C6110C7600020DFFDB119F90DC48EAA7F6CEB04394F04C052BA19991A1D7719D65DB70
                                                            APIs
                                                            • GetDC.USER32(00000000), ref: 00DC5218
                                                            • GetDeviceCaps.GDI32(00000000,00000058), ref: 00DC5229
                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00DC5230
                                                            • ReleaseDC.USER32(00000000,00000000), ref: 00DC5238
                                                            • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00DC524F
                                                            • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00DC5261
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CapsDevice$Release
                                                            • String ID:
                                                            • API String ID: 1035833867-0
                                                            • Opcode ID: e17e8c27bb2eb736c41e3d04adbe800917a48f9da503a2224875e1678e546fa5
                                                            • Instruction ID: 7e810aaa7c332bb40ea61a100dd3197d3409b1bbbe0dc51eb69ad3249bd3c0a2
                                                            • Opcode Fuzzy Hash: e17e8c27bb2eb736c41e3d04adbe800917a48f9da503a2224875e1678e546fa5
                                                            • Instruction Fuzzy Hash: 95018F75A00709BBEB109BE59D49F5EBFB8EF48351F048065FA04E7390DA709814CBB0
                                                            APIs
                                                            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00D61BF4
                                                            • MapVirtualKeyW.USER32(00000010,00000000), ref: 00D61BFC
                                                            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00D61C07
                                                            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00D61C12
                                                            • MapVirtualKeyW.USER32(00000011,00000000), ref: 00D61C1A
                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00D61C22
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Virtual
                                                            • String ID:
                                                            • API String ID: 4278518827-0
                                                            • Opcode ID: 6a2cea8fb7c995e134f0d62f0cbdd1d38ce49ca37adcc4aaa3b057b0deaf91de
                                                            • Instruction ID: b16b5b1512bddd323bb54bca9f533d207c0063abebff3a2673446586503d264d
                                                            • Opcode Fuzzy Hash: 6a2cea8fb7c995e134f0d62f0cbdd1d38ce49ca37adcc4aaa3b057b0deaf91de
                                                            • Instruction Fuzzy Hash: 5B016CB09027597DE3008F5A8C85B52FFA8FF19354F00411B915C87A41C7F5A864CBE5
                                                            APIs
                                                            • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00DCEB30
                                                            • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00DCEB46
                                                            • GetWindowThreadProcessId.USER32(?,?), ref: 00DCEB55
                                                            • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00DCEB64
                                                            • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00DCEB6E
                                                            • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00DCEB75
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                            • String ID:
                                                            • API String ID: 839392675-0
                                                            • Opcode ID: 4bd6b49f2936521e463dc034f033edcd6e08668cd8fd0dc2549880d6a1e612b0
                                                            • Instruction ID: c82ca40589291cbfe84443788e5c544cedfe4d02fab73690342898e8fa1a99bb
                                                            • Opcode Fuzzy Hash: 4bd6b49f2936521e463dc034f033edcd6e08668cd8fd0dc2549880d6a1e612b0
                                                            • Instruction Fuzzy Hash: 05F0907221021CBBE72057529D0DEFF3A7CEFCAB11F009158F601D1290D7A01A21C6B4
                                                            APIs
                                                            • GetClientRect.USER32(?), ref: 00DB7452
                                                            • SendMessageW.USER32(?,00001328,00000000,?), ref: 00DB7469
                                                            • GetWindowDC.USER32(?), ref: 00DB7475
                                                            • GetPixel.GDI32(00000000,?,?), ref: 00DB7484
                                                            • ReleaseDC.USER32(?,00000000), ref: 00DB7496
                                                            • GetSysColor.USER32(00000005), ref: 00DB74B0
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                            • String ID:
                                                            • API String ID: 272304278-0
                                                            • Opcode ID: b59cecd58f24f4868f020d5e46ec7452746cf244d662fdd5c67ed55ce09670f3
                                                            • Instruction ID: a075b7484621dbc6981b00c8b62eeab274d13d3e053e93f0aedc97ecdd17f483
                                                            • Opcode Fuzzy Hash: b59cecd58f24f4868f020d5e46ec7452746cf244d662fdd5c67ed55ce09670f3
                                                            • Instruction Fuzzy Hash: CF018B31414209EFDB105F64DD08BFA7BB5FB04312F259064F916E22B0CB311E61EB60
                                                            APIs
                                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00DC187F
                                                            • UnloadUserProfile.USERENV(?,?), ref: 00DC188B
                                                            • CloseHandle.KERNEL32(?), ref: 00DC1894
                                                            • CloseHandle.KERNEL32(?), ref: 00DC189C
                                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 00DC18A5
                                                            • HeapFree.KERNEL32(00000000), ref: 00DC18AC
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                            • String ID:
                                                            • API String ID: 146765662-0
                                                            • Opcode ID: 34e4cca4485efdd787aaed66389b4e40cebe96c908bab6061219169823154de9
                                                            • Instruction ID: 5f516b90936fde1ad28c69c1e927abb980aa4cf05595f88c57b18a6342f3f093
                                                            • Opcode Fuzzy Hash: 34e4cca4485efdd787aaed66389b4e40cebe96c908bab6061219169823154de9
                                                            • Instruction Fuzzy Hash: 68E0C236114309BBDA016BA1EE0CD1ABF69FF59B22B10D220F225C1270CB329430EB60
                                                            APIs
                                                            • __Init_thread_footer.LIBCMT ref: 00D6BEB3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Init_thread_footer
                                                            • String ID: D%$D%$D%$D%
                                                            • API String ID: 1385522511-2722557190
                                                            • Opcode ID: 7bc266a7fe8b0054fb50099d79c54bf00cce2cac81bdf4dd9aff092d9fc8ef79
                                                            • Instruction ID: d1e51f321297439f52c4747275010b2f069925e8eb19dae610323f31127c6e7d
                                                            • Opcode Fuzzy Hash: 7bc266a7fe8b0054fb50099d79c54bf00cce2cac81bdf4dd9aff092d9fc8ef79
                                                            • Instruction Fuzzy Hash: 7091F975A0060ADFCB14CF69C0916A9BBF1FF58324F25416AD986EB351D731EA81CFA0
                                                            APIs
                                                              • Part of subcall function 00D67620: _wcslen.LIBCMT ref: 00D67625
                                                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00DCC6EE
                                                            • _wcslen.LIBCMT ref: 00DCC735
                                                            • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00DCC79C
                                                            • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00DCC7CA
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ItemMenu$Info_wcslen$Default
                                                            • String ID: 0
                                                            • API String ID: 1227352736-4108050209
                                                            • Opcode ID: af6c2a49f9a805e41c84580d5188feeaf7496de68b2542efa699816e31db6074
                                                            • Instruction ID: 4f7ce108683908c1a715e3d41e61b864ec43ffa89244a62e612ec965db749a7c
                                                            • Opcode Fuzzy Hash: af6c2a49f9a805e41c84580d5188feeaf7496de68b2542efa699816e31db6074
                                                            • Instruction Fuzzy Hash: 99518F716243029BD7249F28C945F6A77E4EF85310F082A2DF699E31E0EB70D944CB72
                                                            APIs
                                                            • ShellExecuteExW.SHELL32(0000003C), ref: 00DEAEA3
                                                              • Part of subcall function 00D67620: _wcslen.LIBCMT ref: 00D67625
                                                            • GetProcessId.KERNEL32(00000000), ref: 00DEAF38
                                                            • CloseHandle.KERNEL32(00000000), ref: 00DEAF67
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CloseExecuteHandleProcessShell_wcslen
                                                            • String ID: <$@
                                                            • API String ID: 146682121-1426351568
                                                            • Opcode ID: bbd5aad04e0ac5d496750b7f9092f5f568286a6b63557e9b980cf2c04d753503
                                                            • Instruction ID: 0e010d606ca456130521a5ff9498e6ff37e168789710060e95e6a310e5628577
                                                            • Opcode Fuzzy Hash: bbd5aad04e0ac5d496750b7f9092f5f568286a6b63557e9b980cf2c04d753503
                                                            • Instruction Fuzzy Hash: BE714770A00259DFCB14EF99C494A9EBBF0EF08314F048499E856AB392D774ED45CBB1
                                                            APIs
                                                            • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00DC7206
                                                            • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00DC723C
                                                            • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00DC724D
                                                            • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00DC72CF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ErrorMode$AddressCreateInstanceProc
                                                            • String ID: DllGetClassObject
                                                            • API String ID: 753597075-1075368562
                                                            • Opcode ID: 9e9592b613598e1b09c105a88515669c053d08fa1a081c9780e2ae86391aece1
                                                            • Instruction ID: e7b311f1b031e02675c799267aedef0147c5e229d212ce05c7cac0798616b6dc
                                                            • Opcode Fuzzy Hash: 9e9592b613598e1b09c105a88515669c053d08fa1a081c9780e2ae86391aece1
                                                            • Instruction Fuzzy Hash: D7413B71A04206AFDB15CF54C884FAABBA9EF44310F2580ADBD059F20AD7B1D945CFB4
                                                            APIs
                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00DF3E35
                                                            • IsMenu.USER32(?), ref: 00DF3E4A
                                                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00DF3E92
                                                            • DrawMenuBar.USER32 ref: 00DF3EA5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Menu$Item$DrawInfoInsert
                                                            • String ID: 0
                                                            • API String ID: 3076010158-4108050209
                                                            • Opcode ID: 15c13a9466b98d6d0bca39f1a6494fe54e536cb86cc2b5ba137481dcd4ec5b17
                                                            • Instruction ID: 6852a75a666ccb88be812ef8137e4ac509b36cebc7579a36d9e0649982aaa41d
                                                            • Opcode Fuzzy Hash: 15c13a9466b98d6d0bca39f1a6494fe54e536cb86cc2b5ba137481dcd4ec5b17
                                                            • Instruction Fuzzy Hash: 954149B5A0020DAFDF10DF54D884AEABBB5FF44350F0A8229FA05AB350D730AE54CB60
                                                            APIs
                                                              • Part of subcall function 00D69CB3: _wcslen.LIBCMT ref: 00D69CBD
                                                              • Part of subcall function 00DC3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00DC3CCA
                                                            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00DC1E66
                                                            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00DC1E79
                                                            • SendMessageW.USER32(?,00000189,?,00000000), ref: 00DC1EA9
                                                              • Part of subcall function 00D66B57: _wcslen.LIBCMT ref: 00D66B6A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$_wcslen$ClassName
                                                            • String ID: ComboBox$ListBox
                                                            • API String ID: 2081771294-1403004172
                                                            • Opcode ID: 8dc29a7f788a10bfd3505a7e3bf3747b283a420d01a796f0b1d6fce6fd6172e1
                                                            • Instruction ID: e183cecad483c298edb93bfc930d785c734d07271b7e96bb7de45e0de2ba4adf
                                                            • Opcode Fuzzy Hash: 8dc29a7f788a10bfd3505a7e3bf3747b283a420d01a796f0b1d6fce6fd6172e1
                                                            • Instruction Fuzzy Hash: E5212175A00209ABDB14ABA4DD56DFFB7BCEF42350B14811DF825E32E2EB34491AC630
                                                            APIs
                                                            • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00DF2F8D
                                                            • LoadLibraryW.KERNEL32(?), ref: 00DF2F94
                                                            • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00DF2FA9
                                                            • DestroyWindow.USER32(?), ref: 00DF2FB1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$DestroyLibraryLoadWindow
                                                            • String ID: SysAnimate32
                                                            • API String ID: 3529120543-1011021900
                                                            • Opcode ID: a23e6675445b67fee33376eb99b22c0b1a3ee65c38a86857cfb08890ecbc7d12
                                                            • Instruction ID: 7f0c069f4a54d6bb4edcc2134dc59026df70eb4633567ed438a8447d98800e49
                                                            • Opcode Fuzzy Hash: a23e6675445b67fee33376eb99b22c0b1a3ee65c38a86857cfb08890ecbc7d12
                                                            • Instruction Fuzzy Hash: A121AC7122420DABEB104FA6DC80EBB37B9EF59368F168628FB54D21A0D771DC919770
                                                            APIs
                                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00D84D1E,00D928E9,?,00D84CBE,00D928E9,00E288B8,0000000C,00D84E15,00D928E9,00000002), ref: 00D84D8D
                                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00D84DA0
                                                            • FreeLibrary.KERNEL32(00000000,?,?,?,00D84D1E,00D928E9,?,00D84CBE,00D928E9,00E288B8,0000000C,00D84E15,00D928E9,00000002,00000000), ref: 00D84DC3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                            • String ID: CorExitProcess$mscoree.dll
                                                            • API String ID: 4061214504-1276376045
                                                            • Opcode ID: 08cc7435fa88b9b1331dc2cb783c4d29b2e6522cca3e1970121957d969877300
                                                            • Instruction ID: 10ba192d96285e159975dc3b79071336e594f2401ac1f998982f6bd963796bae
                                                            • Opcode Fuzzy Hash: 08cc7435fa88b9b1331dc2cb783c4d29b2e6522cca3e1970121957d969877300
                                                            • Instruction Fuzzy Hash: D4F0AF30A1030DBBDB10AF90DD09BADBFB5EF04755F0840A5F809E22A0CF305994CBA0
                                                            APIs
                                                            • LoadLibraryA.KERNEL32 ref: 00DBD3AD
                                                            • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00DBD3BF
                                                            • FreeLibrary.KERNEL32(00000000), ref: 00DBD3E5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Library$AddressFreeLoadProc
                                                            • String ID: GetSystemWow64DirectoryW$X64
                                                            • API String ID: 145871493-2590602151
                                                            • Opcode ID: d5ac5b4e963f946c0833eeb53877eecd2ef84d6176a3b6522bd443ee029e3481
                                                            • Instruction ID: 33347b97be6e269a4aecab2b210b14ba953e03f5e704de1896b05072c5551611
                                                            • Opcode Fuzzy Hash: d5ac5b4e963f946c0833eeb53877eecd2ef84d6176a3b6522bd443ee029e3481
                                                            • Instruction Fuzzy Hash: C9F02030405725DBC7301B108C289B93262AF00701B59E069E847E2215FB20CDA4C6B6
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00D64EDD,?,00E31418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D64E9C
                                                            • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00D64EAE
                                                            • FreeLibrary.KERNEL32(00000000,?,?,00D64EDD,?,00E31418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D64EC0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Library$AddressFreeLoadProc
                                                            • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                            • API String ID: 145871493-3689287502
                                                            • Opcode ID: d373aacaad395b59a883aebf4c86ead2b37aa1ea228c98b1269a8506bd05a94d
                                                            • Instruction ID: 731a3d824889e5852ca1a67d2f95ba5331b852d85c2c42bc1b91a2abcdf0f221
                                                            • Opcode Fuzzy Hash: d373aacaad395b59a883aebf4c86ead2b37aa1ea228c98b1269a8506bd05a94d
                                                            • Instruction Fuzzy Hash: 00E07236E127325BC2320B24BE08B3F6268AF81F62B096010FC00E2302CF60CC21C0B0
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00DA3CDE,?,00E31418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D64E62
                                                            • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00D64E74
                                                            • FreeLibrary.KERNEL32(00000000,?,?,00DA3CDE,?,00E31418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D64E87
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Library$AddressFreeLoadProc
                                                            • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                            • API String ID: 145871493-1355242751
                                                            • Opcode ID: 0d811ccee51712459de52a99ed7f5b89dec7ab330c9b7df62a2c28c1f6299e0b
                                                            • Instruction ID: 9b8425a953249442ddf3fc38cd71e9beca0d0e9bd15aec6baddb28e9611d9586
                                                            • Opcode Fuzzy Hash: 0d811ccee51712459de52a99ed7f5b89dec7ab330c9b7df62a2c28c1f6299e0b
                                                            • Instruction Fuzzy Hash: 0BD0C2395127365B46221B247C08DAB2A18AF81B153099111B904E2211CF21CD21C5F0
                                                            APIs
                                                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00DD2C05
                                                            • DeleteFileW.KERNEL32(?), ref: 00DD2C87
                                                            • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00DD2C9D
                                                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00DD2CAE
                                                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00DD2CC0
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: File$Delete$Copy
                                                            • String ID:
                                                            • API String ID: 3226157194-0
                                                            • Opcode ID: ee314dbb41cb47a1f0d3d3605ac07b5abf5342117e81990b39f5f5ebebd31c28
                                                            • Instruction ID: da6afd3400c41d994641776e65d81b409eb9125cd308a9f00463ee889a1c3401
                                                            • Opcode Fuzzy Hash: ee314dbb41cb47a1f0d3d3605ac07b5abf5342117e81990b39f5f5ebebd31c28
                                                            • Instruction Fuzzy Hash: 1FB13D72900119ABDF21EBA4CC85EEEB7BDEF59350F1040A6F509E7255EA309E448F71
                                                            APIs
                                                            • GetCurrentProcessId.KERNEL32 ref: 00DEA427
                                                            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00DEA435
                                                            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00DEA468
                                                            • CloseHandle.KERNEL32(?), ref: 00DEA63D
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Process$CloseCountersCurrentHandleOpen
                                                            • String ID:
                                                            • API String ID: 3488606520-0
                                                            • Opcode ID: d82ef65399e248e717ce613818b4887093c499c3bb0fd1fba9dd9f1fe9aa112e
                                                            • Instruction ID: 1438d0daaed80ac68571ab1f8dde2f6e7368bd1876fb2bcfefd5c6f72883ac5c
                                                            • Opcode Fuzzy Hash: d82ef65399e248e717ce613818b4887093c499c3bb0fd1fba9dd9f1fe9aa112e
                                                            • Instruction Fuzzy Hash: 68A191716047019FD720EF18C886B2AB7E1EF84714F18885DF59ADB2D2D7B0EC418BA1
                                                            APIs
                                                            • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00E03700), ref: 00D9BB91
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00E3121C,000000FF,00000000,0000003F,00000000,?,?), ref: 00D9BC09
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00E31270,000000FF,?,0000003F,00000000,?), ref: 00D9BC36
                                                            • _free.LIBCMT ref: 00D9BB7F
                                                              • Part of subcall function 00D929C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00D9D7D1,00000000,00000000,00000000,00000000,?,00D9D7F8,00000000,00000007,00000000,?,00D9DBF5,00000000), ref: 00D929DE
                                                              • Part of subcall function 00D929C8: GetLastError.KERNEL32(00000000,?,00D9D7D1,00000000,00000000,00000000,00000000,?,00D9D7F8,00000000,00000007,00000000,?,00D9DBF5,00000000,00000000), ref: 00D929F0
                                                            • _free.LIBCMT ref: 00D9BD4B
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                            • String ID:
                                                            • API String ID: 1286116820-0
                                                            • Opcode ID: d451438d131c1182904a5da917b6f71672eeeeac55dd5458d86bd4ac08991eff
                                                            • Instruction ID: 2257967f4e4f7a81d9d058494277c9eabe83596ab59897bc8342ec89fcb6aff6
                                                            • Opcode Fuzzy Hash: d451438d131c1182904a5da917b6f71672eeeeac55dd5458d86bd4ac08991eff
                                                            • Instruction Fuzzy Hash: 4F51D771900209AFCF10EF75AD8596EBBB8EF40330B1542ABE455E72A1EB709D459BB0
                                                            APIs
                                                              • Part of subcall function 00DCDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00DCCF22,?), ref: 00DCDDFD
                                                              • Part of subcall function 00DCDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00DCCF22,?), ref: 00DCDE16
                                                              • Part of subcall function 00DCE199: GetFileAttributesW.KERNEL32(?,00DCCF95), ref: 00DCE19A
                                                            • lstrcmpiW.KERNEL32(?,?), ref: 00DCE473
                                                            • MoveFileW.KERNEL32(?,?), ref: 00DCE4AC
                                                            • _wcslen.LIBCMT ref: 00DCE5EB
                                                            • _wcslen.LIBCMT ref: 00DCE603
                                                            • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00DCE650
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                            • String ID:
                                                            • API String ID: 3183298772-0
                                                            • Opcode ID: d4fbb040da95d70a6281fce49b367498ed5e8a3b0cac477fb57c71597b2e6ee5
                                                            • Instruction ID: 0c71fcf7ba24f0c8dcce18a82b848241fb8f86001ecbd24ac23b2f89c0123c6c
                                                            • Opcode Fuzzy Hash: d4fbb040da95d70a6281fce49b367498ed5e8a3b0cac477fb57c71597b2e6ee5
                                                            • Instruction Fuzzy Hash: C45130F24087455BC724EB90D891EDBB3ECEF85340F04492EF689D3191EE74A6888776
                                                            APIs
                                                              • Part of subcall function 00D69CB3: _wcslen.LIBCMT ref: 00D69CBD
                                                              • Part of subcall function 00DEC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00DEB6AE,?,?), ref: 00DEC9B5
                                                              • Part of subcall function 00DEC998: _wcslen.LIBCMT ref: 00DEC9F1
                                                              • Part of subcall function 00DEC998: _wcslen.LIBCMT ref: 00DECA68
                                                              • Part of subcall function 00DEC998: _wcslen.LIBCMT ref: 00DECA9E
                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00DEBAA5
                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00DEBB00
                                                            • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00DEBB63
                                                            • RegCloseKey.ADVAPI32(?,?), ref: 00DEBBA6
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00DEBBB3
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                            • String ID:
                                                            • API String ID: 826366716-0
                                                            • Opcode ID: c4c0d0c218b08b658f99c69935011e4b63ecfe6f86842a95783671e6cb84e8ac
                                                            • Instruction ID: 0f01a306a5c327cedc7eed65914fa4e65f0393058cdc6ec7d44cf7fbc6936b13
                                                            • Opcode Fuzzy Hash: c4c0d0c218b08b658f99c69935011e4b63ecfe6f86842a95783671e6cb84e8ac
                                                            • Instruction Fuzzy Hash: 48617E31108241AFD714EF15C490E2BBBE5FF84318F54856DF4998B2A2DB31ED45CBA2
                                                            APIs
                                                            • VariantInit.OLEAUT32(?), ref: 00DC8BCD
                                                            • VariantClear.OLEAUT32 ref: 00DC8C3E
                                                            • VariantClear.OLEAUT32 ref: 00DC8C9D
                                                            • VariantClear.OLEAUT32(?), ref: 00DC8D10
                                                            • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00DC8D3B
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Variant$Clear$ChangeInitType
                                                            • String ID:
                                                            • API String ID: 4136290138-0
                                                            • Opcode ID: fdae7a5587ddc321b7b4c32436e3e391be453b29e6e611d6e242f715746f93a7
                                                            • Instruction ID: 52efdb014faded2e6b1da934a3945f1b020b8a0df9783bbc401db828d4b17f4e
                                                            • Opcode Fuzzy Hash: fdae7a5587ddc321b7b4c32436e3e391be453b29e6e611d6e242f715746f93a7
                                                            • Instruction Fuzzy Hash: A2515BB5A0021AEFCB14CF58D894EAAB7F8FF89310B158559F906DB350E730E911CBA0
                                                            APIs
                                                            • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00DD8BAE
                                                            • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00DD8BDA
                                                            • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00DD8C32
                                                            • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00DD8C57
                                                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00DD8C5F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: PrivateProfile$SectionWrite$String
                                                            • String ID:
                                                            • API String ID: 2832842796-0
                                                            • Opcode ID: ca7cf0eef86c91ce2c1b28dabf8975e7984a2810f7f8dfea8a60bd64120b19d2
                                                            • Instruction ID: 996c277c58e8192e55cc2f44ba7e4096e6e7bb9513ae92abafc90910f3f3111b
                                                            • Opcode Fuzzy Hash: ca7cf0eef86c91ce2c1b28dabf8975e7984a2810f7f8dfea8a60bd64120b19d2
                                                            • Instruction Fuzzy Hash: 42514A35A10219DFCB15DF64C881A69BBF5FF48314F088499E84AAB362DB31ED51DBB0
                                                            APIs
                                                            • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00DE8F40
                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00DE8FD0
                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00DE8FEC
                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00DE9032
                                                            • FreeLibrary.KERNEL32(00000000), ref: 00DE9052
                                                              • Part of subcall function 00D7F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00DD1043,?,75C0E610), ref: 00D7F6E6
                                                              • Part of subcall function 00D7F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00DBFA64,00000000,00000000,?,?,00DD1043,?,75C0E610,?,00DBFA64), ref: 00D7F70D
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                            • String ID:
                                                            • API String ID: 666041331-0
                                                            • Opcode ID: 73483323888a98dd7c6604854a4966daef51b589026be731190fd4c20ec3e669
                                                            • Instruction ID: d6cea4b3b5a9a56f51b47dc6b50d9d288c2cd9963e8cb5efa861e8324a74875f
                                                            • Opcode Fuzzy Hash: 73483323888a98dd7c6604854a4966daef51b589026be731190fd4c20ec3e669
                                                            • Instruction Fuzzy Hash: 47514B35601245DFC711EF59C4948ADFBF1FF49324B4880A9E84AAB362DB31ED85CBA0
                                                            APIs
                                                            • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00DF6C33
                                                            • SetWindowLongW.USER32(?,000000EC,?), ref: 00DF6C4A
                                                            • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00DF6C73
                                                            • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00DDAB79,00000000,00000000), ref: 00DF6C98
                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00DF6CC7
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Window$Long$MessageSendShow
                                                            • String ID:
                                                            • API String ID: 3688381893-0
                                                            • Opcode ID: 4d4478ae65808ad044a48c671184b23ad12f984286074181092deacd0e1d78ed
                                                            • Instruction ID: fe1f7a7ed56fbf6ad00341a2d419bd4347a25620dd2b48414e41632e7c2cbf90
                                                            • Opcode Fuzzy Hash: 4d4478ae65808ad044a48c671184b23ad12f984286074181092deacd0e1d78ed
                                                            • Instruction Fuzzy Hash: D441A03560410CAFD7248F28CD58BB97FA5EB09350F1A8268FAD9E77A1C371ED51CA60
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _free
                                                            • String ID:
                                                            • API String ID: 269201875-0
                                                            • Opcode ID: 54620465be2584aa8f5108ee2516f51504ab4ec747a934f83487d6140801f884
                                                            • Instruction ID: d6b0f7ce0c508e1fcae99326aa3f47c675d9f4af51369f9d695cb294b4b36a21
                                                            • Opcode Fuzzy Hash: 54620465be2584aa8f5108ee2516f51504ab4ec747a934f83487d6140801f884
                                                            • Instruction Fuzzy Hash: 8141B232A00200AFCF24DF78C881A6DB7F5EF89314F194569E559EB355D731AD01CBA1
                                                            APIs
                                                            • GetCursorPos.USER32(?), ref: 00D79141
                                                            • ScreenToClient.USER32(00000000,?), ref: 00D7915E
                                                            • GetAsyncKeyState.USER32(00000001), ref: 00D79183
                                                            • GetAsyncKeyState.USER32(00000002), ref: 00D7919D
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: AsyncState$ClientCursorScreen
                                                            • String ID:
                                                            • API String ID: 4210589936-0
                                                            • Opcode ID: 32465689d0ea134add8ff28e73aa91d9193a23d18196f54282d9cf7cba7877cb
                                                            • Instruction ID: b78a826d04c28fc348733ce0374caedecb597d2720bfdb6235dbaf848226b421
                                                            • Opcode Fuzzy Hash: 32465689d0ea134add8ff28e73aa91d9193a23d18196f54282d9cf7cba7877cb
                                                            • Instruction Fuzzy Hash: 7A41903190860AFBDF059F68C854BFEF774FB45324F248219E829A7290D7345960CB71
                                                            APIs
                                                            • GetInputState.USER32 ref: 00DD38CB
                                                            • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00DD3922
                                                            • TranslateMessage.USER32(?), ref: 00DD394B
                                                            • DispatchMessageW.USER32(?), ref: 00DD3955
                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00DD3966
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                            • String ID:
                                                            • API String ID: 2256411358-0
                                                            • Opcode ID: b493f130d093919c02ad62b04450000ce0021220eb173ca8d14c5992bd3eed75
                                                            • Instruction ID: 539f8c96b82bfbcb8570309ef7c8c52442699eb40961c333c85b2bf7b7b6b1e3
                                                            • Opcode Fuzzy Hash: b493f130d093919c02ad62b04450000ce0021220eb173ca8d14c5992bd3eed75
                                                            • Instruction Fuzzy Hash: C63195705043459EEB35CB759C58BB63BA8AB05344F08456FE4A2D23A0E3F4A689DF32
                                                            APIs
                                                            • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00DDC21E,00000000), ref: 00DDCF38
                                                            • InternetReadFile.WININET(?,00000000,?,?), ref: 00DDCF6F
                                                            • GetLastError.KERNEL32(?,00000000,?,?,?,00DDC21E,00000000), ref: 00DDCFB4
                                                            • SetEvent.KERNEL32(?,?,00000000,?,?,?,00DDC21E,00000000), ref: 00DDCFC8
                                                            • SetEvent.KERNEL32(?,?,00000000,?,?,?,00DDC21E,00000000), ref: 00DDCFF2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                            • String ID:
                                                            • API String ID: 3191363074-0
                                                            • Opcode ID: 57f79f51f7e9d7a2124043f4f76b5b40df5b81dfd6e071ef09f2a4dfa6eb7d70
                                                            • Instruction ID: 292716276f1075d2a06af5b4652ff97ff316db4c50d780c61d9929214b54d3f2
                                                            • Opcode Fuzzy Hash: 57f79f51f7e9d7a2124043f4f76b5b40df5b81dfd6e071ef09f2a4dfa6eb7d70
                                                            • Instruction Fuzzy Hash: 1C313C71525306AFDB20DFA5C9849AABBFAEF14350F14942EF546D2250EB30ED44DB70
                                                            APIs
                                                            • GetWindowRect.USER32(?,?), ref: 00DC1915
                                                            • PostMessageW.USER32(00000001,00000201,00000001), ref: 00DC19C1
                                                            • Sleep.KERNEL32(00000000,?,?,?), ref: 00DC19C9
                                                            • PostMessageW.USER32(00000001,00000202,00000000), ref: 00DC19DA
                                                            • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00DC19E2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessagePostSleep$RectWindow
                                                            • String ID:
                                                            • API String ID: 3382505437-0
                                                            • Opcode ID: 21a42096f3c6ebacd19860d0b5518f27a8ea64e44c0a11fd1a63ad80e0de019c
                                                            • Instruction ID: 48ff029f614b73b014fe9ac7aa85d0207b54d6de7b0dbfd47900b0e342d5c831
                                                            • Opcode Fuzzy Hash: 21a42096f3c6ebacd19860d0b5518f27a8ea64e44c0a11fd1a63ad80e0de019c
                                                            • Instruction Fuzzy Hash: 5C31A175A0022AEFCB10CFA8C959BEE7BB5EB05315F148229F961E72D1C7709954CFA0
                                                            APIs
                                                            • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00DF5745
                                                            • SendMessageW.USER32(?,00001074,?,00000001), ref: 00DF579D
                                                            • _wcslen.LIBCMT ref: 00DF57AF
                                                            • _wcslen.LIBCMT ref: 00DF57BA
                                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00DF5816
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$_wcslen
                                                            • String ID:
                                                            • API String ID: 763830540-0
                                                            • Opcode ID: 3ca4f599326ac452eab0e9a6992f56722a60be3968240666e45344ab94006697
                                                            • Instruction ID: dfda743b236b7995582d978a853a5d6ad905f3e78c3d62c87eb51623cf795ed4
                                                            • Opcode Fuzzy Hash: 3ca4f599326ac452eab0e9a6992f56722a60be3968240666e45344ab94006697
                                                            • Instruction Fuzzy Hash: 7721737190461C9ADB209F60DC85AFD7BB8FF05724F14C256EB19EA194D7708985CF70
                                                            APIs
                                                            • IsWindow.USER32(00000000), ref: 00DE0951
                                                            • GetForegroundWindow.USER32 ref: 00DE0968
                                                            • GetDC.USER32(00000000), ref: 00DE09A4
                                                            • GetPixel.GDI32(00000000,?,00000003), ref: 00DE09B0
                                                            • ReleaseDC.USER32(00000000,00000003), ref: 00DE09E8
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Window$ForegroundPixelRelease
                                                            • String ID:
                                                            • API String ID: 4156661090-0
                                                            • Opcode ID: 215d13c5cdd8e4d116088abd402aee5470e55c73c5dfea37634d43027c9d71f0
                                                            • Instruction ID: 8fe1a32fb7574871ea5ae51b9c026ba357e9524a3c168dd62e8cefe001f41fd6
                                                            • Opcode Fuzzy Hash: 215d13c5cdd8e4d116088abd402aee5470e55c73c5dfea37634d43027c9d71f0
                                                            • Instruction Fuzzy Hash: 7D218E35600204AFD704EF69DD84AAEBBE9EF48700F048469F84AD7362DB70AD44CB70
                                                            APIs
                                                            • GetEnvironmentStringsW.KERNEL32 ref: 00D9CDC6
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D9CDE9
                                                              • Part of subcall function 00D93820: RtlAllocateHeap.NTDLL(00000000,?,00E31444,?,00D7FDF5,?,?,00D6A976,00000010,00E31440,00D613FC,?,00D613C6,?,00D61129), ref: 00D93852
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00D9CE0F
                                                            • _free.LIBCMT ref: 00D9CE22
                                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00D9CE31
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                            • String ID:
                                                            • API String ID: 336800556-0
                                                            • Opcode ID: 63a781171dadac2faf5970551d646259cb11edfd1fed7df11e38e2f80aea973d
                                                            • Instruction ID: aa0a59fc6aa5339b365439bbe576f44c309240f1b2246100c2bc715f4c8c743f
                                                            • Opcode Fuzzy Hash: 63a781171dadac2faf5970551d646259cb11edfd1fed7df11e38e2f80aea973d
                                                            • Instruction Fuzzy Hash: AD01A7726213157F2B2157B66C8CD7B796DDEC6BA13195129FD06C7201EA618D11C2F0
                                                            APIs
                                                            • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00D79693
                                                            • SelectObject.GDI32(?,00000000), ref: 00D796A2
                                                            • BeginPath.GDI32(?), ref: 00D796B9
                                                            • SelectObject.GDI32(?,00000000), ref: 00D796E2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ObjectSelect$BeginCreatePath
                                                            • String ID:
                                                            • API String ID: 3225163088-0
                                                            • Opcode ID: 26800452dbc97e7387a556c4d9c675b6f0eaae040507a43ba61ad6f87429c469
                                                            • Instruction ID: f72dbaf0b7869f160d169ead9b02411ab812f930c22df70a409faebb23ed64b6
                                                            • Opcode Fuzzy Hash: 26800452dbc97e7387a556c4d9c675b6f0eaae040507a43ba61ad6f87429c469
                                                            • Instruction Fuzzy Hash: 5921B331801309EFDB109F25DD287AD7FA4BB80761F14835AF414A21B0E3719859CBB0
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _memcmp
                                                            • String ID:
                                                            • API String ID: 2931989736-0
                                                            • Opcode ID: 2eea08010312a9bf8aa0c2f25bc1b8828a6c6c3e4d99f824f4005d8ec1ca3619
                                                            • Instruction ID: 1b96a1c87779b81224dd12411ce4004ba7012b7b7b1cf25e0961b7333bc118a1
                                                            • Opcode Fuzzy Hash: 2eea08010312a9bf8aa0c2f25bc1b8828a6c6c3e4d99f824f4005d8ec1ca3619
                                                            • Instruction Fuzzy Hash: 3E01B56664161ABFD2186610AE82FBB735CDF22394F144028FE049B2C5F760FDD983B4
                                                            APIs
                                                            • GetLastError.KERNEL32(?,?,?,00D8F2DE,00D93863,00E31444,?,00D7FDF5,?,?,00D6A976,00000010,00E31440,00D613FC,?,00D613C6), ref: 00D92DFD
                                                            • _free.LIBCMT ref: 00D92E32
                                                            • _free.LIBCMT ref: 00D92E59
                                                            • SetLastError.KERNEL32(00000000,00D61129), ref: 00D92E66
                                                            • SetLastError.KERNEL32(00000000,00D61129), ref: 00D92E6F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$_free
                                                            • String ID:
                                                            • API String ID: 3170660625-0
                                                            • Opcode ID: c757ad025834f72891c3262765382f2d5a44330e4382a24013449a1ec72a84b5
                                                            • Instruction ID: 532a7952f01f1d90f53b83829f8d3c6a859eea722671bfe9a6ebfdc56d1380ee
                                                            • Opcode Fuzzy Hash: c757ad025834f72891c3262765382f2d5a44330e4382a24013449a1ec72a84b5
                                                            • Instruction Fuzzy Hash: D201A4326456007BCF1277757CCAD3B26ADEFD13B5B294029F465E2292EB64CC158170
                                                            APIs
                                                            • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DBFF41,80070057,?,?,?,00DC035E), ref: 00DC002B
                                                            • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DBFF41,80070057,?,?), ref: 00DC0046
                                                            • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DBFF41,80070057,?,?), ref: 00DC0054
                                                            • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DBFF41,80070057,?), ref: 00DC0064
                                                            • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DBFF41,80070057,?,?), ref: 00DC0070
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: From$Prog$FreeStringTasklstrcmpi
                                                            • String ID:
                                                            • API String ID: 3897988419-0
                                                            • Opcode ID: 5e063d743e50a3ea7a2e4ee9d2e97856a290bdb0df5f0dba1be2b09083d944f8
                                                            • Instruction ID: 04869802ebaab1330f88bd86a999fcca16ac0ad9528f2fecc159bd82da6db091
                                                            • Opcode Fuzzy Hash: 5e063d743e50a3ea7a2e4ee9d2e97856a290bdb0df5f0dba1be2b09083d944f8
                                                            • Instruction Fuzzy Hash: 55017872610209EBDB114F68DD04FAA7EADEB48792F159128F905D3210E771DE40ABB0
                                                            APIs
                                                            • QueryPerformanceCounter.KERNEL32(?), ref: 00DCE997
                                                            • QueryPerformanceFrequency.KERNEL32(?), ref: 00DCE9A5
                                                            • Sleep.KERNEL32(00000000), ref: 00DCE9AD
                                                            • QueryPerformanceCounter.KERNEL32(?), ref: 00DCE9B7
                                                            • Sleep.KERNEL32 ref: 00DCE9F3
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: PerformanceQuery$CounterSleep$Frequency
                                                            • String ID:
                                                            • API String ID: 2833360925-0
                                                            • Opcode ID: 32668360408f151da55d384762b8c46ce7fb23af2d84e8bf76a37bbece70214b
                                                            • Instruction ID: 65708ec0f09a8e1e2a90fe1e1e75dc5a8c72d5ad68e6ad8e2a10f37f83fe0702
                                                            • Opcode Fuzzy Hash: 32668360408f151da55d384762b8c46ce7fb23af2d84e8bf76a37bbece70214b
                                                            • Instruction Fuzzy Hash: C4010571D0162EDBCF00ABE5D959AEDBB78FF09701F00455AE542B2241CB309665CBB2
                                                            APIs
                                                            • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00DC1114
                                                            • GetLastError.KERNEL32(?,00000000,00000000,?,?,00DC0B9B,?,?,?), ref: 00DC1120
                                                            • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00DC0B9B,?,?,?), ref: 00DC112F
                                                            • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00DC0B9B,?,?,?), ref: 00DC1136
                                                            • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00DC114D
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                            • String ID:
                                                            • API String ID: 842720411-0
                                                            • Opcode ID: 4241b178caed8ee150cf3a1281f2601ae77d22b96c890e57c5fac6a1a158d5de
                                                            • Instruction ID: ed2698519f8f4b27621fb93c90dc3e15af546a5de1a9664ac991fb0427e8700b
                                                            • Opcode Fuzzy Hash: 4241b178caed8ee150cf3a1281f2601ae77d22b96c890e57c5fac6a1a158d5de
                                                            • Instruction Fuzzy Hash: 1E016D79200319BFDB115FA4DD49E6A3B6EEF863A0B184418FA45C3360DB31DC20CA70
                                                            APIs
                                                            • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00DC0FCA
                                                            • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00DC0FD6
                                                            • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00DC0FE5
                                                            • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00DC0FEC
                                                            • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00DC1002
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: HeapInformationToken$AllocErrorLastProcess
                                                            • String ID:
                                                            • API String ID: 44706859-0
                                                            • Opcode ID: 28a7fc367d00eb600a71ff7911349fee7fb956e47e524835f6d77c51de8ea0f1
                                                            • Instruction ID: 679e36f3801c816421967f156cb5a896a9c3318b865e799ebe52e8c4af712752
                                                            • Opcode Fuzzy Hash: 28a7fc367d00eb600a71ff7911349fee7fb956e47e524835f6d77c51de8ea0f1
                                                            • Instruction Fuzzy Hash: ADF0AF39200316ABD7210FA4AD4AF663BADEF8A761F108415F905C7351CA30DC60DA70
                                                            APIs
                                                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00DC102A
                                                            • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00DC1036
                                                            • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00DC1045
                                                            • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00DC104C
                                                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00DC1062
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: HeapInformationToken$AllocErrorLastProcess
                                                            • String ID:
                                                            • API String ID: 44706859-0
                                                            • Opcode ID: 6aa9b414939bdc936dda3c4c352c524778a2f2df39e7a3ab947d3390acd928cb
                                                            • Instruction ID: 2245cb44cd79ffb4d7470ea5b37d0afa91b7e0d9ccfb9463e6a0c2998928ddec
                                                            • Opcode Fuzzy Hash: 6aa9b414939bdc936dda3c4c352c524778a2f2df39e7a3ab947d3390acd928cb
                                                            • Instruction Fuzzy Hash: 66F0CD3920031AEBDB211FA4ED4AF663BADEF8A761F104418FE05C7351CA30D860DA70
                                                            APIs
                                                            • CloseHandle.KERNEL32(?,?,?,?,00DD017D,?,00DD32FC,?,00000001,00DA2592,?), ref: 00DD0324
                                                            • CloseHandle.KERNEL32(?,?,?,?,00DD017D,?,00DD32FC,?,00000001,00DA2592,?), ref: 00DD0331
                                                            • CloseHandle.KERNEL32(?,?,?,?,00DD017D,?,00DD32FC,?,00000001,00DA2592,?), ref: 00DD033E
                                                            • CloseHandle.KERNEL32(?,?,?,?,00DD017D,?,00DD32FC,?,00000001,00DA2592,?), ref: 00DD034B
                                                            • CloseHandle.KERNEL32(?,?,?,?,00DD017D,?,00DD32FC,?,00000001,00DA2592,?), ref: 00DD0358
                                                            • CloseHandle.KERNEL32(?,?,?,?,00DD017D,?,00DD32FC,?,00000001,00DA2592,?), ref: 00DD0365
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CloseHandle
                                                            • String ID:
                                                            • API String ID: 2962429428-0
                                                            • Opcode ID: c02b081c2913cbcdef8374254495dbb047014c3250846e5fe022b8e4856a1a52
                                                            • Instruction ID: c133e096378b24a7d71be50f9e2909e58d8d85dea87a7e47f85189f576689f57
                                                            • Opcode Fuzzy Hash: c02b081c2913cbcdef8374254495dbb047014c3250846e5fe022b8e4856a1a52
                                                            • Instruction Fuzzy Hash: C001A272800B559FC7309F66D880916FBF9BF903153198A3FD19652A31C3B1A954DF90
                                                            APIs
                                                            • _free.LIBCMT ref: 00D9D752
                                                              • Part of subcall function 00D929C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00D9D7D1,00000000,00000000,00000000,00000000,?,00D9D7F8,00000000,00000007,00000000,?,00D9DBF5,00000000), ref: 00D929DE
                                                              • Part of subcall function 00D929C8: GetLastError.KERNEL32(00000000,?,00D9D7D1,00000000,00000000,00000000,00000000,?,00D9D7F8,00000000,00000007,00000000,?,00D9DBF5,00000000,00000000), ref: 00D929F0
                                                            • _free.LIBCMT ref: 00D9D764
                                                            • _free.LIBCMT ref: 00D9D776
                                                            • _free.LIBCMT ref: 00D9D788
                                                            • _free.LIBCMT ref: 00D9D79A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _free$ErrorFreeHeapLast
                                                            • String ID:
                                                            • API String ID: 776569668-0
                                                            • Opcode ID: 4f66f4faedcaa493673fb82c681d0638bc32ead95863765c05adbd416ddafff0
                                                            • Instruction ID: 5bc68462ea1c363ee205c3203c73ef4d12cf2557b5974c2485ae7f6e194865fa
                                                            • Opcode Fuzzy Hash: 4f66f4faedcaa493673fb82c681d0638bc32ead95863765c05adbd416ddafff0
                                                            • Instruction Fuzzy Hash: 4EF0FF32544204BB8B25FBA5F9C5C2A77DEFB447107A80805F04DE7501C730FC818AB4
                                                            APIs
                                                            • GetDlgItem.USER32(?,000003E9), ref: 00DC5C58
                                                            • GetWindowTextW.USER32(00000000,?,00000100), ref: 00DC5C6F
                                                            • MessageBeep.USER32(00000000), ref: 00DC5C87
                                                            • KillTimer.USER32(?,0000040A), ref: 00DC5CA3
                                                            • EndDialog.USER32(?,00000001), ref: 00DC5CBD
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                            • String ID:
                                                            • API String ID: 3741023627-0
                                                            • Opcode ID: b40865eaaeb5f8b271547307c7236d693abb2a662782498dc4ad7eb7ecf22e3b
                                                            • Instruction ID: a9a357a000a0728059693dd1f813adbaed32cfe7d50a913b92093590b40c336b
                                                            • Opcode Fuzzy Hash: b40865eaaeb5f8b271547307c7236d693abb2a662782498dc4ad7eb7ecf22e3b
                                                            • Instruction Fuzzy Hash: B7018B30510705ABEB205B10EF4EFA577B8BF00B05F04555DA593E11E1DBF0B998CA70
                                                            APIs
                                                            • _free.LIBCMT ref: 00D922BE
                                                              • Part of subcall function 00D929C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00D9D7D1,00000000,00000000,00000000,00000000,?,00D9D7F8,00000000,00000007,00000000,?,00D9DBF5,00000000), ref: 00D929DE
                                                              • Part of subcall function 00D929C8: GetLastError.KERNEL32(00000000,?,00D9D7D1,00000000,00000000,00000000,00000000,?,00D9D7F8,00000000,00000007,00000000,?,00D9DBF5,00000000,00000000), ref: 00D929F0
                                                            • _free.LIBCMT ref: 00D922D0
                                                            • _free.LIBCMT ref: 00D922E3
                                                            • _free.LIBCMT ref: 00D922F4
                                                            • _free.LIBCMT ref: 00D92305
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _free$ErrorFreeHeapLast
                                                            • String ID:
                                                            • API String ID: 776569668-0
                                                            • Opcode ID: 0ff30c91d81b66afb2ce59f1d808022b1caec44e35d2929537fb3548e3f439ef
                                                            • Instruction ID: fac92cb21a7316c2fbd9054976a2a9762fdb28fab71f37150b4ce4a3b39f02ae
                                                            • Opcode Fuzzy Hash: 0ff30c91d81b66afb2ce59f1d808022b1caec44e35d2929537fb3548e3f439ef
                                                            • Instruction Fuzzy Hash: 0EF01770940524AF8B26FF56FC0982D3E64FB58760714054AF414F23B1C730191AAEF4
                                                            APIs
                                                            • EndPath.GDI32(?), ref: 00D795D4
                                                            • StrokeAndFillPath.GDI32(?,?,00DB71F7,00000000,?,?,?), ref: 00D795F0
                                                            • SelectObject.GDI32(?,00000000), ref: 00D79603
                                                            • DeleteObject.GDI32 ref: 00D79616
                                                            • StrokePath.GDI32(?), ref: 00D79631
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Path$ObjectStroke$DeleteFillSelect
                                                            • String ID:
                                                            • API String ID: 2625713937-0
                                                            • Opcode ID: c51ed55535dc0dbb30bd39cb30dccea319fdc346f392e718dbfc06c41f7a248c
                                                            • Instruction ID: 66c423cfe5fcac58b9179b7bf113abc086f496f83b6fbb7698f9229367e775c9
                                                            • Opcode Fuzzy Hash: c51ed55535dc0dbb30bd39cb30dccea319fdc346f392e718dbfc06c41f7a248c
                                                            • Instruction Fuzzy Hash: 62F0E43500570CEFDB129F66EE2CB683F61AB81372F04C258A469A51F0DB3089A9DF30
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: __freea$_free
                                                            • String ID: a/p$am/pm
                                                            • API String ID: 3432400110-3206640213
                                                            • Opcode ID: a970cd51b341444d5774fd1b41ebe170f9810aa89753ed603d37bd955b09d438
                                                            • Instruction ID: a78674a20098e00f3ec9433cce6adf99947c491a63b66bdc0f928372197b02a9
                                                            • Opcode Fuzzy Hash: a970cd51b341444d5774fd1b41ebe170f9810aa89753ed603d37bd955b09d438
                                                            • Instruction Fuzzy Hash: 37D1F139A00207DADF299F68C846BFEB7B1FF06300F284259E955AB650D3759D80CBB1
                                                            APIs
                                                              • Part of subcall function 00D80242: EnterCriticalSection.KERNEL32(00E3070C,00E31884,?,?,00D7198B,00E32518,?,?,?,00D612F9,00000000), ref: 00D8024D
                                                              • Part of subcall function 00D80242: LeaveCriticalSection.KERNEL32(00E3070C,?,00D7198B,00E32518,?,?,?,00D612F9,00000000), ref: 00D8028A
                                                              • Part of subcall function 00D800A3: __onexit.LIBCMT ref: 00D800A9
                                                            • __Init_thread_footer.LIBCMT ref: 00DE6238
                                                              • Part of subcall function 00D801F8: EnterCriticalSection.KERNEL32(00E3070C,?,?,00D78747,00E32514), ref: 00D80202
                                                              • Part of subcall function 00D801F8: LeaveCriticalSection.KERNEL32(00E3070C,?,00D78747,00E32514), ref: 00D80235
                                                              • Part of subcall function 00DD359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00DD35E4
                                                              • Part of subcall function 00DD359C: LoadStringW.USER32(00E32390,?,00000FFF,?), ref: 00DD360A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                                                            • String ID: x#$x#$x#
                                                            • API String ID: 1072379062-1894725482
                                                            • Opcode ID: 5109cc3d0a2c73093be730abc0430c0d1af1c6be7e5338824116d3578519a1af
                                                            • Instruction ID: 1376d49c27d89475a55655a2d34d0a5b8c7d89f070cd936f3f04dabb97ed0300
                                                            • Opcode Fuzzy Hash: 5109cc3d0a2c73093be730abc0430c0d1af1c6be7e5338824116d3578519a1af
                                                            • Instruction Fuzzy Hash: 59C19E71A00245AFCB14EF59C895EBEB7B9EF58340F148069FA45AB291DB70ED44CBB0
                                                            APIs
                                                              • Part of subcall function 00D80242: EnterCriticalSection.KERNEL32(00E3070C,00E31884,?,?,00D7198B,00E32518,?,?,?,00D612F9,00000000), ref: 00D8024D
                                                              • Part of subcall function 00D80242: LeaveCriticalSection.KERNEL32(00E3070C,?,00D7198B,00E32518,?,?,?,00D612F9,00000000), ref: 00D8028A
                                                              • Part of subcall function 00D69CB3: _wcslen.LIBCMT ref: 00D69CBD
                                                              • Part of subcall function 00D800A3: __onexit.LIBCMT ref: 00D800A9
                                                            • __Init_thread_footer.LIBCMT ref: 00DE7BFB
                                                              • Part of subcall function 00D801F8: EnterCriticalSection.KERNEL32(00E3070C,?,?,00D78747,00E32514), ref: 00D80202
                                                              • Part of subcall function 00D801F8: LeaveCriticalSection.KERNEL32(00E3070C,?,00D78747,00E32514), ref: 00D80235
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                            • String ID: 5$G$Variable must be of type 'Object'.
                                                            • API String ID: 535116098-3733170431
                                                            • Opcode ID: 9d289234465ba097d4e8cf1e2be4981625d4c5c09a37dcab3ff0f269118b8ccb
                                                            • Instruction ID: 41b1fd96345f290fdce3d8286f141965f15cd1ce833a004527fe79499584c282
                                                            • Opcode Fuzzy Hash: 9d289234465ba097d4e8cf1e2be4981625d4c5c09a37dcab3ff0f269118b8ccb
                                                            • Instruction Fuzzy Hash: 70918A74A04249EFCB04EF56D991DADBBB5FF48300F148049F846AB292DB71AE45CB71
                                                            APIs
                                                              • Part of subcall function 00DCB403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00DC21D0,?,?,00000034,00000800,?,00000034), ref: 00DCB42D
                                                            • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00DC2760
                                                              • Part of subcall function 00DCB3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00DC21FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00DCB3F8
                                                              • Part of subcall function 00DCB32A: GetWindowThreadProcessId.USER32(?,?), ref: 00DCB355
                                                              • Part of subcall function 00DCB32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00DC2194,00000034,?,?,00001004,00000000,00000000), ref: 00DCB365
                                                              • Part of subcall function 00DCB32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00DC2194,00000034,?,?,00001004,00000000,00000000), ref: 00DCB37B
                                                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00DC27CD
                                                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00DC281A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                            • String ID: @
                                                            • API String ID: 4150878124-2766056989
                                                            • Opcode ID: 36185f3887b3d4c3d32432d5b550a34b4f013ac5d757bc39bbf79eecd8f45e3e
                                                            • Instruction ID: 19b6d400d59b77e0c62053dfcf39c558140d3b1a34cf6b223596645742538d0d
                                                            • Opcode Fuzzy Hash: 36185f3887b3d4c3d32432d5b550a34b4f013ac5d757bc39bbf79eecd8f45e3e
                                                            • Instruction Fuzzy Hash: 6A413A72900219AFDB10DBA4C982FEEBBB8EF09310F144059FA55B7181DA70AE45CBB1
                                                            APIs
                                                            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 00D91769
                                                            • _free.LIBCMT ref: 00D91834
                                                            • _free.LIBCMT ref: 00D9183E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _free$FileModuleName
                                                            • String ID: C:\Users\user\Desktop\file.exe
                                                            • API String ID: 2506810119-4010620828
                                                            • Opcode ID: 138ad83e500c9d29bf85254f8d2c05b8fd22f6886cd5cb58667eb7bc971ae4cd
                                                            • Instruction ID: 1094b7bbaca4c569670c6499978fe1a1a3fc2fd7b463678befceb8bcac8ff8dc
                                                            • Opcode Fuzzy Hash: 138ad83e500c9d29bf85254f8d2c05b8fd22f6886cd5cb58667eb7bc971ae4cd
                                                            • Instruction Fuzzy Hash: 45318179A0025AFFDF21DB999885D9EBBBCEF85310B1441AAF804D7211D6708E44DBB0
                                                            APIs
                                                            • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00DCC306
                                                            • DeleteMenu.USER32(?,00000007,00000000), ref: 00DCC34C
                                                            • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00E31990,00F452B0), ref: 00DCC395
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Menu$Delete$InfoItem
                                                            • String ID: 0
                                                            • API String ID: 135850232-4108050209
                                                            • Opcode ID: af8af6d1580a81f6a3902677e40946f3fa9f596d6082e9ef2e5bde02991200f1
                                                            • Instruction ID: 684691e7c691d0e81cb183bddb932c2754bda66fe27f70087ac1e40f6cfe6301
                                                            • Opcode Fuzzy Hash: af8af6d1580a81f6a3902677e40946f3fa9f596d6082e9ef2e5bde02991200f1
                                                            • Instruction Fuzzy Hash: 614191712143429FDB20DF24E845F2ABBE4EB85320F04961EFAA9D7291D730E904CB72
                                                            APIs
                                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00DFCC08,00000000,?,?,?,?), ref: 00DF44AA
                                                            • GetWindowLongW.USER32 ref: 00DF44C7
                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00DF44D7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Window$Long
                                                            • String ID: SysTreeView32
                                                            • API String ID: 847901565-1698111956
                                                            • Opcode ID: b7a5f97330dc5064a4c796d3eade0d7c6afe164673d1eff651dd6c0819479160
                                                            • Instruction ID: 95787a398b87dc6350054eda0b185815adb1382ffb46aca5aa2d0f914ddd7c3c
                                                            • Opcode Fuzzy Hash: b7a5f97330dc5064a4c796d3eade0d7c6afe164673d1eff651dd6c0819479160
                                                            • Instruction Fuzzy Hash: 08316D31214209AFDB209E38DC45BEB77A9EB08324F258715FA79E22E0D770EC549B60
                                                            APIs
                                                              • Part of subcall function 00DE335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00DE3077,?,?), ref: 00DE3378
                                                            • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00DE307A
                                                            • _wcslen.LIBCMT ref: 00DE309B
                                                            • htons.WSOCK32(00000000,?,?,00000000), ref: 00DE3106
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                            • String ID: 255.255.255.255
                                                            • API String ID: 946324512-2422070025
                                                            • Opcode ID: b11f378ed5637471eecf07c82e0049ea48851f812c8fe2cdcb7d279d1ef2e562
                                                            • Instruction ID: 7dced212dd560af03780c9940fef17f0f8175842a80366227f42db2258e3361c
                                                            • Opcode Fuzzy Hash: b11f378ed5637471eecf07c82e0049ea48851f812c8fe2cdcb7d279d1ef2e562
                                                            • Instruction Fuzzy Hash: EE31D3352043859FCB20EF6AC589EBA77E0EF54318F298059E8158B392DB32EE45C770
                                                            APIs
                                                            • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00DF3F40
                                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00DF3F54
                                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00DF3F78
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Window
                                                            • String ID: SysMonthCal32
                                                            • API String ID: 2326795674-1439706946
                                                            • Opcode ID: d6bdb491306e588695fcd8b161bc27ee7f90d2272f2f1d9892cf275eba10685d
                                                            • Instruction ID: 094734f6e28e61fa664ffe72dacbd3219ec85f2b8e1c0c398489f384bb90c941
                                                            • Opcode Fuzzy Hash: d6bdb491306e588695fcd8b161bc27ee7f90d2272f2f1d9892cf275eba10685d
                                                            • Instruction Fuzzy Hash: DF21AB32610219BBDF258F50CC46FEA3B79EF48724F164218FE15AB190D6B1A890CBA0
                                                            APIs
                                                            • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00DF4705
                                                            • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00DF4713
                                                            • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00DF471A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$DestroyWindow
                                                            • String ID: msctls_updown32
                                                            • API String ID: 4014797782-2298589950
                                                            • Opcode ID: c9c497b602c32a2c370d418cc9c65eabe07ec2bd69924c2fffc1a6fb243bdc99
                                                            • Instruction ID: baa6de85721da91c632d7597f912272d2c733fd20df0dc903ae444c32291b763
                                                            • Opcode Fuzzy Hash: c9c497b602c32a2c370d418cc9c65eabe07ec2bd69924c2fffc1a6fb243bdc99
                                                            • Instruction Fuzzy Hash: 65212FB5604209AFDB10DF69DC85DB737ADEB9A368B054059FA00DB251C771EC11CA70
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _wcslen
                                                            • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                            • API String ID: 176396367-2734436370
                                                            • Opcode ID: 8812890609eb3eda07aa8eaff70a469993442f35d448a1829975346235484bb0
                                                            • Instruction ID: e2d88a32ec2c49bbded5cd840e171f8eed7eefc9b5cd2618be3cab470615ac6b
                                                            • Opcode Fuzzy Hash: 8812890609eb3eda07aa8eaff70a469993442f35d448a1829975346235484bb0
                                                            • Instruction Fuzzy Hash: 4221383225415266D331BB24DC2AFB7F398EF55314F58402EF98997081EB61DD45C3B5
                                                            APIs
                                                            • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00DF3840
                                                            • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00DF3850
                                                            • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00DF3876
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$MoveWindow
                                                            • String ID: Listbox
                                                            • API String ID: 3315199576-2633736733
                                                            • Opcode ID: 5993e7a390777fd629cea0d185bf25aab1efe9b1058d1132d98ebd08c4b98788
                                                            • Instruction ID: 7bcd31705e46a6002d0a582768f9e9a94088100045a512d985e64e850d40d7f4
                                                            • Opcode Fuzzy Hash: 5993e7a390777fd629cea0d185bf25aab1efe9b1058d1132d98ebd08c4b98788
                                                            • Instruction Fuzzy Hash: 2121BE7261021CBBEB219F64DC85EBB376AEF897A0F16C124FA009B190C675DC52C7B0
                                                            APIs
                                                            • SetErrorMode.KERNEL32(00000001), ref: 00DD4A08
                                                            • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00DD4A5C
                                                            • SetErrorMode.KERNEL32(00000000,?,?,00DFCC08), ref: 00DD4AD0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ErrorMode$InformationVolume
                                                            • String ID: %lu
                                                            • API String ID: 2507767853-685833217
                                                            • Opcode ID: 8ff0f23a8a4c4374d431e0f7b996c7e6968b3be0ce9dd32c121c92166fc27506
                                                            • Instruction ID: 865fd3afd742ed6ec2dd582b51c4b4514a18c4819de38d27b6744b73fc8868f3
                                                            • Opcode Fuzzy Hash: 8ff0f23a8a4c4374d431e0f7b996c7e6968b3be0ce9dd32c121c92166fc27506
                                                            • Instruction Fuzzy Hash: 92313E75A00209AFDB10DF54C985EAABBF8EF08318F1480A9E909DB352D771EE55CB71
                                                            APIs
                                                            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00DF424F
                                                            • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00DF4264
                                                            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00DF4271
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID: msctls_trackbar32
                                                            • API String ID: 3850602802-1010561917
                                                            • Opcode ID: 40727b3b86769840bb02abb8f0294528e1e95dafe75e416519ddcb412f5566df
                                                            • Instruction ID: dbf916b5c9239c9d8af47abf93a29a502b01d08dc93783ce8a6696c1168b162b
                                                            • Opcode Fuzzy Hash: 40727b3b86769840bb02abb8f0294528e1e95dafe75e416519ddcb412f5566df
                                                            • Instruction Fuzzy Hash: F211E33124024CBEEF205E29CC06FBB3BACEF85B64F028528FA55E21A0D271D811DB34
                                                            APIs
                                                              • Part of subcall function 00D66B57: _wcslen.LIBCMT ref: 00D66B6A
                                                              • Part of subcall function 00DC2DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00DC2DC5
                                                              • Part of subcall function 00DC2DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00DC2DD6
                                                              • Part of subcall function 00DC2DA7: GetCurrentThreadId.KERNEL32 ref: 00DC2DDD
                                                              • Part of subcall function 00DC2DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00DC2DE4
                                                            • GetFocus.USER32 ref: 00DC2F78
                                                              • Part of subcall function 00DC2DEE: GetParent.USER32(00000000), ref: 00DC2DF9
                                                            • GetClassNameW.USER32(?,?,00000100), ref: 00DC2FC3
                                                            • EnumChildWindows.USER32(?,00DC303B), ref: 00DC2FEB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                            • String ID: %s%d
                                                            • API String ID: 1272988791-1110647743
                                                            • Opcode ID: fb483f50fae462df5af976997fe1389d959d67b6d47f89dc102a951e0cf53bd5
                                                            • Instruction ID: 42c3c7a9e975f8e7354df215f7f99e5ad6def64bb14c196fa2bc763959bcd80e
                                                            • Opcode Fuzzy Hash: fb483f50fae462df5af976997fe1389d959d67b6d47f89dc102a951e0cf53bd5
                                                            • Instruction Fuzzy Hash: 1311907160020AABCF556F649C86FFD376AEF94304F04D079B909DB292EE7099499B70
                                                            APIs
                                                            • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00DF58C1
                                                            • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00DF58EE
                                                            • DrawMenuBar.USER32(?), ref: 00DF58FD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Menu$InfoItem$Draw
                                                            • String ID: 0
                                                            • API String ID: 3227129158-4108050209
                                                            • Opcode ID: cd056664265eaed166cbd239c08451258399418f5fa15abbc433e5729b8c5906
                                                            • Instruction ID: 830c285e9c58e4f5e412c8f7a8c05f28bb1491f05f999dc30e8701836464cf36
                                                            • Opcode Fuzzy Hash: cd056664265eaed166cbd239c08451258399418f5fa15abbc433e5729b8c5906
                                                            • Instruction Fuzzy Hash: C101393150021CEEDB219F21E844BAABBB4FF45360F14C099EA89D6251EB708A94EF31
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 67fca20320824de370525af99c2a197d4b007aaac95a03d1d43fe91c0e79aaf7
                                                            • Instruction ID: 21749e78827cef215ac348bf2ac9670513b4a1dfae0193a3ff9352608fb64482
                                                            • Opcode Fuzzy Hash: 67fca20320824de370525af99c2a197d4b007aaac95a03d1d43fe91c0e79aaf7
                                                            • Instruction Fuzzy Hash: 2CC10975A0021AEFDB14CF98C894FAABBB5FF48704F258598E505EB251D731EE41CBA0
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: __alldvrm$_strrchr
                                                            • String ID:
                                                            • API String ID: 1036877536-0
                                                            • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                            • Instruction ID: 992a2ac133044f1ec965affb92c31d54f8ef35b1db87da2810cab520df893eea
                                                            • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                            • Instruction Fuzzy Hash: 3CA14A76E007869FDF25CF18C891BAEBBE5EF65350F18426DE5959B282C2348D82C770
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Variant$ClearInitInitializeUninitialize
                                                            • String ID:
                                                            • API String ID: 1998397398-0
                                                            • Opcode ID: 22061d5ba83d185bc0dc3312c5dbec34b104a01d935f5570f95fb50e94a1cd06
                                                            • Instruction ID: f56c7121adb3d0ed36d76a15325cce858bb35c35176d73ace7105127257a5daf
                                                            • Opcode Fuzzy Hash: 22061d5ba83d185bc0dc3312c5dbec34b104a01d935f5570f95fb50e94a1cd06
                                                            • Instruction Fuzzy Hash: EBA106756146449FC710EF29C585A2AB7E5FF88714F048859F98A9B362DB30EE01CBB1
                                                            APIs
                                                            • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00DFFC08,?), ref: 00DC05F0
                                                            • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00DFFC08,?), ref: 00DC0608
                                                            • CLSIDFromProgID.OLE32(?,?,00000000,00DFCC40,000000FF,?,00000000,00000800,00000000,?,00DFFC08,?), ref: 00DC062D
                                                            • _memcmp.LIBVCRUNTIME ref: 00DC064E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: FromProg$FreeTask_memcmp
                                                            • String ID:
                                                            • API String ID: 314563124-0
                                                            • Opcode ID: a08dcdadebf384f81d067902f8abb34ce9bf3ffdab66c81ca8409576bfeea197
                                                            • Instruction ID: 2c149a66a26d01c2999856348fbf2df86e5abaa14ce1e4756613d8c2226d6c0e
                                                            • Opcode Fuzzy Hash: a08dcdadebf384f81d067902f8abb34ce9bf3ffdab66c81ca8409576bfeea197
                                                            • Instruction Fuzzy Hash: DC81FA75A1010AEFCB04DF94C984EEEBBB9FF89315F244558E506AB250DB71AE06CF60
                                                            APIs
                                                            • CreateToolhelp32Snapshot.KERNEL32 ref: 00DEA6AC
                                                            • Process32FirstW.KERNEL32(00000000,?), ref: 00DEA6BA
                                                              • Part of subcall function 00D69CB3: _wcslen.LIBCMT ref: 00D69CBD
                                                            • Process32NextW.KERNEL32(00000000,?), ref: 00DEA79C
                                                            • CloseHandle.KERNEL32(00000000), ref: 00DEA7AB
                                                              • Part of subcall function 00D7CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00DA3303,?), ref: 00D7CE8A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                            • String ID:
                                                            • API String ID: 1991900642-0
                                                            • Opcode ID: cfdb2a3a366bcd81a4f00ac45bb8d7c4b22166526509012edc9d28138a06ed2b
                                                            • Instruction ID: 7ac961499808ecba414d824e783947abd9e49080f472439f612eaa7dd7028a05
                                                            • Opcode Fuzzy Hash: cfdb2a3a366bcd81a4f00ac45bb8d7c4b22166526509012edc9d28138a06ed2b
                                                            • Instruction Fuzzy Hash: 94513A71508341AFD710EF25C886A6BBBE8FF89754F04891DF58997291EB30E904CBB2
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _free
                                                            • String ID:
                                                            • API String ID: 269201875-0
                                                            • Opcode ID: 3b62e4241c0e04aafdf66be6f73aa6de03eb7dafefc489bcca78fb59bc1e0c13
                                                            • Instruction ID: 219623e6b9a09af6bc3c2b06195130d825a3e1afd7980098d579899fa9146794
                                                            • Opcode Fuzzy Hash: 3b62e4241c0e04aafdf66be6f73aa6de03eb7dafefc489bcca78fb59bc1e0c13
                                                            • Instruction Fuzzy Hash: 8B414C39A00214ABDF217BFD9C45BBE3AA5EF4B370F184225F418D62D2E7B4884193B1
                                                            APIs
                                                            • GetWindowRect.USER32(?,?), ref: 00DF62E2
                                                            • ScreenToClient.USER32(?,?), ref: 00DF6315
                                                            • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00DF6382
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Window$ClientMoveRectScreen
                                                            • String ID:
                                                            • API String ID: 3880355969-0
                                                            • Opcode ID: 997c973d842ebffc20d246d57668c73c511b18bad8ce7fe00d215d698e20895d
                                                            • Instruction ID: c978dc49555f199826b7a2b72ece21681b3a5475641411ec42ec56df77a6864b
                                                            • Opcode Fuzzy Hash: 997c973d842ebffc20d246d57668c73c511b18bad8ce7fe00d215d698e20895d
                                                            • Instruction Fuzzy Hash: 5A513A74A00209EFCB14DF68D980ABE7BF5EF95360F198169F9159B6A0D730ED81CB60
                                                            APIs
                                                            • socket.WSOCK32(00000002,00000002,00000011), ref: 00DE1AFD
                                                            • WSAGetLastError.WSOCK32 ref: 00DE1B0B
                                                            • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00DE1B8A
                                                            • WSAGetLastError.WSOCK32 ref: 00DE1B94
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$socket
                                                            • String ID:
                                                            • API String ID: 1881357543-0
                                                            • Opcode ID: 5f7256374a3bdb932361616586609d13cb7038b0df8c00d63dcde3b0cd6b8062
                                                            • Instruction ID: 9d7a8aa44da8988491d6de9b86498a088791ed5e756a8bafd316955855118502
                                                            • Opcode Fuzzy Hash: 5f7256374a3bdb932361616586609d13cb7038b0df8c00d63dcde3b0cd6b8062
                                                            • Instruction Fuzzy Hash: 32418278600200AFD720AF25C886F2677E5EB45718F58C458F95A9F3D2D672ED41CBB0
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2ba31d11361ecda9c28c97a6e87f65d8af728d3e4934befd196e7dd0ec3bf878
                                                            • Instruction ID: 3dc666192ffcfcb6bff9a4a5ca30c6810a32cf7f75fb141df66a73542f1f6424
                                                            • Opcode Fuzzy Hash: 2ba31d11361ecda9c28c97a6e87f65d8af728d3e4934befd196e7dd0ec3bf878
                                                            • Instruction Fuzzy Hash: 27412675A00304BFDB24AF78DD41BAABBE9EB88724F11452BF141DB292D371990187B0
                                                            APIs
                                                            • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00DD5783
                                                            • GetLastError.KERNEL32(?,00000000), ref: 00DD57A9
                                                            • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00DD57CE
                                                            • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00DD57FA
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CreateHardLink$DeleteErrorFileLast
                                                            • String ID:
                                                            • API String ID: 3321077145-0
                                                            • Opcode ID: 463d667848b49b2ac5a377b75c2bbedd9624959cf36e08604044d885c8d485f6
                                                            • Instruction ID: 85734535230732632985f87ddf8f1bcdb3273a7631a95aeb41948e1094688bf5
                                                            • Opcode Fuzzy Hash: 463d667848b49b2ac5a377b75c2bbedd9624959cf36e08604044d885c8d485f6
                                                            • Instruction Fuzzy Hash: B9412939610614DFCB11EF15C544A5EBBE2EF89324B19C489E84AAB362CB30FD50CBB1
                                                            APIs
                                                            • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00D86D71,00000000,00000000,00D882D9,?,00D882D9,?,00000001,00D86D71,8BE85006,00000001,00D882D9,00D882D9), ref: 00D9D910
                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00D9D999
                                                            • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00D9D9AB
                                                            • __freea.LIBCMT ref: 00D9D9B4
                                                              • Part of subcall function 00D93820: RtlAllocateHeap.NTDLL(00000000,?,00E31444,?,00D7FDF5,?,?,00D6A976,00000010,00E31440,00D613FC,?,00D613C6,?,00D61129), ref: 00D93852
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                            • String ID:
                                                            • API String ID: 2652629310-0
                                                            • Opcode ID: cd65c6cfd6a132616a4854269006814eca4bed78dfc517d6f11ae7f7296efaad
                                                            • Instruction ID: 5820bf6dee32c85591150fcedb05a9df070cea4396355aa52bcc0c2e5705d4f0
                                                            • Opcode Fuzzy Hash: cd65c6cfd6a132616a4854269006814eca4bed78dfc517d6f11ae7f7296efaad
                                                            • Instruction Fuzzy Hash: 3E31B072A0020AABDF24EFA5DC41EAE7BA6EB40310B194169FC04D7250EB35CD64CBB0
                                                            APIs
                                                            • SendMessageW.USER32(?,00001024,00000000,?), ref: 00DF5352
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00DF5375
                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00DF5382
                                                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00DF53A8
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: LongWindow$InvalidateMessageRectSend
                                                            • String ID:
                                                            • API String ID: 3340791633-0
                                                            • Opcode ID: cd25751979ddf15d2151c235ad9c118ed9a8a7a4188b79c12367e5f462c870b6
                                                            • Instruction ID: f29afc944fb6984ccd50e693e6735443641df89c0b69862f59905083db0a4851
                                                            • Opcode Fuzzy Hash: cd25751979ddf15d2151c235ad9c118ed9a8a7a4188b79c12367e5f462c870b6
                                                            • Instruction Fuzzy Hash: 6A31C134A55A0CEFEB209A1CEC05BF877E1AB04390F5EC001FB51962E5C7B1A940DB72
                                                            APIs
                                                            • GetKeyboardState.USER32(?,75A4C0D0,?,00008000), ref: 00DCABF1
                                                            • SetKeyboardState.USER32(00000080,?,00008000), ref: 00DCAC0D
                                                            • PostMessageW.USER32(00000000,00000101,00000000), ref: 00DCAC74
                                                            • SendInput.USER32(00000001,?,0000001C,75A4C0D0,?,00008000), ref: 00DCACC6
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: KeyboardState$InputMessagePostSend
                                                            • String ID:
                                                            • API String ID: 432972143-0
                                                            • Opcode ID: 305d270e507da66e3734e149fb622bba33a016709426b7954974888fe5a7b988
                                                            • Instruction ID: 45d17451702203853dd2f3a9fccc1db4d7d982582baf3575b6d9316d97d2401c
                                                            • Opcode Fuzzy Hash: 305d270e507da66e3734e149fb622bba33a016709426b7954974888fe5a7b988
                                                            • Instruction Fuzzy Hash: 37311634A4431E6FEF258B6C8908FFA7AA5AB85318F08431EE491932D1C37489958776
                                                            APIs
                                                            • ClientToScreen.USER32(?,?), ref: 00DF769A
                                                            • GetWindowRect.USER32(?,?), ref: 00DF7710
                                                            • PtInRect.USER32(?,?,00DF8B89), ref: 00DF7720
                                                            • MessageBeep.USER32(00000000), ref: 00DF778C
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Rect$BeepClientMessageScreenWindow
                                                            • String ID:
                                                            • API String ID: 1352109105-0
                                                            • Opcode ID: d5328cf3cf8718154b9d6dfd3de040113bf023ac1628e7489b2c9be33c664b5f
                                                            • Instruction ID: c0690dfdc8678df039a680a9311f4f7336960e41c6866f1b81b8d66281ed67b3
                                                            • Opcode Fuzzy Hash: d5328cf3cf8718154b9d6dfd3de040113bf023ac1628e7489b2c9be33c664b5f
                                                            • Instruction Fuzzy Hash: 4C415A3461521CDFCB01EF59C894EF97BB5BB49314F1AC0A8E6149B261C730A946CBA0
                                                            APIs
                                                            • GetForegroundWindow.USER32 ref: 00DF16EB
                                                              • Part of subcall function 00DC3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00DC3A57
                                                              • Part of subcall function 00DC3A3D: GetCurrentThreadId.KERNEL32 ref: 00DC3A5E
                                                              • Part of subcall function 00DC3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00DC25B3), ref: 00DC3A65
                                                            • GetCaretPos.USER32(?), ref: 00DF16FF
                                                            • ClientToScreen.USER32(00000000,?), ref: 00DF174C
                                                            • GetForegroundWindow.USER32 ref: 00DF1752
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                            • String ID:
                                                            • API String ID: 2759813231-0
                                                            • Opcode ID: c17e4d0aaf8f9f2e02db12b775ffa3809d91c6cb105bbfcc8617be8e4b62a5ad
                                                            • Instruction ID: 9bdfb497163e411598d24d1af370ce129f313069218412f3932bac582c616f05
                                                            • Opcode Fuzzy Hash: c17e4d0aaf8f9f2e02db12b775ffa3809d91c6cb105bbfcc8617be8e4b62a5ad
                                                            • Instruction Fuzzy Hash: 82313D75D10249EFC704EFA9C981DAEBBF9EF88304B5480AAE455E7211E631DE45CBB0
                                                            APIs
                                                              • Part of subcall function 00D79BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00D79BB2
                                                            • GetCursorPos.USER32(?), ref: 00DF9001
                                                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00DB7711,?,?,?,?,?), ref: 00DF9016
                                                            • GetCursorPos.USER32(?), ref: 00DF905E
                                                            • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00DB7711,?,?,?), ref: 00DF9094
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                            • String ID:
                                                            • API String ID: 2864067406-0
                                                            • Opcode ID: 0a029730879f406584d1f60b340e683dae7adcc8dc40b07c87ec9dccd46a1765
                                                            • Instruction ID: 1995f4f261281efa206c3089532fcb72428cd1c992d252ec4a4fdcdeeb775455
                                                            • Opcode Fuzzy Hash: 0a029730879f406584d1f60b340e683dae7adcc8dc40b07c87ec9dccd46a1765
                                                            • Instruction Fuzzy Hash: 59217E35A0011CEFDB158FA5C868FFABBB9EB89350F058069F6059B2A1C7319990DF70
                                                            APIs
                                                            • GetFileAttributesW.KERNEL32(?,00DFCB68), ref: 00DCD2FB
                                                            • GetLastError.KERNEL32 ref: 00DCD30A
                                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00DCD319
                                                            • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00DFCB68), ref: 00DCD376
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CreateDirectory$AttributesErrorFileLast
                                                            • String ID:
                                                            • API String ID: 2267087916-0
                                                            • Opcode ID: 8769c89d6df5a7d5eca4d4472cf93a63f39ad7198ad950264f3e94c824e4e0e4
                                                            • Instruction ID: 1c73a97c2832f4ef2cca73ca330ce69e58e390c0cb41b3d410fb73c6f953ccb6
                                                            • Opcode Fuzzy Hash: 8769c89d6df5a7d5eca4d4472cf93a63f39ad7198ad950264f3e94c824e4e0e4
                                                            • Instruction Fuzzy Hash: E221B2705083069F8700DF28CD819AEB7E8EE56364F544A2EF499C72A1D730D94ACBB3
                                                            APIs
                                                              • Part of subcall function 00DC1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00DC102A
                                                              • Part of subcall function 00DC1014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00DC1036
                                                              • Part of subcall function 00DC1014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00DC1045
                                                              • Part of subcall function 00DC1014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00DC104C
                                                              • Part of subcall function 00DC1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00DC1062
                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00DC15BE
                                                            • _memcmp.LIBVCRUNTIME ref: 00DC15E1
                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00DC1617
                                                            • HeapFree.KERNEL32(00000000), ref: 00DC161E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                            • String ID:
                                                            • API String ID: 1592001646-0
                                                            • Opcode ID: 9f6d5e0d4923f4d8570c2c77fa44ef643469be9478faeadc8172551cf8f1042a
                                                            • Instruction ID: f305488af11a2e918d24678e2ac5663339c1db97e3aa13e5a6dba14f556501c4
                                                            • Opcode Fuzzy Hash: 9f6d5e0d4923f4d8570c2c77fa44ef643469be9478faeadc8172551cf8f1042a
                                                            • Instruction Fuzzy Hash: 91217A75E5021AAFDB10DFA4C945FEEB7B8EF46344F188459E441AB242E730AA05DBA0
                                                            APIs
                                                            • GetWindowLongW.USER32(?,000000EC), ref: 00DF280A
                                                            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00DF2824
                                                            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00DF2832
                                                            • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00DF2840
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Window$Long$AttributesLayered
                                                            • String ID:
                                                            • API String ID: 2169480361-0
                                                            • Opcode ID: bbe77bbacde816a7dfb25b5f490480366c29fdf61a0c7d74a6f91fd7787a1968
                                                            • Instruction ID: d188ff8eb36587308d4ddcd8c7bd77fc0c065821f54fc98508d2e448a353649b
                                                            • Opcode Fuzzy Hash: bbe77bbacde816a7dfb25b5f490480366c29fdf61a0c7d74a6f91fd7787a1968
                                                            • Instruction Fuzzy Hash: 8021AE31205619AFD7149B24C844FBA7BA5EF85324F19C158E526CB6E2C771ED82C7B0
                                                            APIs
                                                              • Part of subcall function 00DC8D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00DC790A,?,000000FF,?,00DC8754,00000000,?,0000001C,?,?), ref: 00DC8D8C
                                                              • Part of subcall function 00DC8D7D: lstrcpyW.KERNEL32(00000000,?,?,00DC790A,?,000000FF,?,00DC8754,00000000,?,0000001C,?,?,00000000), ref: 00DC8DB2
                                                              • Part of subcall function 00DC8D7D: lstrcmpiW.KERNEL32(00000000,?,00DC790A,?,000000FF,?,00DC8754,00000000,?,0000001C,?,?), ref: 00DC8DE3
                                                            • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00DC8754,00000000,?,0000001C,?,?,00000000), ref: 00DC7923
                                                            • lstrcpyW.KERNEL32(00000000,?,?,00DC8754,00000000,?,0000001C,?,?,00000000), ref: 00DC7949
                                                            • lstrcmpiW.KERNEL32(00000002,cdecl,?,00DC8754,00000000,?,0000001C,?,?,00000000), ref: 00DC7984
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: lstrcmpilstrcpylstrlen
                                                            • String ID: cdecl
                                                            • API String ID: 4031866154-3896280584
                                                            • Opcode ID: 5c3865d3feb2f8c4832a43d64859aa2bbfcade9458156acbaacd6eef6ee92cea
                                                            • Instruction ID: 24307c77397ae720f16bb93390de935874df08a30ada2461447666f30d32347b
                                                            • Opcode Fuzzy Hash: 5c3865d3feb2f8c4832a43d64859aa2bbfcade9458156acbaacd6eef6ee92cea
                                                            • Instruction Fuzzy Hash: 7111B43A200306ABCB255F34D845E7A77A5FF45350B50802EF946C7264EF319811DF71
                                                            APIs
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00DF7D0B
                                                            • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00DF7D2A
                                                            • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00DF7D42
                                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00DDB7AD,00000000), ref: 00DF7D6B
                                                              • Part of subcall function 00D79BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00D79BB2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Window$Long
                                                            • String ID:
                                                            • API String ID: 847901565-0
                                                            • Opcode ID: 428a40359f5240bad6c938e845d9151ba08879acb10a68a0697d16e65f268a30
                                                            • Instruction ID: 1f63a182168f5994b08ca7f0be76732fb0b7152c71d7e87cfa23931ce3760437
                                                            • Opcode Fuzzy Hash: 428a40359f5240bad6c938e845d9151ba08879acb10a68a0697d16e65f268a30
                                                            • Instruction Fuzzy Hash: 3B1193315146199FCB109F29DC04AB63BA5AF45360F5AC728F939D72F0D7309962CB60
                                                            APIs
                                                            • SendMessageW.USER32(?,00001060,?,00000004), ref: 00DF56BB
                                                            • _wcslen.LIBCMT ref: 00DF56CD
                                                            • _wcslen.LIBCMT ref: 00DF56D8
                                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00DF5816
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessageSend_wcslen
                                                            • String ID:
                                                            • API String ID: 455545452-0
                                                            • Opcode ID: 3fa3717e5f6c33f414cd42a239774d8577a300ff7cd596c8fbfa74832ff2f734
                                                            • Instruction ID: 54dc5aad45be30ee476428db37ef3d0d6633e59bdf2f43a351108801b2cbc951
                                                            • Opcode Fuzzy Hash: 3fa3717e5f6c33f414cd42a239774d8577a300ff7cd596c8fbfa74832ff2f734
                                                            • Instruction Fuzzy Hash: 2311B17560060DA6DB20AF61EC85AFE77ACEF11764B14C02AFB55D6085EBB0CA84CF70
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 98a8af415b00c5f02362ed0b672d579b3dfd6c97f3a2fcfa97f6ba2eee246968
                                                            • Instruction ID: 572653ffd33261d28f7375d4954ec48ea46ecefbb503bebfbdaa3377a7f2457b
                                                            • Opcode Fuzzy Hash: 98a8af415b00c5f02362ed0b672d579b3dfd6c97f3a2fcfa97f6ba2eee246968
                                                            • Instruction Fuzzy Hash: 91018BB620961B3EFF2126786CC0F37661DDF813B8B380325F521A22D2DB608C118170
                                                            APIs
                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 00DC1A47
                                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00DC1A59
                                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00DC1A6F
                                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00DC1A8A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID:
                                                            • API String ID: 3850602802-0
                                                            • Opcode ID: 774224cddebcaa973700951b1fc264702f91422cd9e424e6872da9c905745abc
                                                            • Instruction ID: bab6543aaff72179cd814d67c69a46314de4e626e9153d4e1792fafc1173fd6b
                                                            • Opcode Fuzzy Hash: 774224cddebcaa973700951b1fc264702f91422cd9e424e6872da9c905745abc
                                                            • Instruction Fuzzy Hash: EF113C3AD01229FFEB10DBA4CD85FADBB78EB04750F200095E600F7290D6716E51DBA4
                                                            APIs
                                                            • GetCurrentThreadId.KERNEL32 ref: 00DCE1FD
                                                            • MessageBoxW.USER32(?,?,?,?), ref: 00DCE230
                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00DCE246
                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00DCE24D
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                            • String ID:
                                                            • API String ID: 2880819207-0
                                                            • Opcode ID: 8378c177f9b41a9432df50baef045249422934ce9b2843d1e83456a95c802ea9
                                                            • Instruction ID: f024466d699a8a2a2707e29b148601bd2e334cc2c0d90074045b517d8e7ee8c2
                                                            • Opcode Fuzzy Hash: 8378c177f9b41a9432df50baef045249422934ce9b2843d1e83456a95c802ea9
                                                            • Instruction Fuzzy Hash: 2A11A1B6904359AFC7019BA99C09FAE7FADAB45324F058259F924E3291D6B0891487B0
                                                            APIs
                                                            • CreateThread.KERNEL32(00000000,?,00D8CFF9,00000000,00000004,00000000), ref: 00D8D218
                                                            • GetLastError.KERNEL32 ref: 00D8D224
                                                            • __dosmaperr.LIBCMT ref: 00D8D22B
                                                            • ResumeThread.KERNEL32(00000000), ref: 00D8D249
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                            • String ID:
                                                            • API String ID: 173952441-0
                                                            • Opcode ID: f712b919f3b63f25bfbceb0413b62d18fa3dc171ee0db86907f1ff86ecfe1596
                                                            • Instruction ID: 2294e9cbb954cb5d11e6db918260f243532ccddadd15b3293a720a1a7f2147f0
                                                            • Opcode Fuzzy Hash: f712b919f3b63f25bfbceb0413b62d18fa3dc171ee0db86907f1ff86ecfe1596
                                                            • Instruction Fuzzy Hash: CB01DE36815208BBDB217BA5DC09BAE7B6AEF82730F244219F925D61E0CB70C911C7B0
                                                            APIs
                                                              • Part of subcall function 00D79BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00D79BB2
                                                            • GetClientRect.USER32(?,?), ref: 00DF9F31
                                                            • GetCursorPos.USER32(?), ref: 00DF9F3B
                                                            • ScreenToClient.USER32(?,?), ref: 00DF9F46
                                                            • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00DF9F7A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Client$CursorLongProcRectScreenWindow
                                                            • String ID:
                                                            • API String ID: 4127811313-0
                                                            • Opcode ID: 9a061aca9aa02ae44e6fd29f5fa24efa4641b31a6fb49123f79f545fc00ebc0f
                                                            • Instruction ID: 261dee317f416c69ea1b018d594bf48c5ed2a3254857caffcaa4b2073e83c935
                                                            • Opcode Fuzzy Hash: 9a061aca9aa02ae44e6fd29f5fa24efa4641b31a6fb49123f79f545fc00ebc0f
                                                            • Instruction Fuzzy Hash: 3311363290021EABDB00DF68D899AFEBBB8EF45311F058455FA01E7250D730BA95CBB1
                                                            APIs
                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00D6604C
                                                            • GetStockObject.GDI32(00000011), ref: 00D66060
                                                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 00D6606A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CreateMessageObjectSendStockWindow
                                                            • String ID:
                                                            • API String ID: 3970641297-0
                                                            • Opcode ID: 8193f042b445851197d3c786da5224f80585a72aefdccc924591b977c671b3a1
                                                            • Instruction ID: 423d03ac612d29a5dc7bd46f9b0d2c212c7d7aef4af7a7f3857184edcfee8e2e
                                                            • Opcode Fuzzy Hash: 8193f042b445851197d3c786da5224f80585a72aefdccc924591b977c671b3a1
                                                            • Instruction Fuzzy Hash: 31115B72501608BFEF129FA49C44AEABF69EF093A4F044225FA1592120D732DC60DBB0
                                                            APIs
                                                            • ___BuildCatchObject.LIBVCRUNTIME ref: 00D83B56
                                                              • Part of subcall function 00D83AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00D83AD2
                                                              • Part of subcall function 00D83AA3: ___AdjustPointer.LIBCMT ref: 00D83AED
                                                            • _UnwindNestedFrames.LIBCMT ref: 00D83B6B
                                                            • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00D83B7C
                                                            • CallCatchBlock.LIBVCRUNTIME ref: 00D83BA4
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                            • String ID:
                                                            • API String ID: 737400349-0
                                                            • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                            • Instruction ID: 18544dd89548f6dd94c07b0f4f9f207e852e1313fddcd7fa0c9b727368b933b7
                                                            • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                            • Instruction Fuzzy Hash: AE01E572100149BBDF126E95CC46EEB7F6AEF98B54F054018FE48A6121D732E961EBB0
                                                            APIs
                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00D613C6,00000000,00000000,?,00D9301A,00D613C6,00000000,00000000,00000000,?,00D9328B,00000006,FlsSetValue), ref: 00D930A5
                                                            • GetLastError.KERNEL32(?,00D9301A,00D613C6,00000000,00000000,00000000,?,00D9328B,00000006,FlsSetValue,00E02290,FlsSetValue,00000000,00000364,?,00D92E46), ref: 00D930B1
                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00D9301A,00D613C6,00000000,00000000,00000000,?,00D9328B,00000006,FlsSetValue,00E02290,FlsSetValue,00000000), ref: 00D930BF
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: LibraryLoad$ErrorLast
                                                            • String ID:
                                                            • API String ID: 3177248105-0
                                                            • Opcode ID: c8d203530d4f2d557a267a300e12401be2cef7028a22ffdd0bf41666014dad02
                                                            • Instruction ID: d4cbe1529c3239fa2f7056823c84c185145bc5ae43b1394c29d85db12d27f7c1
                                                            • Opcode Fuzzy Hash: c8d203530d4f2d557a267a300e12401be2cef7028a22ffdd0bf41666014dad02
                                                            • Instruction Fuzzy Hash: 9501F732311326ABCF314F79AC44A677B98AF05BA1B154720F919E7280C721DD15C6F0
                                                            APIs
                                                            • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00DC747F
                                                            • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00DC7497
                                                            • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00DC74AC
                                                            • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00DC74CA
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Type$Register$FileLoadModuleNameUser
                                                            • String ID:
                                                            • API String ID: 1352324309-0
                                                            • Opcode ID: 4ac205a2cbe884598e2b3b53d71a817c6c0ab9c3d35831e4b0998d4e3c576a19
                                                            • Instruction ID: 422b005f0d225b8e29536958bb3fe7668fb5ac5b0118fc7c929f4072849627cd
                                                            • Opcode Fuzzy Hash: 4ac205a2cbe884598e2b3b53d71a817c6c0ab9c3d35831e4b0998d4e3c576a19
                                                            • Instruction Fuzzy Hash: 2F118BB120931AABE7208F14DD09FA2BBFCEB00B00F10856DAA66D7191D7B0E904DF70
                                                            APIs
                                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00DCACD3,?,00008000), ref: 00DCB0C4
                                                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00DCACD3,?,00008000), ref: 00DCB0E9
                                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00DCACD3,?,00008000), ref: 00DCB0F3
                                                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00DCACD3,?,00008000), ref: 00DCB126
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CounterPerformanceQuerySleep
                                                            • String ID:
                                                            • API String ID: 2875609808-0
                                                            • Opcode ID: 7bec13c9e9937c02ef9878e5d9e31e8bb7bfa6e8305c1aea7aaad8a50f603eb2
                                                            • Instruction ID: bf80afe5d74907d01a0ea2048909c24398f8669e5d147c84a64191f263e8c613
                                                            • Opcode Fuzzy Hash: 7bec13c9e9937c02ef9878e5d9e31e8bb7bfa6e8305c1aea7aaad8a50f603eb2
                                                            • Instruction Fuzzy Hash: 47112E31D0161DD7CF009FA4E959BEEBB74FF09721F14408AD541B3241CB309560CB62
                                                            APIs
                                                            • GetWindowRect.USER32(?,?), ref: 00DF7E33
                                                            • ScreenToClient.USER32(?,?), ref: 00DF7E4B
                                                            • ScreenToClient.USER32(?,?), ref: 00DF7E6F
                                                            • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00DF7E8A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ClientRectScreen$InvalidateWindow
                                                            • String ID:
                                                            • API String ID: 357397906-0
                                                            • Opcode ID: 1331e24dd678d61ebed87d238f416493c1d2845a5e00d055d6c3e6347f51c7e0
                                                            • Instruction ID: 88ffe08ab304d4ec900765eb300971cb1a0363e526ac99cffadff0c63837450c
                                                            • Opcode Fuzzy Hash: 1331e24dd678d61ebed87d238f416493c1d2845a5e00d055d6c3e6347f51c7e0
                                                            • Instruction Fuzzy Hash: 311143B9D0420EAFDB41DF98C9849EEBBF5FB08310F509056E915E2210D735AA65CF60
                                                            APIs
                                                            • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00DC2DC5
                                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 00DC2DD6
                                                            • GetCurrentThreadId.KERNEL32 ref: 00DC2DDD
                                                            • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00DC2DE4
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                            • String ID:
                                                            • API String ID: 2710830443-0
                                                            • Opcode ID: 7d624852958dffb9b76a7703508502069a55efb71d0d1d9e217a22cccdf91eca
                                                            • Instruction ID: e2ea062d239b6526aaeb962d55ec37e6521c30eafac8410696f0f15e9a181767
                                                            • Opcode Fuzzy Hash: 7d624852958dffb9b76a7703508502069a55efb71d0d1d9e217a22cccdf91eca
                                                            • Instruction Fuzzy Hash: 49E092712153287BD7201B72AD0DFFB3E6CEF53BA1F045019F106D21909AA4C840C6F0
                                                            APIs
                                                              • Part of subcall function 00D79639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00D79693
                                                              • Part of subcall function 00D79639: SelectObject.GDI32(?,00000000), ref: 00D796A2
                                                              • Part of subcall function 00D79639: BeginPath.GDI32(?), ref: 00D796B9
                                                              • Part of subcall function 00D79639: SelectObject.GDI32(?,00000000), ref: 00D796E2
                                                            • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00DF8887
                                                            • LineTo.GDI32(?,?,?), ref: 00DF8894
                                                            • EndPath.GDI32(?), ref: 00DF88A4
                                                            • StrokePath.GDI32(?), ref: 00DF88B2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                            • String ID:
                                                            • API String ID: 1539411459-0
                                                            • Opcode ID: 09339e7ba02980b32b8ba36978c225dcadf6e720f022f8bdd1fdee98e69edc6b
                                                            • Instruction ID: da5245de16c29bfa9509b426001f33d9f771fb358e1cf9b7711abe4039a9adb5
                                                            • Opcode Fuzzy Hash: 09339e7ba02980b32b8ba36978c225dcadf6e720f022f8bdd1fdee98e69edc6b
                                                            • Instruction Fuzzy Hash: 45F03A3604125DBADB125F94AD0DFEE3E59AF06350F04C140FA11A51E1CB755521DBF5
                                                            APIs
                                                            • GetSysColor.USER32(00000008), ref: 00D798CC
                                                            • SetTextColor.GDI32(?,?), ref: 00D798D6
                                                            • SetBkMode.GDI32(?,00000001), ref: 00D798E9
                                                            • GetStockObject.GDI32(00000005), ref: 00D798F1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Color$ModeObjectStockText
                                                            • String ID:
                                                            • API String ID: 4037423528-0
                                                            • Opcode ID: 60fb92fbdfeec9f055574f285671eb043c8af00d27685da99114055306922494
                                                            • Instruction ID: b9eb12493617c6772c22f76da23cd18be3a9e74cf7d0308e242d6a75b4e80400
                                                            • Opcode Fuzzy Hash: 60fb92fbdfeec9f055574f285671eb043c8af00d27685da99114055306922494
                                                            • Instruction Fuzzy Hash: BCE03031254744AADB215B74AD09BE83B50AB51336F18D219F6BA982E1C3714660DB30
                                                            APIs
                                                            • GetCurrentThread.KERNEL32 ref: 00DC1634
                                                            • OpenThreadToken.ADVAPI32(00000000,?,?,?,00DC11D9), ref: 00DC163B
                                                            • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00DC11D9), ref: 00DC1648
                                                            • OpenProcessToken.ADVAPI32(00000000,?,?,?,00DC11D9), ref: 00DC164F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CurrentOpenProcessThreadToken
                                                            • String ID:
                                                            • API String ID: 3974789173-0
                                                            • Opcode ID: edeaa9f60a3d97f5280ac41eb3f30285ee60f0e6400342b0c15f2c356d923f1f
                                                            • Instruction ID: f9729c7d3868aa3677a08ce6dcb1b2ab76a6f56fc327c1996f1b73adb379ae25
                                                            • Opcode Fuzzy Hash: edeaa9f60a3d97f5280ac41eb3f30285ee60f0e6400342b0c15f2c356d923f1f
                                                            • Instruction Fuzzy Hash: C2E04F366513259BD7201BB09E0DF663B68AF45791F188808F245CA080DA244495C774
                                                            APIs
                                                            • GetDesktopWindow.USER32 ref: 00DBD858
                                                            • GetDC.USER32(00000000), ref: 00DBD862
                                                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00DBD882
                                                            • ReleaseDC.USER32(?), ref: 00DBD8A3
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CapsDesktopDeviceReleaseWindow
                                                            • String ID:
                                                            • API String ID: 2889604237-0
                                                            • Opcode ID: ba1f5866b2ab4cded315bd294274d685c57124497a3f69e51f0e489414b407ba
                                                            • Instruction ID: 44cfa6a572702692896be1ea7c15f9ecd03bee7af3f77d05cd1a8a8423f88e81
                                                            • Opcode Fuzzy Hash: ba1f5866b2ab4cded315bd294274d685c57124497a3f69e51f0e489414b407ba
                                                            • Instruction Fuzzy Hash: 0FE0E5B4814208DFCB419FA09A08A7DBBB2EB08311B10E409E846E7360DB388951EF60
                                                            APIs
                                                            • GetDesktopWindow.USER32 ref: 00DBD86C
                                                            • GetDC.USER32(00000000), ref: 00DBD876
                                                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00DBD882
                                                            • ReleaseDC.USER32(?), ref: 00DBD8A3
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CapsDesktopDeviceReleaseWindow
                                                            • String ID:
                                                            • API String ID: 2889604237-0
                                                            • Opcode ID: 03ded51ac0ec3a601d77f88d07e9849101327f1d8ff84349bfda77ecebd777e1
                                                            • Instruction ID: ff4611f2a410ce926c5694caca0bd65d840e33d575d476054138bcdcb06806d8
                                                            • Opcode Fuzzy Hash: 03ded51ac0ec3a601d77f88d07e9849101327f1d8ff84349bfda77ecebd777e1
                                                            • Instruction Fuzzy Hash: 21E0E570814208DFCB409FA0990866DBBB1AB08310B10A408E84AE7360DB385951DF60
                                                            APIs
                                                              • Part of subcall function 00D67620: _wcslen.LIBCMT ref: 00D67625
                                                            • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00DD4ED4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Connection_wcslen
                                                            • String ID: *$LPT
                                                            • API String ID: 1725874428-3443410124
                                                            • Opcode ID: 9ae663a865db8afcdb6623925f7b0ae0db7deaae5e674130bdd2584978458b5a
                                                            • Instruction ID: 4c9762205ce3b7cc4f0d81b0099569cc51d5bbe398dc2a9b1752b67c87f3d598
                                                            • Opcode Fuzzy Hash: 9ae663a865db8afcdb6623925f7b0ae0db7deaae5e674130bdd2584978458b5a
                                                            • Instruction Fuzzy Hash: 99914F75A002449FCB14DF58C484EAABBF5EF44304F19809AE44A9F362D731ED85CBB1
                                                            APIs
                                                            • __startOneArgErrorHandling.LIBCMT ref: 00D8E30D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ErrorHandling__start
                                                            • String ID: pow
                                                            • API String ID: 3213639722-2276729525
                                                            • Opcode ID: c110bfc82181cdaaa4cf05cf2a13a314cb8d6978e7484d0055baf1db5590a893
                                                            • Instruction ID: ad3a20c9c1a674dcefef8be4a2155b604ce87348908afd4a2f5a72a4a8b10991
                                                            • Opcode Fuzzy Hash: c110bfc82181cdaaa4cf05cf2a13a314cb8d6978e7484d0055baf1db5590a893
                                                            • Instruction Fuzzy Hash: C4512B61A2C202D6CF157718C9057B93BA4EF40B41F384A98F0D5922E9DB35CCD59FB6
                                                            APIs
                                                            • CharUpperBuffW.USER32(00DB569E,00000000,?,00DFCC08,?,00000000,00000000), ref: 00DE78DD
                                                              • Part of subcall function 00D66B57: _wcslen.LIBCMT ref: 00D66B6A
                                                            • CharUpperBuffW.USER32(00DB569E,00000000,?,00DFCC08,00000000,?,00000000,00000000), ref: 00DE783B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: BuffCharUpper$_wcslen
                                                            • String ID: <s
                                                            • API String ID: 3544283678-2940880691
                                                            • Opcode ID: acfcbb2c680792c06d6d5bfbd482283a39cf517582149f29aee14ec6d25afb3a
                                                            • Instruction ID: 0f5664b36280de0d7b8536110e0cafdc87604010aa439f34ffb7ce1ecda97405
                                                            • Opcode Fuzzy Hash: acfcbb2c680792c06d6d5bfbd482283a39cf517582149f29aee14ec6d25afb3a
                                                            • Instruction Fuzzy Hash: 30613B32914158ABCF44FBA5CC91DFDB378FF24304B54512AE542B3192EF20AA09DBB0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: #
                                                            • API String ID: 0-1885708031
                                                            • Opcode ID: 9c23df9f6f3622307d306db5b819a9659280cd85935a5b5fe0340af110342c55
                                                            • Instruction ID: b1fec9f2a748ebf8fc345fa5333ce113912833fa198af51f84b8183bd32bcfd9
                                                            • Opcode Fuzzy Hash: 9c23df9f6f3622307d306db5b819a9659280cd85935a5b5fe0340af110342c55
                                                            • Instruction Fuzzy Hash: 8C512675504346EFDB15DF68C4416FA7BA4EF59310F288095EC929B2D1EA30DD42DBB0
                                                            APIs
                                                            • Sleep.KERNEL32(00000000), ref: 00D7F2A2
                                                            • GlobalMemoryStatusEx.KERNEL32(?), ref: 00D7F2BB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: GlobalMemorySleepStatus
                                                            • String ID: @
                                                            • API String ID: 2783356886-2766056989
                                                            • Opcode ID: edc5f35d3109fd389da18f5b72b2e8c38303a5f204f720be4f9736ec7b7bfd9c
                                                            • Instruction ID: f10e37be142a1a702f193e9e20c68733d4ccdd8908c47da605a86a80905a248b
                                                            • Opcode Fuzzy Hash: edc5f35d3109fd389da18f5b72b2e8c38303a5f204f720be4f9736ec7b7bfd9c
                                                            • Instruction Fuzzy Hash: 585155714187899BD320AF50D886BABBBF8FF84304F81884DF2D9411A5EB718529CB76
                                                            APIs
                                                            • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 00DE57E0
                                                            • _wcslen.LIBCMT ref: 00DE57EC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: BuffCharUpper_wcslen
                                                            • String ID: CALLARGARRAY
                                                            • API String ID: 157775604-1150593374
                                                            • Opcode ID: 2265b5ff5b0f287a66743c6d089936e33bbac9bc3cb7debbf3f800968978a454
                                                            • Instruction ID: 253b34b7864a2a3ed943f418063db66e188da9e60753e4a338deeaf1d1d5b619
                                                            • Opcode Fuzzy Hash: 2265b5ff5b0f287a66743c6d089936e33bbac9bc3cb7debbf3f800968978a454
                                                            • Instruction Fuzzy Hash: 6441A231E001099FCB14EFA9D8819BEBBB5FF59358F148169E505A7255E7309D81CBB0
                                                            APIs
                                                            • _wcslen.LIBCMT ref: 00DDD130
                                                            • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00DDD13A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CrackInternet_wcslen
                                                            • String ID: |
                                                            • API String ID: 596671847-2343686810
                                                            • Opcode ID: 06d661ebf8efa01f440c4bccee4bc2c7acca59b5f381fd79bc0811670d2190cc
                                                            • Instruction ID: 032c47c52f646cdba0f5b4c7fed05303c6db460a70cc23f0185667fee5f7a67a
                                                            • Opcode Fuzzy Hash: 06d661ebf8efa01f440c4bccee4bc2c7acca59b5f381fd79bc0811670d2190cc
                                                            • Instruction Fuzzy Hash: A0311E71D00219ABCF15EFA4CC85AEEBFBAFF14300F104119F815A6266D731AA56DBB0
                                                            APIs
                                                            • DestroyWindow.USER32(?,?,?,?), ref: 00DF3621
                                                            • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00DF365C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Window$DestroyMove
                                                            • String ID: static
                                                            • API String ID: 2139405536-2160076837
                                                            • Opcode ID: 9a90e0d3b6c9e24f2e28ee0569271044ff3e49dd54776d8acbf9784275a6657a
                                                            • Instruction ID: 539a62f1b1bab8db7dd0c88553617c8f69870e1e35769208a42fea6a45b118ae
                                                            • Opcode Fuzzy Hash: 9a90e0d3b6c9e24f2e28ee0569271044ff3e49dd54776d8acbf9784275a6657a
                                                            • Instruction Fuzzy Hash: 04318B71110208AEDB149F68DC80EBB73A9FF88724F06D619FAA5D7290DA30ED91D770
                                                            APIs
                                                            • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00DF461F
                                                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00DF4634
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID: '
                                                            • API String ID: 3850602802-1997036262
                                                            • Opcode ID: 8e4d2350f58abb69ac215e765af1db89e97bf9fcca757684e307ffd019190d0f
                                                            • Instruction ID: 81dd98e3022e88c431072c9f5dd90e2d77ef4a158ed7b81b8a73a85584cf2d12
                                                            • Opcode Fuzzy Hash: 8e4d2350f58abb69ac215e765af1db89e97bf9fcca757684e307ffd019190d0f
                                                            • Instruction Fuzzy Hash: C0310774A0120D9FDB14DFA9C990BEA7BB5FF49300F15806AEA05EB391D770A945CFA0
                                                            APIs
                                                            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00DF327C
                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00DF3287
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID: Combobox
                                                            • API String ID: 3850602802-2096851135
                                                            • Opcode ID: 61dc8a39158173c5090ce79f94aff16bf11f3096aacde1e4d6ec50c9ef8ecd94
                                                            • Instruction ID: 8d80d07a8abae75c13dc1accc90bae9f25302bd469646bfdbaca24170391ee7b
                                                            • Opcode Fuzzy Hash: 61dc8a39158173c5090ce79f94aff16bf11f3096aacde1e4d6ec50c9ef8ecd94
                                                            • Instruction Fuzzy Hash: 1611B27130020C7FFF259E54DC84EBB3B6AEB94364F168129FA18A7290D631DD519774
                                                            APIs
                                                              • Part of subcall function 00D6600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00D6604C
                                                              • Part of subcall function 00D6600E: GetStockObject.GDI32(00000011), ref: 00D66060
                                                              • Part of subcall function 00D6600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00D6606A
                                                            • GetWindowRect.USER32(00000000,?), ref: 00DF377A
                                                            • GetSysColor.USER32(00000012), ref: 00DF3794
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                            • String ID: static
                                                            • API String ID: 1983116058-2160076837
                                                            • Opcode ID: cdb3be31076eea16135ab2146914173c63923846ddaddfc0e27fc3d409f90f95
                                                            • Instruction ID: 31f1ea487f6c1ce21edc05d5a9aae93603eb5f99e82ec261025e8afa2d0ad4cf
                                                            • Opcode Fuzzy Hash: cdb3be31076eea16135ab2146914173c63923846ddaddfc0e27fc3d409f90f95
                                                            • Instruction Fuzzy Hash: 5F1129B261020DAFDB00EFA8CC45AFA7BB8EB08314F029914FA55E2250D775E865DB60
                                                            APIs
                                                            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00DDCD7D
                                                            • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00DDCDA6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Internet$OpenOption
                                                            • String ID: <local>
                                                            • API String ID: 942729171-4266983199
                                                            • Opcode ID: b4399d7689b8b9c6f8ee6568311fdbce3cd2a49560f2032af8985d2faeb71ee7
                                                            • Instruction ID: c67a84171747befd07e4e8441b5f79b371d61b8e22964ad1bbd83dd53285f3dd
                                                            • Opcode Fuzzy Hash: b4399d7689b8b9c6f8ee6568311fdbce3cd2a49560f2032af8985d2faeb71ee7
                                                            • Instruction Fuzzy Hash: EE11C6712256367AD7384B668C45EF7BE6EEF127A4F005227B149D3280D7709941D6F0
                                                            APIs
                                                            • GetWindowTextLengthW.USER32(00000000), ref: 00DF34AB
                                                            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00DF34BA
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: LengthMessageSendTextWindow
                                                            • String ID: edit
                                                            • API String ID: 2978978980-2167791130
                                                            • Opcode ID: 18148c427205c58866dd6ae73969597e295db749d12135ff733867c3cfc792a3
                                                            • Instruction ID: 91edb5b7589336935c519d389c8c374865bb6d525f83bd1760957ee0618e62a7
                                                            • Opcode Fuzzy Hash: 18148c427205c58866dd6ae73969597e295db749d12135ff733867c3cfc792a3
                                                            • Instruction Fuzzy Hash: 0C118F7110020CAFEB118E64DC44ABB376AEB05374F568724FA61D72E0C771DD619B70
                                                            APIs
                                                              • Part of subcall function 00D69CB3: _wcslen.LIBCMT ref: 00D69CBD
                                                            • CharUpperBuffW.USER32(?,?,?), ref: 00DC6CB6
                                                            • _wcslen.LIBCMT ref: 00DC6CC2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$BuffCharUpper
                                                            • String ID: STOP
                                                            • API String ID: 1256254125-2411985666
                                                            • Opcode ID: 95111a2248661966d27213cf26d57712851344105001d6dda25c4b03baab7e0d
                                                            • Instruction ID: eb038b72e40e04f0f465835527b0a7f8002cd743f41665d9ce2348f731247cd6
                                                            • Opcode Fuzzy Hash: 95111a2248661966d27213cf26d57712851344105001d6dda25c4b03baab7e0d
                                                            • Instruction Fuzzy Hash: 0001C4326105278BCB20AFBDDD91EBF77A5EA61720715052CE86297195EB31D940C670
                                                            APIs
                                                              • Part of subcall function 00D69CB3: _wcslen.LIBCMT ref: 00D69CBD
                                                              • Part of subcall function 00DC3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00DC3CCA
                                                            • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00DC1D4C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ClassMessageNameSend_wcslen
                                                            • String ID: ComboBox$ListBox
                                                            • API String ID: 624084870-1403004172
                                                            • Opcode ID: 8d4c876f3d669a1736d2d81440448a68918883f4fc1d7de7ead267ab25d4424c
                                                            • Instruction ID: b775b8dddde537582d14fde6298318ea04c271925d98a79ee34cd4f8fb5781d1
                                                            • Opcode Fuzzy Hash: 8d4c876f3d669a1736d2d81440448a68918883f4fc1d7de7ead267ab25d4424c
                                                            • Instruction Fuzzy Hash: 9301D875601229ABCB14EBA4CE51EFEB368EB57350B14091DF863673D2EA309918C670
                                                            APIs
                                                              • Part of subcall function 00D69CB3: _wcslen.LIBCMT ref: 00D69CBD
                                                              • Part of subcall function 00DC3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00DC3CCA
                                                            • SendMessageW.USER32(?,00000180,00000000,?), ref: 00DC1C46
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ClassMessageNameSend_wcslen
                                                            • String ID: ComboBox$ListBox
                                                            • API String ID: 624084870-1403004172
                                                            • Opcode ID: 774c4b89a4de9f0f004dc63c46c7ed816da5a1ffb9f6c2144dc3fcdc61b2032b
                                                            • Instruction ID: 278064a6c85112afba0f392c914942a154180509931c18e5a3ce4415aac36ea0
                                                            • Opcode Fuzzy Hash: 774c4b89a4de9f0f004dc63c46c7ed816da5a1ffb9f6c2144dc3fcdc61b2032b
                                                            • Instruction Fuzzy Hash: 9101A77568121967CB14EB90CB61FFFB7ACDB12340F14001DB40677282EA349E18E6B1
                                                            APIs
                                                              • Part of subcall function 00D69CB3: _wcslen.LIBCMT ref: 00D69CBD
                                                              • Part of subcall function 00DC3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00DC3CCA
                                                            • SendMessageW.USER32(?,00000182,?,00000000), ref: 00DC1CC8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ClassMessageNameSend_wcslen
                                                            • String ID: ComboBox$ListBox
                                                            • API String ID: 624084870-1403004172
                                                            • Opcode ID: b29e69c256f1e3e531519b2a20949a3f6a58c2aa5a8d8fd77025490799b4fcba
                                                            • Instruction ID: d350cd1aea115cdbde7d1ac88047b9a5f906c59365d4df80f00e2f6af3ecf1d5
                                                            • Opcode Fuzzy Hash: b29e69c256f1e3e531519b2a20949a3f6a58c2aa5a8d8fd77025490799b4fcba
                                                            • Instruction Fuzzy Hash: 890186B568122967CB14FBA5CB51FFEF7ACDB12340F140019B842B3282EA719F19D671
                                                            APIs
                                                              • Part of subcall function 00D69CB3: _wcslen.LIBCMT ref: 00D69CBD
                                                              • Part of subcall function 00DC3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00DC3CCA
                                                            • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00DC1DD3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ClassMessageNameSend_wcslen
                                                            • String ID: ComboBox$ListBox
                                                            • API String ID: 624084870-1403004172
                                                            • Opcode ID: 61810d21e4bf0837f9c4770abb3040ed6a9be07620fd957e1fa1a6230e7782ef
                                                            • Instruction ID: f0845498e442cb9b3f99291f6106a6b238e86097c153f324433ca2c5fe30135a
                                                            • Opcode Fuzzy Hash: 61810d21e4bf0837f9c4770abb3040ed6a9be07620fd957e1fa1a6230e7782ef
                                                            • Instruction Fuzzy Hash: 96F0A475A4132A67DB14F7A4DE62FFEB76CEB12350F140919B862A32C2DA7099188270
                                                            APIs
                                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00E33018,00E3305C), ref: 00DF81BF
                                                            • CloseHandle.KERNEL32 ref: 00DF81D1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CloseCreateHandleProcess
                                                            • String ID: \0
                                                            • API String ID: 3712363035-3218720685
                                                            • Opcode ID: f40b5d7bd529df1dc0d7cac35899974e5af292f8d8deff00962dd24a86c447eb
                                                            • Instruction ID: 6cd46676588ba617a1b227ebc3cfc2e1a46e59253920162731fdbcc96cb56a86
                                                            • Opcode Fuzzy Hash: f40b5d7bd529df1dc0d7cac35899974e5af292f8d8deff00962dd24a86c447eb
                                                            • Instruction Fuzzy Hash: 90F082B1A40308BEF3246772AC4AFB73E9CDB05751F004424BB08E51A2D6798E18DBF8
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: _wcslen
                                                            • String ID: 3, 3, 16, 1
                                                            • API String ID: 176396367-3042988571
                                                            • Opcode ID: c529503b3e520f1f6c264a91b73a130379b092cf46dabce898ce94b300390662
                                                            • Instruction ID: 405074ff6f4ab2369a503e606f2a4e03b6c26b634859fe32fc42143dd5cd0d41
                                                            • Opcode Fuzzy Hash: c529503b3e520f1f6c264a91b73a130379b092cf46dabce898ce94b300390662
                                                            • Instruction Fuzzy Hash: CDE06102305361109371327BECC197F5689CFC9760718182FF989C22E6EB94CD9193B0
                                                            APIs
                                                            • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00DC0B23
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Message
                                                            • String ID: AutoIt$Error allocating memory.
                                                            • API String ID: 2030045667-4017498283
                                                            • Opcode ID: c744d403b4abcd4d0e28f07bcfc560b16bd12dd10bba70b10f5085231b510f5b
                                                            • Instruction ID: 9232886989080de815e3c9eb93bb65bbfd6cf9f7b76b65361b8c00f028bb4551
                                                            • Opcode Fuzzy Hash: c744d403b4abcd4d0e28f07bcfc560b16bd12dd10bba70b10f5085231b510f5b
                                                            • Instruction Fuzzy Hash: C4E0D83228431C2AD22037547D03F997A84CF05B11F10842AFB58955C39AE164A046F9
                                                            APIs
                                                              • Part of subcall function 00D7F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00D80D71,?,?,?,00D6100A), ref: 00D7F7CE
                                                            • IsDebuggerPresent.KERNEL32(?,?,?,00D6100A), ref: 00D80D75
                                                            • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00D6100A), ref: 00D80D84
                                                            Strings
                                                            • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00D80D7F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                            • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                            • API String ID: 55579361-631824599
                                                            • Opcode ID: 6949c9c2fcde467f9f53c235d855a1571d582f70c25f9370796f5a941c59b551
                                                            • Instruction ID: 7cd4cc9958ac26426dc6fb8dc778a04af9007404e85c78750288085e8eaca432
                                                            • Opcode Fuzzy Hash: 6949c9c2fcde467f9f53c235d855a1571d582f70c25f9370796f5a941c59b551
                                                            • Instruction Fuzzy Hash: 6DE039702003018FD360AFA9D5083627FE4EF00740F05892DE486C6B51EBB0E448CBB1
                                                            APIs
                                                            • __Init_thread_footer.LIBCMT ref: 00D7E3D5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Init_thread_footer
                                                            • String ID: 0%$8%
                                                            • API String ID: 1385522511-2949748613
                                                            • Opcode ID: 21f786456c9c89d0b218d91d13d0b6f27d0c281d951e9e7cfdc3ac9b95403850
                                                            • Instruction ID: a20a6426e773bf57a428afb025237ca6fb8bc003ed946f898d7716e29e224262
                                                            • Opcode Fuzzy Hash: 21f786456c9c89d0b218d91d13d0b6f27d0c281d951e9e7cfdc3ac9b95403850
                                                            • Instruction Fuzzy Hash: 9FE02632400A14EFC604E719B85DF883B51EB4D321B10D1ECE3C6A71D1AB302A45C77A
                                                            APIs
                                                            • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00DD302F
                                                            • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00DD3044
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: Temp$FileNamePath
                                                            • String ID: aut
                                                            • API String ID: 3285503233-3010740371
                                                            • Opcode ID: b3bf68b355420ae31528b5b5e582f86eb3ea211bb2a3d639dc06042438dae4f2
                                                            • Instruction ID: e2d428ce019d8193ba4c6e4fb0488f43228622a7bcc739e32d5355ccb0dae69b
                                                            • Opcode Fuzzy Hash: b3bf68b355420ae31528b5b5e582f86eb3ea211bb2a3d639dc06042438dae4f2
                                                            • Instruction Fuzzy Hash: 37D05EB250032CA7DA20A7A4AD0EFDB3A6CDB05750F0002A1B655E2192DAB09A84CAE4
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: LocalTime
                                                            • String ID: %.3d$X64
                                                            • API String ID: 481472006-1077770165
                                                            • Opcode ID: 52ceddd2cc006f6507f7f46b405e665cda4ab6f00a8572aa46a8b6bdeae3bf23
                                                            • Instruction ID: 8c1303cd322c01ffeea2b8b332cf9fb3bbe292b0c87e81cac7d2bd0d01e5a823
                                                            • Opcode Fuzzy Hash: 52ceddd2cc006f6507f7f46b405e665cda4ab6f00a8572aa46a8b6bdeae3bf23
                                                            • Instruction Fuzzy Hash: AFD01261C09258E9CB5097D0DC458F9B37DFB08301F50C462F99BE1040F634C908AB75
                                                            APIs
                                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00DF236C
                                                            • PostMessageW.USER32(00000000), ref: 00DF2373
                                                              • Part of subcall function 00DCE97B: Sleep.KERNEL32 ref: 00DCE9F3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: FindMessagePostSleepWindow
                                                            • String ID: Shell_TrayWnd
                                                            • API String ID: 529655941-2988720461
                                                            • Opcode ID: 733f71c9e679b951a3f4812de05d780feccf46e1a12fba2b905f3e303fcb8629
                                                            • Instruction ID: de59c0d4ea2a6d0404b384884d7a047b82a68150ac3f51e9ff55d68aeaa7da21
                                                            • Opcode Fuzzy Hash: 733f71c9e679b951a3f4812de05d780feccf46e1a12fba2b905f3e303fcb8629
                                                            • Instruction Fuzzy Hash: E9D0C9723953247BE664A770AD0FFD666149B05B14F009A167645EA2E0C9B0A821CA64
                                                            APIs
                                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00DF232C
                                                            • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00DF233F
                                                              • Part of subcall function 00DCE97B: Sleep.KERNEL32 ref: 00DCE9F3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: FindMessagePostSleepWindow
                                                            • String ID: Shell_TrayWnd
                                                            • API String ID: 529655941-2988720461
                                                            • Opcode ID: 05187cfd9c0a8035fccc48c31b028faa6d998b613fb52efaf0b09dd4726fd65d
                                                            • Instruction ID: 8b602a85f555572ffacd5e1fc256e8b8e1eca93e73bca0482e9c6986bb8f3503
                                                            • Opcode Fuzzy Hash: 05187cfd9c0a8035fccc48c31b028faa6d998b613fb52efaf0b09dd4726fd65d
                                                            • Instruction Fuzzy Hash: 7FD012763A4324B7E664B770ED0FFD67A149B00B14F009A167745EA2E0C9F0A821CE74
                                                            APIs
                                                            • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 00D9BE93
                                                            • GetLastError.KERNEL32 ref: 00D9BEA1
                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00D9BEFC
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1343841383.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                            • Associated: 00000001.00000002.1343819956.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1343933758.0000000000E22000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344014999.0000000000E2C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1344043747.0000000000E34000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_d60000_file.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide$ErrorLast
                                                            • String ID:
                                                            • API String ID: 1717984340-0
                                                            • Opcode ID: 86c94267997e45af2b0120bacb3fb8393f6e69df3634f66d0ee781d17edf8839
                                                            • Instruction ID: 5e26a3d6eedf58f1a6e2db03a738996e190022d093c2c41670d9a9fae67654b2
                                                            • Opcode Fuzzy Hash: 86c94267997e45af2b0120bacb3fb8393f6e69df3634f66d0ee781d17edf8839
                                                            • Instruction Fuzzy Hash: AD41FC34604206EFCF219FA4EE44ABA7BB9EF41330F1A415AF959971A1DB318D00CB70